Exam 9: Client and Application Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A,B,C

What publicly released software security update is intended to repair a vulnerability?

Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
Verified

C

What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

A

What is a multi-functional device (MFD)?

(Essay)
4.9/5
(33)

Which OS hardening technique removes all unnecessary features that may compromise an operating system?

(Multiple Choice)
4.9/5
(33)

What is a bollard?

(Essay)
5.0/5
(27)

When securing a laptop,it can be placed in an office or a desk drawer.

(True/False)
4.7/5
(33)

What type of update does not allow a user to refuse or delay security updates?

(Multiple Choice)
4.8/5
(34)

A compiled code test is used to ensure that the projected application meets all specifications at that point

(True/False)
4.8/5
(33)

The BIOS was software that was integrated into the computer's motherboard.

(True/False)
4.8/5
(33)

What type of storage is used on mobile devices?

(Multiple Choice)
4.9/5
(33)

Which of the following is a popular type of removable data storage used on mobile devices?

(Multiple Choice)
4.8/5
(34)

What software methodology includes security automation?

(Multiple Choice)
4.9/5
(39)

Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.

(True/False)
4.9/5
(33)

What is a supply chain and why is it critical to understand that it needs to be secured?

(Essay)
4.8/5
(37)

An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.

(True/False)
4.8/5
(34)

Tightening security during the design and coding of an OS is called "locking."

(True/False)
4.7/5
(34)

What security standard was introduced in conjunction with UEFI?

(Multiple Choice)
4.9/5
(28)

Anti-virus products typically utilize what type of virus scanning analysis?

(Multiple Choice)
4.8/5
(35)

Explain the security advantages of "code signing" and "stored procedure"?

(Essay)
4.9/5
(38)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)