Quiz 9 Flashcards

1
Q

A compiled code test is used to ensure that the projected application meets all specifications at that point T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The testing stage is a “quality assurance” test to verify that the code functions as intended. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The BIOS was software that was integrated into the computer’s motherboard. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When securing a laptop, it can be placed in an office or a desk drawer. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor’s online updates. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tightening security during the design and coding of an OS is called “locking.” T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One tool for change management is version control software that allows changes to be automatically recorded and if necessary “rolled back” to a previous version of the software. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the production stage the application is released to be used in its actual setting. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which application development life-cycle model uses a sequential design process?

A) agile
B) linear
C) waterfall
D) serial

A

C) waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

A) bollard
B) fence
C) roller barrier
D) top hat

A

C) roller barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

A) anti-malware
B) antivirus
C) security applications
D) firewall

A

B) antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?

A) heuristic monitoring
B) pattern detection
C) hybrid monitoring
D) combination detection

A

A) heuristic monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-virus products typically utilize what type of virus scanning analysis?

A) Static analysis
B) Wildcard scanning analysis
C) Heuristic detection analysis
D) String scanning analysis

A

A) Static analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:

A) U-lock
B) safe lock
C) shield lock
D) cable lock

A

D) cable lock

17
Q

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

A

Anti-climb

18
Q

A Wi-Fi enabled microSD card is an example of what type of device?

A

SDIO

19
Q

How can an area be made secure from a non-secured area via two interlocking doors to a small room?

Using a lockout
Using a mantrap
Using a closet
Using a pit

A

Using a mantrap

20
Q

In Microsoft Windows, what type of templates are a collection of security configuration settings?

A

security

21
Q

What type of storage is used on mobile devices?

volatile memory
ROM
RAM
flash memory

A

flash memory

22
Q

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

least functionality
whitelisting
blacklisting
function limiting

A

least functionality

23
Q

What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

mail gateway
firewall
router gateway
code emulation

A

mail gateway

24
Q

What type of OS manages hardware and software on a client computer?

network OS
client OS
workstation OS
appliance OS

A

workstation OS

25
Q

What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?

A) CCTV
B) ICTV
C) IPTV
D) ITV

A

A) CCTV

26
Q

What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

A) feature pack
B) roll-up
C) service pack
D) patch

A

C) service pack

27
Q

What software methodology includes security automation?

A) DevOps
B) Secure DevOps
C) Agile
D) Secure Agile

A

B) Secure DevOps

28
Q

Which of the following are considered to be part of a typical OS security configuration?
(Choose all that apply.)

Disabling unnecessary ports and services
Employing least functionality
Password auditing
Disabling default accounts/passwords

A

Disabling unnecessary ports and services

Employing least functionality

29
Q

What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

A

TEMPEST

30
Q

Which of the following are application development stages? (Choose all that apply.)

A

staging
testing

31
Q

What type of tools are involved in effective patch management? (Choose all that apply.)

A

patch reception
patch redistribution