Chapter 9 Flashcards

1
Q

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?

If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device.

Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected.

It is virtually impossible to closely monitor every step in the supply chain.

Supply chains take advantage of the trusted “chain of trust” concept.

A

If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of operating system runs on a firewall, router, or switch?

Server OS

Network OS

Device OS

Resource OS

A

Network OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

Barricade

Fencing

Roller barrier

Type V controls

A

Barricade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a motion detection method?

Magnetism

Radio frequency

Moisture

Infrared

A

Moisture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of residential lock is most often used for keeping out intruders?

Encrypted key lock

Keyed entry lock

Privacy lock

Passage lock

A

Encrypted key lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is a list of approved email senders?

Blacklist

Whitelist

Bluelist

Yellowlist

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a typical OS security configuration?

Employing least functionality

Restricting patch management

Disabling default accounts/passwords

Disabling unnecessary ports and services

A

Restricting patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a characteristic of an alarmed carrier PDS?

Requires periodic visual inspections

Uses continuous monitoring

Carrier can be hidden above the ceiling

Eliminates the need to seal connections

A

Requires periodic visual inspections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which stage is a “quality assurance” test that verifies the code functions as intended?

Production stage

Testing stage

Staging stage

Development stage

A

Staging stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which model uses a sequential design process?

Waterfall model

Rigid model

Agile model

Secure model

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What allows for a single configuration to be set and then deployed to many or all users?

Snap-In Replication (SIR)

Active Directory

Group Policy

Command Configuration

A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a cumulative package of all patches?

Rollup

Service pack

Patch

Hotfix

A

Service pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT an advantage to an automated patch update service?

Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs.

Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth and time because each computer does not have to connect to an external server.

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.

Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available.

A

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service. (?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can an SDIO card be made secure?

Using the security mechanisms on a standard Wi-Fi network.

Turning on patch updates to the SDIO card.

Requiring a username before accessing the SDIO card.

SDIO cards are natively secure and no security settings are needed.

A

Using the security mechanisms on a standard Wi-Fi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does heuristic detection detect a virus?

A virtualized environment is created and the code is executed in it.

A string of bytes from the virus is compared against the suspected file.

The bytes of a virus are placed in different “piles” and then used to create a profile.

The virus signature file is placed in a suspended chamber before streaming to the CPU.

A

A virtualized environment is created and the code is executed in it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of testing uses unexpected or invalid inputs?

Stress testing

Dynamic analysis

Static analysis

Runtime testing

A

Dynamic analysis