Ovido
Taal
  • Engels
  • Spaans
  • Frans
  • Portugees
  • Duits
  • Italiaans
  • Nederlands
  • Zweeds
Tekst
  • Hoofdletters

Gebruiker

  • Inloggen
  • Account aanmaken
  • Upgrade naar Premium
Ovido
  • Startpagina
  • Inloggen
  • Account aanmaken

cyber security chapter 9

Which of the following are characteristics of spyware?

Secretly collects information about users / Negatively affects
confidentiality / Negatively affects availably / Tracking cookies and browser history can be used by spyware / It is greyware

Which of the following is usually bundled as a hidden component of a freeware?

Spyware

Flash cookies are a type of

spyware. What are ways to


clean Flash cookies?

(Choose all that apply.)

Use a browser add-on / Disable


Adobe Flash / Anti-malware

programs

Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?

Threat vectors

Which of the following is a form of delayed-execution virus?

Logic Bomb

Which of the choices were implemented to combat motherboard firmware infections caused by corrupted updates?
(Choose two)

UEFI, Secure Boot

Select the response that best identifies the method of using UEFI and Secure Boot to validate the first element of the boot process then validating each consecutive element before handing the hardware over to the operating system?

Chain of Trust

When securing a Windows OS in a corporate environment, which of the elements shown will quickly apply the desired security settings of a properly configured host to the target system?

Import security template

Which of the following choices describes
the process of testing updates and

patches before distributing them to your

organization in order to ensure stable operation?

Automated patch update service

System or device infections can be introduced during the manufacture or storage of the items. How is this described?

Supply chain infection

Which of the following is
NOT a typical OS security configuration?

Restricting patch management

Which of the following types of testing uses unexpected or invalid inputs?

Dynamic analysis

Which type of residential lock is most often used fo
keeping out intruders?

Keyed entry lock

Which of the following is
NOT an advantage to an automated patch update service?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Which of the following is
NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

Barricade

Which stage is a "quality assurance" test that verifies the code functions as intended?

Staging stage

Which of the following is
NOT a motion detection method?

Moisture

Which of the following is a cumulative package of all patches?

Service pack

Which type of operating system runs on a firewall, router, or switch?

Network OS

Which of the following can be used to secure a laptop or mobile device?

Cable lock

How can an SDIO card be made secure?

Using the security mechanisms on a standard Wi-Fi network.

Which statement about a mantrap is true?

It monitors and controls two interlocking doors to a room.

Which model uses a
sequential design process?

Waterfall model

Which of the following is
NOT a characteristic of an alarmed carrier PDS?

Requires periodic visual inspections

A lock that extends a solid metal bar into the door frame for extra security is the?

deadbolt lock

How does heuristic detection detect a virus?

The bytes of a virus are placed in different "piles" and then used to create a profile.

Which of the following is
NOT a memory vulnerability?

Variable overflow

What allows for a single configuration to be set and then deployed to many or all users?

Group Policy

Which of these is a list of approved email senders?

Whitelist

Which of the following is
NOT a reason why supply chain infections are considered especially dangerous?

Supply chains take advantage of the trusted "chain of trust" concept.

How does heuristic detection detect a virus?

A virtualized environment is created and the code is executed in it.

Quiz
farmacocinética aplicadaa odonto
biologi prov genetik
Anthro week 10-11
Matemática Financeira
préposition des verbes
Koine Greek Ch. 25 Imperative Mood
English
Noções de Probabilidade e Estatística
vocabulary 1
Anglais
집 🏠🛋️🪑
교실 👩‍🏫📚📝
módulo 1 B
BABY BOOMERS
Fatores bioticos e abioticos
digestão
Biologi
Engels Unit 3 Vocabulairy 3.1 t/m 3.4 + Phrases - copy
Spaans: Zomervakantie
attack on the queen
vicab
ss
Hur Sverige styrs
Ethics
GSS35L
Osteoporose
gs
hl bio test pt. 2
communicazione interculturale UD 2
bio hl test -- dna
L2 S2 : Relations internationales
history
hp morfem + suffix
Biologia 5
Teste de inglês
Comportamento do consumidor
Laís
Teste de história
help
SRA Principles
indicateurs de temps
féminin ou masculin
Discours direct et indirect
Hypothèses
redes urbanas
définition stss
english
Modalities Week 9-11 Flashcards
biggest countries in the world
upper flags of us