Which of the following are types of settings that would be included in a Microsoft Windows security template? (Choose three)
Account policies, user rights, system services
A QR code can contain which of the following items directly? (Choose three.)
URL, phone number, email address
The Apple _________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
_______ locks keep a record of when the door was opened and by which code.
_______ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden; thereby, making any coated surface very difficult to climb.
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications and monitoring logs.
DLP agent sensors are installed on each host device and monitor for actions such as printing, copying to a USB flash drive or burning to a CD or DVD.
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. Which of the following is the name for this technique?
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What the name of this technology?
What is the best way to prevent data input by a user from having potentially malicious effects on software?
Escaping user responses
Which of the following management systems can help facilitate asset tracking?
Mobile Device Management (MDM)
Which of the following can be enabled to prevent a mobile device from being used until a user enters the correct passcode such as a pin or password?
Enable a lock screen
Most DLP systems make use of which of the following methods of security analysis?
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensures that it is protected:
Data Loss Prevention
What type of video surveillance is typically used by banks, casinos, airports and military installations and commonly employs guards who actively monitor the surveillance?
What is the maximum effective range of a typical passive RFID tag?
Which of the following is a wearable technology?
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
A QR code can store website URLs, plain text, phone numbers, e-mail addresses or virtually an alphanumeric data up to 4296 characters.
Which of the following are considered to be basic characteristics of mobile devices? (Choose three.)
Small form factor
Mobile operating system
Data synchronization capabilities
Which of the following are features provided by a typical MDM? (Choose three.)
Rapidly enroll new mobile devices
Discover devices accessing enterprise systems
Selectively erase corporate data while leaving personal data intact
The PC Card and CardBus devices are being replaced with which technology?
Which of the following mobile operating systems require all applications to be reviewed and approved before they can be made available on the public store front?
A system such as a printer, smart TV, or HVAC controller typically uses an operating system on what is called a(n):
Instead of using a key or entering a code to open a door, a user can use an object such as an ID badge to identify themselves in order to gain access to a secure area. Which of the following describes this type of object?
What type of filtering utilizes an analysis of the content of spam messages in comparison to neutral/non-spam messages in order to make intelligent decisions as to what should be considered spam?
Which of the following describes a hand-held mobile device that was intended to replace paper systems and typically included an appointment calendar, an address book, a “to-do” list, a calculator and the ability to record limited notes?
Personal digital assistant (PDA)
An ultrabook is an example of what type of a portable computer?
Mobile devices use _________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.
_______ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks and tablet computers that can easily be stolen.
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.
Which PIN is considered to be the most commonly used PIN?
Cipher locks are sometimes combined with what type of sensor which uses infrared beams that are aimed across a doorway?
Most portable devices and some computer monitors have a special steel bracket security slot built into the case which can be used in conjunction with a:
What type of device is designed to prevent malicious network packets from entering or leaving computers or networks (often referred to as a packet filter)?
What PC Card type is typically used for memory?
How can an administrator manage applications on mobile devices using a technique called “app wrapping”?
Mobile Application Management
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what type of technology?
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?
Secure Digital Input Output (SDIO)
Which of the following are options of the SD format card families? (Choose three.)
Standard Capacity (SDSC)
High Capacity (SDHC)
Secure Digital Input Output (SDIO)
__________ are portable computing devices that are generally larger than smartphones, smaller than notebooks and focused on ease of use.
DLP agent sensors are unable to read inside compressed files and binary files.
The CardBus is a 64-bit bus in the PC card form factor.
The Google Android mobile operating system is a proprietary system for use on only approved devices.
Which of the following ports can be found in a laptop?
USB, eSATA, RJ-45
A(n) _____________ is a record or list of individuals who have permission to enter a secure area, the time they entered and the time they left the area.
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Using a mantrap
A ____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.
___________ uses a device’s GPS to define geographical boundaries where an app can be used.
Mobile devices with global positioning system (GPS) abilities typically make use of:
Anti-virus products typically utilize what type of virus scanning analysis?
Simply using a mobile device in a public area can be considered a risk.
Which of the following is a type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated medial player?
Mobile devices such as laptops are stolen on average once every 20 seconds
Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?
Radio Frequency Identification Tag (RFID)
What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?
Need essay sample on "security Exam 4 Practice Test"? We will write a custom essay sample specifically for you for only $ 13.90/page