Deck 4: Host, Application, and Data Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 4: Host, Application, and Data Security
1
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
A
2
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
A)CCTV
B)ICTV
C)IPTV
D)ITV
A)CCTV
B)ICTV
C)IPTV
D)ITV
A
3
What is the maximum effective range of a typical passive RFID tag?
A)12
B)15
C)19
D)25
A)12
B)15
C)19
D)25
C
4
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:
A)U-lock
B)safe lock
C)shield lock
D)cable lock
A)U-lock
B)safe lock
C)shield lock
D)cable lock
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?
A)Remote Read Tag (RRT)
B)Radio Frequency Identification tag (RFID)
C)Barcode tag (BT)
D)Magnetic tag (MT)
A)Remote Read Tag (RRT)
B)Radio Frequency Identification tag (RFID)
C)Barcode tag (BT)
D)Magnetic tag (MT)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
DLP agent sensors are installed on each host device, and monitor for actions such as printing, copying to a USB flash drive, and burning to a CD or DVD.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:
A)Information Detection System
B)Automated Data Policy
C)Local Loss Prevention
D)Data Loss Prevention
A)Information Detection System
B)Automated Data Policy
C)Local Loss Prevention
D)Data Loss Prevention
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?
A)IPS
B)scanner
C)firewall
D)honeypot
A)IPS
B)scanner
C)firewall
D)honeypot
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?
A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is the best way to prevent data input by a user from having potentially malicious effects on software?
A)Client-side validation
B)Server-side validation
C)Escaping user responses
D)SQL validation
A)Client-side validation
B)Server-side validation
C)Escaping user responses
D)SQL validation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?
A)Lockout sensors
B)Engineering sensors
C)Tailgate sensors
D)Proximity sensors
A)Lockout sensors
B)Engineering sensors
C)Tailgate sensors
D)Proximity sensors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?
A)heuristic detection
B)pattern detection
C)hybrid detection
D)combination detection
A)heuristic detection
B)pattern detection
C)hybrid detection
D)combination detection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
A)Mainframe
B)Integrated system
C)Embedded system
D)Internal system
A)Mainframe
B)Integrated system
C)Embedded system
D)Internal system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
DLP agent sensors are unable to read inside compressed files and binary files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?
A)Account policies
B)User rights
C)System services
D)Resolution settings
A)Account policies
B)User rights
C)System services
D)Resolution settings
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
A)bollard
B)fence
C)roller barrier
D)top hat
A)bollard
B)fence
C)roller barrier
D)top hat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Most DLP systems make use of what method of security analysis below?
A)Content aggregation
B)Content inspection
C)Content delivery
D)Content management
A)Content aggregation
B)Content inspection
C)Content delivery
D)Content management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
An attack that uses the user's web browser settings to impersonate the user
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
An attack that uses the user's web browser settings to impersonate the user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
An operating system for Google Android smartphones and other devices.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
An operating system for Google Android smartphones and other devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
A)logical token
B)physical sensor
C)physical token
D)hybrid sensor
A)logical token
B)physical sensor
C)physical token
D)hybrid sensor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
A)feature pack
B)roll-up
C)service pack
D)patch
A)feature pack
B)roll-up
C)service pack
D)patch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ locks keep a record of when the door was opened and by which code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
Match the following terms to the appropriate definitions.
Match the following terms to the appropriate definitions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Anti-virus products typically utilize what type of virus scanning analysis?
A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Large-scale, industrial control systems.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Large-scale, industrial control systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A structure designed to block the passage of traffic
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A structure designed to block the passage of traffic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A mobile operating system for Apple iPhones
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A mobile operating system for Apple iPhones
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
A)reference
B)baseline
C)profile
D)minimum
A)reference
B)baseline
C)profile
D)minimum
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A nonrelational database that is better tuned for accessing large data sets.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A nonrelational database that is better tuned for accessing large data sets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the five steps that can be used to ensure the security of an OS?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe a mantrap.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the three states of data that DLP typically examines?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How does DLP index matching work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe how a DLP can be configured.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What can be a time consuming drawback to the use of traditional ID badges? How can this issue be avoided?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does an RFID tag embedded into an ID badge function without a power supply?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is the difference between deterrent controls and preventive controls?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How can cable conduits that run between two secure areas be protected?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain how tailgate sensors work.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck