Quiz 9 Flashcards
A compiled code test is used to ensure that the projected application meets all specifications at that point T/F
False
The testing stage is a “quality assurance” test to verify that the code functions as intended. T/F
False
The BIOS was software that was integrated into the computer’s motherboard. T/F
False
When securing a laptop, it can be placed in an office or a desk drawer. T/F
False
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor’s online updates. T/F
True
An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area. T/F
True
Tightening security during the design and coding of an OS is called “locking.” T/F
False
Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed. T/F
True
One tool for change management is version control software that allows changes to be automatically recorded and if necessary “rolled back” to a previous version of the software. T/F
True
In the production stage the application is released to be used in its actual setting. T/F
True
Which application development life-cycle model uses a sequential design process?
A) agile
B) linear
C) waterfall
D) serial
C) waterfall
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
A) bollard
B) fence
C) roller barrier
D) top hat
C) roller barrier
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
A) anti-malware
B) antivirus
C) security applications
D) firewall
B) antivirus
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?
A) heuristic monitoring
B) pattern detection
C) hybrid monitoring
D) combination detection
A) heuristic monitoring
Anti-virus products typically utilize what type of virus scanning analysis?
A) Static analysis
B) Wildcard scanning analysis
C) Heuristic detection analysis
D) String scanning analysis
A) Static analysis