What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?

Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?

Question options:

Lockout sensors

Engineering sensors

Tailgate sensors

Proximity sensors

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Question options:

logical token

physical sensor

physical token

hybrid sensor

Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?

Question options:

Remote Read Tag (RRT)

Radio Frequency Identification tag (RFID)

Barcode tag (BT)

Magnetic tag (MT)

Radio Frequency Identification tag (RFID)

What is the maximum effective range of a typical passive RFID tag?

Question options:

12

15

19

25

How can an area be made secure from a non-secured area via two interlocking doors to a small room?

Question options:

Using a lockout

Using a mantrap

Using a closet

Using a pit

What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
A) CCTV
B) ICTC
C) IPTV
D) ITV

Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:

Question options:

U-lock

safe lock

shield lock

cable lock

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
A) Anti-climb
B) Spiked barrier
C) Roller barrier
D) Rotating spikes

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

Question options:

bollard

fence

roller barrier

top hat

What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?

Question options:

reference

baseline

profile

minimum

Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?

Question options:

Account policies

User rights

System services

Resolution settings

What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?

Question options:

feature pack

roll-up

service pack

patch

Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name of this technique?
A) heuristic detection
B) pattern detection
C) hybrid detection
D) combination detection

What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?

Question options:

IPS

scanner

firewall

honeypot

Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:

Question options:

Information Detection System

Automated Data Policy

Local Loss Prevention

Data Loss Prevention

Most DLP systems make use of what method of security analysis below?

Question options:

Content aggregation

Content inspection

Content delivery

Content management

Anti-virus products typically utilize what type of virus scanning analysis?
A) Static analysis
B) Wildcard scanning analysis
C) Heuristic detection analysis
D) String scanning analysis

​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?

Question options:

​Blacklist filtering

​Whitelist filtering

​Bayesian filtering

​Extension filtering

A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:

Question options:

​Mainframe

​Integrated system

​Embedded system

​Internal system

What is the best way to prevent data input by a user from having potentially malicious effects on software?​

Question options:

​Client-side validation

​Server-side validation

​Escaping user responses

​SQL validation

What type of software update is a cumulative package of all patches and feature updates?

Service pack A tested, cumulative set of all hotfixes, security updates, critical updates, and updates. Additionally, service packs may contain additional fixes for problems that are found internally since the release of the product.

What is the difference between a hotfix and a service pack quizlet?

What is the difference between a hotfix and a service pack? A Hotfix is an operating system patch that fixes bugs and other vulnerabilities in the software. A service pack is a collection of hotfixes and other system enhancements.

Which program is always updated on Patch Tuesday?

Patch Tuesday is the name given to the day each month that Microsoft releases security and other patches for their operating systems and other software. Patch Tuesday is always the second Tuesday of each month and more recently is being referred to as Update Tuesday.

What type of device is designed to prevent malicious network packets from entering or leaving computers or networks?

What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks? An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it.

Toplist

Neuester Beitrag

Stichworte