ch 9 Flashcards

1
Q

BIOS

A

Basic input/output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UEFI

A

unified extensible firmware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what was made to combat BIOS attacks

A

(UEFI) unified extensible firmware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the secure boot process

A

when using UEFI and secure boot, a computer checks the digital signature of each piece of boot software. if signatures are deem valid the computer boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens if the computer does not deem the boot valid

A

the computer doesn’t start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(TEMPEST)

A

telecommunications electronics material protected from emanating spurious transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is TEMPEST

A

intended to prevent attackers from picking up electromagnetic fields from government buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens during a supply chain infection

A

steps in the supply chain has opened the door for malware to be injected into products during their manufacturing or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what to for OS security configuration

A

Disabling unnecessary ports and services,
disabling defaults accounts/ passwords
employing least functionality
application white listing and black listing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a software security update to repair vulnerabilities

A

security patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what includes enhancements to the software to provide new or expanded functionality, does not address security vulnerability

A

feature update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what accumulates security updates and additional features

A

service patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what manages patches locally rather than rely on the vendor’s online update service

A

automated patch update service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

updates that are applied no matter what

A

forced updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

software that examines a computer for infections, scans new documents that might contain viruses

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the weakness of antivirus

A

vendor must continually search for new viruses, update and distribute signature files to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a newer approach to (AV) Antivirus that has heuristic monitoring

A

dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

one AV heuristic monitoring technique, questionable code is executed in virtual environment to determine if it is a virus.

A

code emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

monitors emails for span and other unwanted content

A

antispam- mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

define black listing

A

nonapproved senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

define whitelisting

A

approved senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what devides email messages into two piles spam and non spam

A

bayeasian filtering

23
Q

what helps prevent computers from becoming infected by different types of spyware

A

antispyware

24
Q

small window appearing over website usually created by advertisers

25
s separate program as part of anti-spyware package
pop-up blockers
26
tightening security during the design and coding of the OS
OS Hardening
27
an OS that has been designed through OS hardening
trusted OS
28
Removing all unnecessary features that may compromise an OS
kernel pruning
29
(SDIO)
Secure digital input output
30
a storage cad with integrated wireless transmission capabilities
SDIO Secure digital input output
31
An SDIO device used in devices like digital cameras
WIFI enabled micro SD card
32
uses internal storage and external SD cards
Digital cameras
33
(MFD)
Multifunctional devices
34
combines the functions of a printer, copier, scanner, and fax machine
MFD Multifunctional devices
35
(DLP)
Data loss prevention
36
whats the alternative name for displays
often considered "passive" peripherals
37
what is a bollard
vertical post, preventing a car from ramming into the building
38
are security guards considered active security elements ?
yes
39
(PDS)
Protection Distribution system
40
a system of cable conduits used to protect classified information that is being transmitted between two secure areas
(PDS) Protected Distribution system
41
Conduit contructed of special electrical metallic tubing
hardened carrier PDS
42
specialized optical fibers in the conduit that sense acoustic vibrations that occur when an intruder attempts to gain access
alarmed carrier PDS
43
the physical security protecting the hardware of the host system
computer hardware system
44
what are the aspects of application security
application development security secure coding techniques code testing
45
what are the application development stages
development testing staging production
46
what are the application development life cycles
waterfall model | agile model
47
what does the secure devops methodology include
``` security automation continuous integration immutable systems infrastructure as code base lining ```
48
what is provisioning
the enterprise wide configuration, development, and management of multiple types of IT system resources
49
what is deprovisioning
in application development is removing a resource that is no longer needed.
50
test is used to ensure that the projected application meets all specifications at that point
model verification
51
searches for errors that could prevent the application from properly compiling from source code to application code
compiled code testing
52
looks for errors after the program has compiled correctly and is running
runtime code testing
53
which is a testing environments that isolates the untested code from the live production environment
sandbox
54
tools that examine software without executing the program
static program analyzers