A
B
C
D
E
100

A-What type of OS runs on a client computer?

B-What type of OS runs on a server?

C-What type of OS runs on a network device such as a router or firewall?

D-What type of OS runs on a specific device such as a digital camera or video game console?

A-Workstation OS

B-Server OS

C-Network OS

D-Appliance OS

100

Anti-virus products typically utilize what type of virus scanning analysis? (think signatures/definitions)

Static Analysis

NOTE - Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.

100

What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

Antivirus

100

A-Which AV approach (often called dynamic analysis) uses a variety of techniques to spot the characteristics of a virus instead of attempting to make signature matches?

B-One specific technique the above type of monitoring uses is to create a virtual layer to simulate the CPU and Memory of the computer. This is called?

A-Heuristic Monitoring

B-Code Emulation

100

What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

TEMPEST

200

Name each of the 4 application development stages:

A-Requirements gathering to ensure the application meets business needs?

B-Testing for errors that could result in a security vulnerability?

C-"Quality assurance" testing to verify that the code functions as intended?

D-Product released to be used in it's actual setting?

A-Development Stage

B-Testing Stage

C-Staging Stage

D-Production Stage

200

A-A security update specifically intended to address a known security vulnerability is called what?

B-A cumulative update of all previous updates?

A-Patch

B-Service Pack

200

A-A spiked collar that extends horizontally for up to 3 feet from a pole would be an example of what?

B-An independently rotating large cup affixed to the top of a fence and prevents the hands of intruders from gripping the top of a fence to climb over it is an example of what?

A-Anti-climb Collar

B-Roller Barrier

200

A mail gateway (antispam) monitors emails for spam and other unwanted content to prevent these messages from being delivered. One type that divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile is using what type of filtering?

Bayesian Filtering

200

What software methodology includes security automation?

Secure DevOps

300

SDIO is an example of a microSD card with what additional feature\capability?

Wi-Fi

300

A-______ code testing is looking specifically for things like programming language or syntax errors that could prevent the code from compiling.

B-______ code testing looks for errors after the code has compiled, such as memory leaks.

A-Compiled Code Testing

B-Runtime Code Testing

300

Most common video surveillance used by banks, casinos, airports, and military installations?

CCTV

300

Effective patch management systems must address ______ and ______.

Patch Distribution (How patches are pushed out) and Patch Reception (how clients receive and install patches)

300

A-What software methodology includes security automation?

B-Instead of following a rigid, sequential design, this software methodology follows an incremental approach with shorter duration iterations called "sprints".

A-Waterfall

B-Agile

400

In Microsoft Windows, a ______ template is used to manipulate security configuration settings.

Security Template

400

To combat BIOS was a chip (hardware) integrated on the motherboard but was subject to attacks. To address attacks and add functionality a new mechanism was developed to replace BIOS with ______. In conjunction, the ______ security standard was also created.

UEFI (Unified Extensible Firmware Interface) and Secure Boot

400

Securing an area from a non-secured area via two interlocking doors to a small room is referred to as what?

Mantrap

400

One tool for change management, called ______, allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.

Version Control Software

400

A typical OS security configuration should include these 4 things:

1. Disabling unnecessary ports and services 

2. Disabling default accounts/passwords 

3. Employing least functionality

4. Application whitelisting/blacklisting

500

A-Tightening security during the design and coding of an OS is called?

B-One specific such technique involves removing all unnecessary features that may compromise an operating system?

A-OS Hardening

B-Kernel Pruning

500

A record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area is known as what?

Access Log

500

Specifically in application development removes a resource that is no longer needed is known as?

Deprovisioning

500

In Windows 10, a type of update that does not allow a user to refuse or delay the installation is known as what?

Forced Update

500

A-Mobile devices usually use ______ memory for storage.

B-The most popular type of removable storage used on mobile devices?

A-Flash Memory

B-SD (SD Card)

M
e
n
u