Exam 9: Client and Application Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A,B,C
What publicly released software security update is intended to repair a vulnerability?
Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
C
What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
A
Which OS hardening technique removes all unnecessary features that may compromise an operating system?
(Multiple Choice)
4.9/5
(33)
When securing a laptop,it can be placed in an office or a desk drawer.
(True/False)
4.7/5
(33)
What type of update does not allow a user to refuse or delay security updates?
(Multiple Choice)
4.8/5
(34)
A compiled code test is used to ensure that the projected application meets all specifications at that point
(True/False)
4.8/5
(33)
The BIOS was software that was integrated into the computer's motherboard.
(True/False)
4.8/5
(33)
Which of the following is a popular type of removable data storage used on mobile devices?
(Multiple Choice)
4.8/5
(34)
Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.
(True/False)
4.9/5
(33)
What is a supply chain and why is it critical to understand that it needs to be secured?
(Essay)
4.8/5
(37)
An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.
(True/False)
4.8/5
(34)
Tightening security during the design and coding of an OS is called "locking."
(True/False)
4.7/5
(34)
What security standard was introduced in conjunction with UEFI?
(Multiple Choice)
4.9/5
(28)
Anti-virus products typically utilize what type of virus scanning analysis?
(Multiple Choice)
4.8/5
(35)
Explain the security advantages of "code signing" and "stored procedure"?
(Essay)
4.9/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)