Deck 9: Client and Application Security

ملء الشاشة (f)
exit full mode
سؤال
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

A)least functionality
B)whitelisting
C)blacklisting
D)function limiting
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In the production stage the application is released to be used in its actual setting.
سؤال
In Microsoft Windows,what type of templates are a collection of security configuration settings?

A)security
B)user
C)system
D)administrator
سؤال
Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.
سؤال
What type of filtering software divides email messages that have been received into two piles,spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?

A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
سؤال
What type of OS manages hardware and software on a client computer?

A)network OS
B)client OS
C)workstation OS
D)appliance OS
سؤال
What U.S.government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

A)RAIN
B)EMIF
C)TEMPEST
D)MaSec
سؤال
What security standard was introduced in conjunction with UEFI?

A)Unified Boot
B)BIOS
C)Secure Boot
D)Firmware Interface
سؤال
A compiled code test is used to ensure that the projected application meets all specifications at that point
سؤال
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )

A)Disabling unnecessary ports and services
B)Employing least functionality
C)Password auditing
D)Disabling default accounts/passwords
سؤال
An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.
سؤال
Tightening security during the design and coding of an OS is called "locking."
سؤال
The BIOS was software that was integrated into the computer's motherboard.
سؤال
When securing a laptop,it can be placed in an office or a desk drawer.
سؤال
The testing stage is a "quality assurance" test to verify that the code functions as intended.
سؤال
What type of OS in firmware is designed to manage a specific device like a video game console?

A)network OS
B)client OS
C)workstation OS
D)appliance OS
سؤال
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

A)feature pack
B)roll-up
C)service pack
D)patch
سؤال
One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
سؤال
Anti-virus products typically utilize what type of virus scanning analysis?

A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
سؤال
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.
سؤال
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

A)mail gateway
B)firewall
C)router gateway
D)code emulation
سؤال
What type of update does not allow a user to refuse or delay security updates?

A)preventative
B)forced
C)mandatory
D)security
سؤال
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?

A)heuristic monitoring
B)pattern detection
C)hybrid monitoring
D)combination detection
سؤال
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

A)anti-malware
B)antivirus
C)security applications
D)firewall
سؤال
Which application development life-cycle model uses a sequential design process?

A)agile
B)linear
C)waterfall
D)serial
سؤال
A Wi-Fi enabled microSD card is an example of what type of device?

A)PCIe
B)mobile card
C)SDIO
D)Secure Digital
سؤال
How can an area be made secure from a non-secured area via two interlocking doors to a small room?

A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
سؤال
Which of the following is an AV heuristic monitoring technique?

A)code emulation
B)environment scanning
C)code monitoring
D)OS simulation
سؤال
Which OS hardening technique removes all unnecessary features that may compromise an operating system?

A)least privilege
B)OS priority
C)kernel pruning
D)reduce capabilities
سؤال
What type of storage is used on mobile devices?

A)volatile memory
B)ROM
C)RAM
D)flash memory
سؤال
What publicly released software security update is intended to repair a vulnerability?

A)update
B)service pack
C)patch
D)renewal
سؤال
Which of the following is a popular type of removable data storage used on mobile devices?

A)SSD
B)SD
C)HDD
D)USB
سؤال
What software methodology includes security automation?

A)DevOps
B)Secure DevOps
C)Agile
D)Secure Agile
سؤال
What type of tools are involved in effective patch management? (Choose all that apply. )

A)patch verification
B)patch distribution
C)patch monitoring
D)patch reception
سؤال
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
سؤال
Which of the following are application development stages? (Choose all that apply. )

A)analysis
B)proofing
C)testing
D)staging
سؤال
Most portable devices,and some computer monitors have a special steel bracket security slot built into the case,which can be used in conjunction with a:

A)U-lock
B)safe lock
C)shield lock
D)cable lock
سؤال
What specific process in application development removes a resource that is no longer needed?

A)deprovisioning
B)version control
C)change management
D)baselining
سؤال
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.What is the name for this technology?

A)bollard
B)fence
C)roller barrier
D)top hat
سؤال
What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?

A)CCTV
B)ICTV
C)IPTV
D)ITV
سؤال
What is a bollard?
سؤال
What is a supply chain and why is it critical to understand that it needs to be secured?
سؤال
What is a multi-functional device (MFD)?
سؤال
What are some of the advantages to an automated patch update service?
سؤال
How is the UEFI Secure Boot security standard designed to combat BIOS attacks?
سؤال
What is provisioning?
سؤال
Describe a mantrap.
سؤال
How can cable conduits that run between two secure areas be protected?
سؤال
What type of package helps prevent computers from becoming infected by different types of spyware?
سؤال
Explain the security advantages of "code signing" and "stored procedure"?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Client and Application Security
1
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

A)least functionality
B)whitelisting
C)blacklisting
D)function limiting
A
2
In the production stage the application is released to be used in its actual setting.
True
3
In Microsoft Windows,what type of templates are a collection of security configuration settings?

A)security
B)user
C)system
D)administrator
A
4
Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What type of filtering software divides email messages that have been received into two piles,spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?

A)Blacklist filtering
B)Whitelist filtering
C)Bayesian filtering
D)Extension filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What type of OS manages hardware and software on a client computer?

A)network OS
B)client OS
C)workstation OS
D)appliance OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What U.S.government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

A)RAIN
B)EMIF
C)TEMPEST
D)MaSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What security standard was introduced in conjunction with UEFI?

A)Unified Boot
B)BIOS
C)Secure Boot
D)Firmware Interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
A compiled code test is used to ensure that the projected application meets all specifications at that point
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )

A)Disabling unnecessary ports and services
B)Employing least functionality
C)Password auditing
D)Disabling default accounts/passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Tightening security during the design and coding of an OS is called "locking."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The BIOS was software that was integrated into the computer's motherboard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
When securing a laptop,it can be placed in an office or a desk drawer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
The testing stage is a "quality assurance" test to verify that the code functions as intended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What type of OS in firmware is designed to manage a specific device like a video game console?

A)network OS
B)client OS
C)workstation OS
D)appliance OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

A)feature pack
B)roll-up
C)service pack
D)patch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Anti-virus products typically utilize what type of virus scanning analysis?

A)Static analysis
B)Wildcard scanning analysis
C)Heuristic detection analysis
D)String scanning analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

A)mail gateway
B)firewall
C)router gateway
D)code emulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What type of update does not allow a user to refuse or delay security updates?

A)preventative
B)forced
C)mandatory
D)security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?

A)heuristic monitoring
B)pattern detection
C)hybrid monitoring
D)combination detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

A)anti-malware
B)antivirus
C)security applications
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which application development life-cycle model uses a sequential design process?

A)agile
B)linear
C)waterfall
D)serial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
A Wi-Fi enabled microSD card is an example of what type of device?

A)PCIe
B)mobile card
C)SDIO
D)Secure Digital
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
How can an area be made secure from a non-secured area via two interlocking doors to a small room?

A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is an AV heuristic monitoring technique?

A)code emulation
B)environment scanning
C)code monitoring
D)OS simulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which OS hardening technique removes all unnecessary features that may compromise an operating system?

A)least privilege
B)OS priority
C)kernel pruning
D)reduce capabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What type of storage is used on mobile devices?

A)volatile memory
B)ROM
C)RAM
D)flash memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What publicly released software security update is intended to repair a vulnerability?

A)update
B)service pack
C)patch
D)renewal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a popular type of removable data storage used on mobile devices?

A)SSD
B)SD
C)HDD
D)USB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What software methodology includes security automation?

A)DevOps
B)Secure DevOps
C)Agile
D)Secure Agile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What type of tools are involved in effective patch management? (Choose all that apply. )

A)patch verification
B)patch distribution
C)patch monitoring
D)patch reception
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following are application development stages? (Choose all that apply. )

A)analysis
B)proofing
C)testing
D)staging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Most portable devices,and some computer monitors have a special steel bracket security slot built into the case,which can be used in conjunction with a:

A)U-lock
B)safe lock
C)shield lock
D)cable lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What specific process in application development removes a resource that is no longer needed?

A)deprovisioning
B)version control
C)change management
D)baselining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.What is the name for this technology?

A)bollard
B)fence
C)roller barrier
D)top hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?

A)CCTV
B)ICTV
C)IPTV
D)ITV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a bollard?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a supply chain and why is it critical to understand that it needs to be secured?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is a multi-functional device (MFD)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are some of the advantages to an automated patch update service?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
How is the UEFI Secure Boot security standard designed to combat BIOS attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is provisioning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe a mantrap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
How can cable conduits that run between two secure areas be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What type of package helps prevent computers from becoming infected by different types of spyware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain the security advantages of "code signing" and "stored procedure"?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.