Exam 5: Host, Application, and Data Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
B
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
A
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
(Multiple Choice)
4.9/5
(29)
Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
(True/False)
4.7/5
(47)
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
(Short Answer)
4.9/5
(29)
A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
(Multiple Choice)
4.8/5
(36)
A ____ is software that is a cumulative package of all security updates plus additional features.
(Multiple Choice)
4.8/5
(38)
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
(Multiple Choice)
4.9/5
(37)
Keyed entry locks are much more difficult to defeat than deadbolt locks.
(True/False)
4.8/5
(39)
List three recommended key management procedures to achieve the best security when using keyed door locks.
(Essay)
4.8/5
(38)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(42)
When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
(True/False)
4.7/5
(23)
Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
(Multiple Choice)
4.8/5
(41)
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
(True/False)
4.9/5
(42)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)