Security Module 4 Flashcards

1
Q

Which of the following is NOT an advantage to utilizing wrapper functions?

A

They provide error-correction of the existing code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fuzzing inputs random data into a program to accomplish which of the following?

A

Trap errors in the application code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Seismic sensors are used for which of the following?

A

Motion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would a data base administrator use NoSQL over a SQL relational database?

A

NoSQL is simpler by design and has a smaller attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mantrap can be useful in physical security by preventing what?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following security controls provides a substitute for normal controls that cannot be used?

A

Compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an advantage to an alarmed carrier PDS over a hardened carrier PDS?

A

An alarmed carrier PDS can sense vibrations with optical fibers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Televisions, HVAC controllers, and ATMs are all examples of what?

A

Embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following correctly describes the importance of eliminating marks that classify a master key?

A

It is imperative to follow ideal key management procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is considered OS hardening?

A

Disabling the guest account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following can use fingerprinting to distinguish critical data from unimportant data?

A

Data loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why would an administrator allow an application exception through a software firewall instead of opening the applicatoin’s port?

A

The port is closed when not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher locks are susceptible to which security threat?

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a benefit of having an automated patch update service instead of configuring clients to install updates independently?

A

An automated patch update service can allow an administrator to test the patch within their environment before causing a network-wide problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the most restrictive anti-spam technique?

A

Whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passive RFID tags are powered by which of the following?

A

The signal coming from the transceiver

17
Q

Why would a Server 2008 R2 DNS server have a different security baseline than a Windows XP client?

A

If systems perform different functions, security settings can restrict one function but not the other

18
Q

Why would an administrator use the hardening technique of kernel pruning?

A

By removing services that aren’t needed, you can limit the attack surface of a system

19
Q

How is a hotfix different from other operating system fixes?

A

A hotfix can relate to a specific customer

20
Q

Why is dynamic heuristic detection considered more of a robust antivirus scanning method than static analysis?

A

Dynamic heuristic detection is more capable of preventing zero day attacks