What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
  • Firewall
  • Bayesian filtering
  • CCTV
  • True
An operating system for Google Android smartphones and other devices.
  • noSQL
  • barricade
  • android
  • iOS
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?
  • Firewall
  • Baseline
  • Bayesian filtering
  • CCTV
A mobile operating system for Apple iPhones.
  • iOS
  • barricade
  • android
  • noSQL
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
  • Bayesian filtering
  • access list
  • roller barrier
  • physical token
DLP agent sensors are unable to read inside compressed files and binary files.​
  • True
  • False
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
  • android
  • Resolution settings
  • XSRF - cross-site request forgery
  • Embedded system
What is the maximum effective range of a typical passive RFID tag?
  • ​Escaping user responses
  • 19
  • service pack
  • Baseline
Anti-virus products typically utilize what type of virus scanning analysis?​
  • Using a mantrap
  • ​Static analysis
  • Tailgate sensors
  • service pack
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
  • physical token
  • Bayesian filtering
  • roller barrier
  • heuristic detection
A nonrelational database that is better tuned for accessing large data sets.
  • Baseline
  • Anti-climb
  • False
  • noSQL
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
  • Using a mantrap
  • ​Escaping user responses
  • service pack
  • Tailgate sensors
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective..
  • service pack
  • Tailgate sensors
  • activity phase controls
  • ​Escaping user responses
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a
  • Baseline
  • service pack
  • cable lock
  • access list
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?
  • Data Loss Prevention
  • Bayesian filtering
  • physical token
  • heuristic detection
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?
  • Embedded system
  • service pack
  • Resolution settings
  • ​Escaping user responses
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
  • True
  • False
Large-scale, industrial control systems.
  • ​Escaping user responses
  • False
  • SCADA supervisory control and data acquisition
  • ​Static analysis
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
  • ​Escaping user responses
  • service pack
  • Firewall
  • Baseline
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
  • Firewall
  • access list
  • Anti-climb
  • cable lock
An attack that uses the user's web browser settings to impersonate the user
  • Resolution settings
  • android
  • Embedded system
  • XSRF - cross-site request forgery
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:
  • Bayesian filtering
  • heuristic detection
  • ​Escaping user responses
  • Data Loss Prevention
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0