Exam 5: Host, Application, and Data Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
(Multiple Choice)
4.9/5
(31)
What are the three most important elements to secure in any information technology setting?
(Essay)
4.9/5
(33)
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.
(Multiple Choice)
4.7/5
(28)
____ is defined as a security analysis of the transaction within its approved context.
(Multiple Choice)
5.0/5
(33)
Securing a restricted area by erecting a barrier is called ____.
(Multiple Choice)
4.9/5
(36)
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
(Multiple Choice)
4.8/5
(34)
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
(Short Answer)
4.7/5
(32)
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
(Multiple Choice)
4.8/5
(32)
____________________ locks keep a record of when the door was opened and by which code.
(Short Answer)
4.8/5
(42)
ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.
(Multiple Choice)
4.9/5
(42)
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
(Short Answer)
4.7/5
(30)
____________________ security involves restricting access to the areas in which equipment is located.
(Short Answer)
4.9/5
(33)
In Microsoft Windows, a ____ is a collection of security configuration settings.
(Multiple Choice)
4.9/5
(40)
____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
(Multiple Choice)
4.9/5
(34)
____ can be prewired for electrical power as well as wired network connections.
(Multiple Choice)
4.9/5
(34)
A ____ is designed to separate a nonsecured area from a secured area.
(Multiple Choice)
4.8/5
(39)
Identify the five steps in the process to secure operating system software.
(Essay)
5.0/5
(28)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)