MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Security Chapter 4 Quiz
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
Report Question
0%
Firewall
0%
Bayesian filtering
0%
CCTV
0%
True
An operating system for Google Android smartphones and other devices.
Report Question
0%
noSQL
0%
barricade
0%
android
0%
iOS
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?
Report Question
0%
Firewall
0%
Baseline
0%
Bayesian filtering
0%
CCTV
A mobile operating system for Apple iPhones.
Report Question
0%
iOS
0%
barricade
0%
android
0%
noSQL
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
Report Question
0%
Bayesian filtering
0%
access list
0%
roller barrier
0%
physical token
DLP agent sensors are unable to read inside compressed files and binary files.
Report Question
0%
True
0%
False
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
Report Question
0%
android
0%
Resolution settings
0%
XSRF - cross-site request forgery
0%
Embedded system
What is the maximum effective range of a typical passive RFID tag?
Report Question
0%
Escaping user responses
0%
19
0%
service pack
0%
Baseline
Anti-virus products typically utilize what type of virus scanning analysis?
Report Question
0%
Using a mantrap
0%
Static analysis
0%
Tailgate sensors
0%
service pack
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
Report Question
0%
physical token
0%
Bayesian filtering
0%
roller barrier
0%
heuristic detection
A nonrelational database that is better tuned for accessing large data sets.
Report Question
0%
Baseline
0%
Anti-climb
0%
False
0%
noSQL
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Report Question
0%
Using a mantrap
0%
Escaping user responses
0%
service pack
0%
Tailgate sensors
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective..
Report Question
0%
service pack
0%
Tailgate sensors
0%
activity phase controls
0%
Escaping user responses
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a
Report Question
0%
Baseline
0%
service pack
0%
cable lock
0%
access list
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?
Report Question
0%
Data Loss Prevention
0%
Bayesian filtering
0%
physical token
0%
heuristic detection
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?
Report Question
0%
Embedded system
0%
service pack
0%
Resolution settings
0%
Escaping user responses
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Report Question
0%
True
0%
False
Large-scale, industrial control systems.
Report Question
0%
Escaping user responses
0%
False
0%
SCADA supervisory control and data acquisition
0%
Static analysis
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
Report Question
0%
Escaping user responses
0%
service pack
0%
Firewall
0%
Baseline
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
Report Question
0%
Firewall
0%
access list
0%
Anti-climb
0%
cable lock
An attack that uses the user's web browser settings to impersonate the user
Report Question
0%
Resolution settings
0%
android
0%
Embedded system
0%
XSRF - cross-site request forgery
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:
Report Question
0%
Bayesian filtering
0%
heuristic detection
0%
Escaping user responses
0%
Data Loss Prevention
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page