A-What type of OS runs on a client computer?
B-What type of OS runs on a server?
C-What type of OS runs on a network device such as a router or firewall?
D-What type of OS runs on a specific device such as a digital camera or video game console?
A-Workstation OS
B-Server OS
C-Network OS
D-Appliance OS
Anti-virus products typically utilize what type of virus scanning analysis? (think signatures/definitions)
Static Analysis
NOTE - Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
Antivirus
A-Which AV approach (often called dynamic analysis) uses a variety of techniques to spot the characteristics of a virus instead of attempting to make signature matches?
B-One specific technique the above type of monitoring uses is to create a virtual layer to simulate the CPU and Memory of the computer. This is called?
A-Heuristic Monitoring
B-Code Emulation
What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?
TEMPEST
Name each of the 4 application development stages:
A-Requirements gathering to ensure the application meets business needs?
B-Testing for errors that could result in a security vulnerability?
C-"Quality assurance" testing to verify that the code functions as intended?
D-Product released to be used in it's actual setting?
A-Development Stage
B-Testing Stage
C-Staging Stage
D-Production Stage
A-A security update specifically intended to address a known security vulnerability is called what?
B-A cumulative update of all previous updates?
A-Patch
B-Service Pack
A-A spiked collar that extends horizontally for up to 3 feet from a pole would be an example of what?
B-An independently rotating large cup affixed to the top of a fence and prevents the hands of intruders from gripping the top of a fence to climb over it is an example of what?
A-Anti-climb Collar
B-Roller Barrier
A mail gateway (antispam) monitors emails for spam and other unwanted content to prevent these messages from being delivered. One type that divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile is using what type of filtering?
Bayesian Filtering
What software methodology includes security automation?
Secure DevOps
SDIO is an example of a microSD card with what additional feature\capability?
Wi-Fi
A-______ code testing is looking specifically for things like programming language or syntax errors that could prevent the code from compiling.
B-______ code testing looks for errors after the code has compiled, such as memory leaks.
A-Compiled Code Testing
B-Runtime Code Testing
Most common video surveillance used by banks, casinos, airports, and military installations?
CCTV
Effective patch management systems must address ______ and ______.
Patch Distribution (How patches are pushed out) and Patch Reception (how clients receive and install patches)
A-What software methodology includes security automation?
B-Instead of following a rigid, sequential design, this software methodology follows an incremental approach with shorter duration iterations called "sprints".
A-Waterfall
B-Agile
In Microsoft Windows, a ______ template is used to manipulate security configuration settings.
Security Template
To combat BIOS was a chip (hardware) integrated on the motherboard but was subject to attacks. To address attacks and add functionality a new mechanism was developed to replace BIOS with ______. In conjunction, the ______ security standard was also created.
UEFI (Unified Extensible Firmware Interface) and Secure Boot
Securing an area from a non-secured area via two interlocking doors to a small room is referred to as what?
Mantrap
One tool for change management, called ______, allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
Version Control Software
A typical OS security configuration should include these 4 things:
1. Disabling unnecessary ports and services
2. Disabling default accounts/passwords
3. Employing least functionality
4. Application whitelisting/blacklisting
A-Tightening security during the design and coding of an OS is called?
B-One specific such technique involves removing all unnecessary features that may compromise an operating system?
A-OS Hardening
B-Kernel Pruning
A record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area is known as what?
Access Log
Specifically in application development removes a resource that is no longer needed is known as?
Deprovisioning
In Windows 10, a type of update that does not allow a user to refuse or delay the installation is known as what?
Forced Update
A-Mobile devices usually use ______ memory for storage.
B-The most popular type of removable storage used on mobile devices?
A-Flash Memory
B-SD (SD Card)