Security Module 4 Flashcards
Which of the following is NOT an advantage to utilizing wrapper functions?
They provide error-correction of the existing code
Fuzzing inputs random data into a program to accomplish which of the following?
Trap errors in the application code
Seismic sensors are used for which of the following?
Motion detection
Why would a data base administrator use NoSQL over a SQL relational database?
NoSQL is simpler by design and has a smaller attack surface
A mantrap can be useful in physical security by preventing what?
Tailgating
Which of the following security controls provides a substitute for normal controls that cannot be used?
Compensating controls
What is an advantage to an alarmed carrier PDS over a hardened carrier PDS?
An alarmed carrier PDS can sense vibrations with optical fibers
Televisions, HVAC controllers, and ATMs are all examples of what?
Embedded systems
Which of the following correctly describes the importance of eliminating marks that classify a master key?
It is imperative to follow ideal key management procedures
Which of the following is considered OS hardening?
Disabling the guest account
Which of the following can use fingerprinting to distinguish critical data from unimportant data?
Data loss Prevention
Why would an administrator allow an application exception through a software firewall instead of opening the applicatoin’s port?
The port is closed when not in use
Cipher locks are susceptible to which security threat?
Shoulder Surfing
What is a benefit of having an automated patch update service instead of configuring clients to install updates independently?
An automated patch update service can allow an administrator to test the patch within their environment before causing a network-wide problem
Which of the following is the most restrictive anti-spam technique?
Whitelisting
Passive RFID tags are powered by which of the following?
The signal coming from the transceiver
Why would a Server 2008 R2 DNS server have a different security baseline than a Windows XP client?
If systems perform different functions, security settings can restrict one function but not the other
Why would an administrator use the hardening technique of kernel pruning?
By removing services that aren’t needed, you can limit the attack surface of a system
How is a hotfix different from other operating system fixes?
A hotfix can relate to a specific customer
Why is dynamic heuristic detection considered more of a robust antivirus scanning method than static analysis?
Dynamic heuristic detection is more capable of preventing zero day attacks