Chapter 9– Security Vulnerabilities, Threats, and Countermeasures Flashcards

1
Q
  1. Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications on a single-processor systems. What term is used to describe this capability?
    Multitasking
A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What technology provides an organization with the best control over BYOD equipment?
    Mobile device management
A

Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. You have three applications running on a single-core single-processor system that supports multitasking. One of those applications is a word processing program that is managing two threads simultaneously. The order two applications are using only one thread of execution. How many application threads are running on the processor at any given time?
    One
A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What type of federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system?
    Dedicated
A

Dedicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is a security risk of an embedded system that is not commonly found in a standard PC?
    Control of a mechanism in the physical world
A

Control of a mechanism in the physical world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following describes a community of cloud?
    A cloud environment maintained, used, and paid for by a group of users or organizations for their shared benefit, such as collaboration and data exchange
A

A cloud environment maintained, used, and paid for by a group of users or organizations for their shared benefit, such as collaboration and data exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the concept of a computer implemented as part of a larger system that is typically designed around a limited set of specific functions (such as management, monitoring, and control) in relation to the larger product of which it’s a components?
    Embedded System
A

Embedded System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which one of the following types of memory might retain information after being removed from a computer and, therefore, represents a security risk?
    Secondary memory
A

Secondary memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is the most effective means of reducing the risk of losing the data on a mobile device, such as a notebook computer?
    Minimizing sensitive data stored on the mobile device
A

Minimizing sensitive data stored on the mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What type of electrical component serves as the primary building block for dynamic RAM chips?
    Capacitor
A

Capacitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly