Security Module 4 Flashcards
Which of the following is NOT an advantage to utilizing wrapper functions?
They provide error-correction of the existing code
Fuzzing inputs random data into a program to accomplish which of the following?
Trap errors in the application code
Seismic sensors are used for which of the following?
Motion detection
Why would a data base administrator use NoSQL over a SQL relational database?
NoSQL is simpler by design and has a smaller attack surface
A mantrap can be useful in physical security by preventing what?
Tailgating
Which of the following security controls provides a substitute for normal controls that cannot be used?
Compensating controls
What is an advantage to an alarmed carrier PDS over a hardened carrier PDS?
An alarmed carrier PDS can sense vibrations with optical fibers
Televisions, HVAC controllers, and ATMs are all examples of what?
Embedded systems
Which of the following correctly describes the importance of eliminating marks that classify a master key?
It is imperative to follow ideal key management procedures
Which of the following is considered OS hardening?
Disabling the guest account
Which of the following can use fingerprinting to distinguish critical data from unimportant data?
Data loss Prevention
Why would an administrator allow an application exception through a software firewall instead of opening the applicatoin’s port?
The port is closed when not in use
Cipher locks are susceptible to which security threat?
Shoulder Surfing
What is a benefit of having an automated patch update service instead of configuring clients to install updates independently?
An automated patch update service can allow an administrator to test the patch within their environment before causing a network-wide problem
Which of the following is the most restrictive anti-spam technique?
Whitelisting