Exam 9: Client and Application Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What type of OS manages hardware and software on a client computer?
(Multiple Choice)
4.9/5
(37)
Most portable devices,and some computer monitors have a special steel bracket security slot built into the case,which can be used in conjunction with a:
(Multiple Choice)
4.8/5
(40)
How is the UEFI Secure Boot security standard designed to combat BIOS attacks?
(Essay)
4.8/5
(30)
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.
(True/False)
4.9/5
(28)
What U.S.government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?
(Multiple Choice)
4.7/5
(23)
A Wi-Fi enabled microSD card is an example of what type of device?
(Multiple Choice)
4.9/5
(31)
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
(Multiple Choice)
5.0/5
(40)
What type of filtering software divides email messages that have been received into two piles,spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
(Multiple Choice)
4.8/5
(30)
Which of the following are application development stages? (Choose all that apply. )
(Multiple Choice)
4.9/5
(34)
Which application development life-cycle model uses a sequential design process?
(Multiple Choice)
4.8/5
(30)
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?
(Multiple Choice)
5.0/5
(32)
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
(Multiple Choice)
4.9/5
(37)
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.What is the name for this technology?
(Multiple Choice)
4.8/5
(37)
In Microsoft Windows,what type of templates are a collection of security configuration settings?
(Multiple Choice)
4.8/5
(35)
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
(Multiple Choice)
4.8/5
(35)
What type of tools are involved in effective patch management? (Choose all that apply. )
(Multiple Choice)
4.8/5
(29)
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
(Multiple Choice)
5.0/5
(39)
How can cable conduits that run between two secure areas be protected?
(Essay)
4.9/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)