Deck 9: Client and Application Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: Client and Application Security
1
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?
A)least functionality
B)whitelisting
C)blacklisting
D)function limiting
A)least functionality
B)whitelisting
C)blacklisting
D)function limiting
A
2
In the production stage the application is released to be used in its actual setting.
True
3
In Microsoft Windows,what type of templates are a collection of security configuration settings?
A)security
B)user
C)system
D)administrator
A)security
B)user
C)system
D)administrator
A
4
Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What type of filtering software divides email messages that have been received into two piles,spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What type of OS manages hardware and software on a client computer?
A)network OS
B)client OS
C)workstation OS
D)appliance OS
A)network OS
B)client OS
C)workstation OS
D)appliance OS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What U.S.government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?
A)RAIN
B)EMIF
C)TEMPEST
D)MaSec
A)RAIN
B)EMIF
C)TEMPEST
D)MaSec
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What security standard was introduced in conjunction with UEFI?
A)Unified Boot
B)BIOS
C)Secure Boot
D)Firmware Interface
A)Unified Boot
B)BIOS
C)Secure Boot
D)Firmware Interface
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A compiled code test is used to ensure that the projected application meets all specifications at that point
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )
A)Disabling unnecessary ports and services
B)Employing least functionality
C)Password auditing
D)Disabling default accounts/passwords
A)Disabling unnecessary ports and services
B)Employing least functionality
C)Password auditing
D)Disabling default accounts/passwords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Tightening security during the design and coding of an OS is called "locking."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The BIOS was software that was integrated into the computer's motherboard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
When securing a laptop,it can be placed in an office or a desk drawer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The testing stage is a "quality assurance" test to verify that the code functions as intended.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What type of OS in firmware is designed to manage a specific device like a video game console?
A)network OS
B)client OS
C)workstation OS
D)appliance OS
A)network OS
B)client OS
C)workstation OS
D)appliance OS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
A)feature pack
B)roll-up
C)service pack
D)patch
A)feature pack
B)roll-up
C)service pack
D)patch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Anti-virus products typically utilize what type of virus scanning analysis?
A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
A)mail gateway
B)firewall
C)router gateway
D)code emulation
A)mail gateway
B)firewall
C)router gateway
D)code emulation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What type of update does not allow a user to refuse or delay security updates?
A)preventative
B)forced
C)mandatory
D)security
A)preventative
B)forced
C)mandatory
D)security
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?
A)heuristic monitoring
B)pattern detection
C)hybrid monitoring
D)combination detection
A)heuristic monitoring
B)pattern detection
C)hybrid monitoring
D)combination detection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
A)anti-malware
B)antivirus
C)security applications
D)firewall
A)anti-malware
B)antivirus
C)security applications
D)firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which application development life-cycle model uses a sequential design process?
A)agile
B)linear
C)waterfall
D)serial
A)agile
B)linear
C)waterfall
D)serial
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A Wi-Fi enabled microSD card is an example of what type of device?
A)PCIe
B)mobile card
C)SDIO
D)Secure Digital
A)PCIe
B)mobile card
C)SDIO
D)Secure Digital
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is an AV heuristic monitoring technique?
A)code emulation
B)environment scanning
C)code monitoring
D)OS simulation
A)code emulation
B)environment scanning
C)code monitoring
D)OS simulation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which OS hardening technique removes all unnecessary features that may compromise an operating system?
A)least privilege
B)OS priority
C)kernel pruning
D)reduce capabilities
A)least privilege
B)OS priority
C)kernel pruning
D)reduce capabilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What type of storage is used on mobile devices?
A)volatile memory
B)ROM
C)RAM
D)flash memory
A)volatile memory
B)ROM
C)RAM
D)flash memory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What publicly released software security update is intended to repair a vulnerability?
A)update
B)service pack
C)patch
D)renewal
A)update
B)service pack
C)patch
D)renewal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is a popular type of removable data storage used on mobile devices?
A)SSD
B)SD
C)HDD
D)USB
A)SSD
B)SD
C)HDD
D)USB
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What software methodology includes security automation?
A)DevOps
B)Secure DevOps
C)Agile
D)Secure Agile
A)DevOps
B)Secure DevOps
C)Agile
D)Secure Agile
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What type of tools are involved in effective patch management? (Choose all that apply. )
A)patch verification
B)patch distribution
C)patch monitoring
D)patch reception
A)patch verification
B)patch distribution
C)patch monitoring
D)patch reception
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following are application development stages? (Choose all that apply. )
A)analysis
B)proofing
C)testing
D)staging
A)analysis
B)proofing
C)testing
D)staging
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Most portable devices,and some computer monitors have a special steel bracket security slot built into the case,which can be used in conjunction with a:
A)U-lock
B)safe lock
C)shield lock
D)cable lock
A)U-lock
B)safe lock
C)shield lock
D)cable lock
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
What specific process in application development removes a resource that is no longer needed?
A)deprovisioning
B)version control
C)change management
D)baselining
A)deprovisioning
B)version control
C)change management
D)baselining
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.What is the name for this technology?
A)bollard
B)fence
C)roller barrier
D)top hat
A)bollard
B)fence
C)roller barrier
D)top hat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?
A)CCTV
B)ICTV
C)IPTV
D)ITV
A)CCTV
B)ICTV
C)IPTV
D)ITV
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is a bollard?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a supply chain and why is it critical to understand that it needs to be secured?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is a multi-functional device (MFD)?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What are some of the advantages to an automated patch update service?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
How is the UEFI Secure Boot security standard designed to combat BIOS attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is provisioning?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe a mantrap.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
How can cable conduits that run between two secure areas be protected?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What type of package helps prevent computers from becoming infected by different types of spyware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain the security advantages of "code signing" and "stored procedure"?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck