865 538
Quiz by , created more than 1 year ago

host, application, and data security

30
0
0
865 538
Created by 865 538 about 7 years ago
Close

nsf_05(4)

Question 1 of 10

1

A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.

Select one of the following:

  • a. shield lock

  • b. U-lock

  • c. safe lock

  • d. cable lock

Explanation

Question 2 of 10

1

A ____ is designed to separate a non-secured area from a secured area.

Select one of the following:

  • a. pit

  • b. mantrap

  • c. closet

  • d. lockout

Explanation

Question 3 of 10

1

Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.

Select one of the following:

  • a. DLP agent

  • b. DLP control

  • c. DLP cipher

  • d. DLP manager

Explanation

Question 4 of 10

1

In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.

Select one of the following:

  • a. heuristic detection

  • b. hybrid detection

  • c. combination detection

  • d. pattern detection

Explanation

Question 5 of 10

1

____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

Select one of the following:

  • a. ADP

  • b. DLP

  • c. LLP

  • d. IDS

Explanation

Question 6 of 10

1

Cipher locks are the same as combination padlocks.

Select one of the following:

  • True
  • False

Explanation

Question 7 of 10

1

Keyed entry locks are much more difficult to defeat than deadbolt locks.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 10

1

Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 10

1

A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.

Select one of the following:

  • a. firewall

  • b. honeypot

  • c. IPS

  • d. scanner

Explanation

Question 10 of 10

1

In Microsoft Windows, a ____ is a collection of security configuration settings.

Select one of the following:

  • a. security summary

  • b. security template

  • c. security baseline

  • d. security reference

Explanation