Filters
Question type

Study Flashcards

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?


A) Anti-climb
B) Spiked barrier
C) Roller barrier
D) Rotating spikes

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective.​


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) B) and E)
L) A) and I)

Correct Answer

verifed

verified

B

Match the following terms to the appropriate definitions. -​Large-scale, industrial control systems.


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) A) and F)
L) A) and H)

Correct Answer

verifed

verified

What are the five steps that can be used to ensure the security of an OS?​

Correct Answer

verifed

verified

​1. Develop the security polic...

View Answer

What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?


A) CCTV
B) ICTV
C) IPTV
D) ITV

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?


A) Account policies
B) User rights
C) System services
D) Resolution settings

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Anti-virus products typically utilize what type of virus scanning analysis?​


A) ​Static analysis
B) ​Wildcard scanning analysis
C) ​Heuristic detection analysis
D) ​String scanning​ analysis

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture) ?


A) reference
B) baseline
C) profile
D) minimum

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?


A) ​Blacklist filtering
B) ​Whitelist filtering
C) ​Bayesian filtering
D) ​Extension filtering

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What are the three states of data that DLP typically examines?

Correct Answer

verifed

verified

DLP typically examines data as it reside...

View Answer

Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.

A) True
B) False

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A structure designed to block the passage of traffic​


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) B) and H)
L) D) and F)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -A mobile operating system for Apple iPhones​


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) I) and J)
L) B) and C)

Correct Answer

verifed

verified

DLP agent sensors are unable to read inside compressed files and binary files.​

A) True
B) False

Correct Answer

verifed

verified

False

Match the following terms to the appropriate definitions. -​A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) F) and J)
L) F) and I)

Correct Answer

verifed

verified

Keyed entry locks are much more difficult to defeat than deadbolt locks.

A) True
B) False

Correct Answer

verifed

verified

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?


A) bollard
B) fence
C) roller barrier
D) top hat

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

C

Match the following terms to the appropriate definitions. -​A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

K) B) and H)
L) C) and H)

Correct Answer

verifed

verified

____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb. ​Match the following terms to the appropriate definitions.​

Correct Answer

verifed

verified

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?


A) logical token
B) physical sensor
C) physical token
D) hybrid sensor

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer