cyber security chapter 9
Which of the following are characteristics of spyware?
Secretly collects information about users / Negatively affects
confidentiality / Negatively affects availably / Tracking cookies and browser history can be used by spyware / It is greyware
Which of the following is usually bundled as a hidden component of a freeware?
Spyware
Flash cookies are a type of
spyware. What are ways to
clean Flash cookies?
(Choose all that apply.)
Use a browser add-on / Disable
Adobe Flash / Anti-malware
programs
Viruses, botnets, social engineering, and drive-by-downloads and other methods used to attack a target are best described as which of the following?
Threat vectors
Which of the following is a form of delayed-execution virus?
Logic Bomb
Which of the choices were implemented to combat motherboard firmware infections caused by corrupted updates?
(Choose two)
UEFI, Secure Boot
Select the response that best identifies the method of using UEFI and Secure Boot to validate the first element of the boot process then validating each consecutive element before handing the hardware over to the operating system?
Chain of Trust
When securing a Windows OS in a corporate environment, which of the elements shown will quickly apply the desired security settings of a properly configured host to the target system?
Import security template
Which of the following choices describes
the process of testing updates and
patches before distributing them to your
organization in order to ensure stable operation?
Automated patch update service
System or device infections can be introduced during the manufacture or storage of the items. How is this described?
Supply chain infection
Which of the following is
NOT a typical OS security configuration?
Restricting patch management
Which of the following types of testing uses unexpected or invalid inputs?
Dynamic analysis
Which type of residential lock is most often used fo
keeping out intruders?
Keyed entry lock
Which of the following is
NOT an advantage to an automated patch update service?
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
Which of the following is
NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
Barricade
Which stage is a "quality assurance" test that verifies the code functions as intended?
Staging stage
Which of the following is
NOT a motion detection method?
Moisture
Which of the following is a cumulative package of all patches?
Service pack
Which type of operating system runs on a firewall, router, or switch?
Network OS
Which of the following can be used to secure a laptop or mobile device?
Cable lock
How can an SDIO card be made secure?
Using the security mechanisms on a standard Wi-Fi network.
Which statement about a mantrap is true?
It monitors and controls two interlocking doors to a room.
Which model uses a
sequential design process?
Waterfall model
Which of the following is
NOT a characteristic of an alarmed carrier PDS?
Requires periodic visual inspections
A lock that extends a solid metal bar into the door frame for extra security is the?
deadbolt lock
How does heuristic detection detect a virus?
The bytes of a virus are placed in different "piles" and then used to create a profile.
Which of the following is
NOT a memory vulnerability?
Variable overflow
What allows for a single configuration to be set and then deployed to many or all users?
Group Policy
Which of these is a list of approved email senders?
Whitelist
Which of the following is
NOT a reason why supply chain infections are considered especially dangerous?
Supply chains take advantage of the trusted "chain of trust" concept.
How does heuristic detection detect a virus?
A virtualized environment is created and the code is executed in it.