nsf_05(4)

Description

host, application, and data security
865 538
Quiz by 865 538, updated more than 1 year ago
865 538
Created by 865 538 almost 8 years ago
33
0

Resource summary

Question 1

Question
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
Answer
  • a. shield lock
  • b. U-lock
  • c. safe lock
  • d. cable lock

Question 2

Question
A ____ is designed to separate a non-secured area from a secured area.
Answer
  • a. pit
  • b. mantrap
  • c. closet
  • d. lockout

Question 3

Question
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Answer
  • a. DLP agent
  • b. DLP control
  • c. DLP cipher
  • d. DLP manager

Question 4

Question
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
Answer
  • a. heuristic detection
  • b. hybrid detection
  • c. combination detection
  • d. pattern detection

Question 5

Question
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Answer
  • a. ADP
  • b. DLP
  • c. LLP
  • d. IDS

Question 6

Question
Cipher locks are the same as combination padlocks.
Answer
  • True
  • False

Question 7

Question
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Answer
  • True
  • False

Question 8

Question
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Answer
  • True
  • False

Question 9

Question
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Answer
  • a. firewall
  • b. honeypot
  • c. IPS
  • d. scanner

Question 10

Question
In Microsoft Windows, a ____ is a collection of security configuration settings.
Answer
  • a. security summary
  • b. security template
  • c. security baseline
  • d. security reference
Show full summary Hide full summary

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_06(7)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
AQA A2 Biology Unit 4: Populations
Charlotte Lloyd