Pregunta 1
Pregunta
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
Respuesta
-
a. shield lock
-
b. U-lock
-
c. safe lock
-
d. cable lock
Pregunta 2
Pregunta
A ____ is designed to separate a non-secured area from a secured area.
Respuesta
-
a. pit
-
b. mantrap
-
c. closet
-
d. lockout
Pregunta 3
Pregunta
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Respuesta
-
a. DLP agent
-
b. DLP control
-
c. DLP cipher
-
d. DLP manager
Pregunta 4
Pregunta
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
Respuesta
-
a. heuristic detection
-
b. hybrid detection
-
c. combination detection
-
d. pattern detection
Pregunta 5
Pregunta
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Respuesta
-
a. ADP
-
b. DLP
-
c. LLP
-
d. IDS
Pregunta 6
Pregunta
Cipher locks are the same as combination padlocks.
Pregunta 7
Pregunta
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Pregunta 8
Pregunta
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Pregunta 9
Pregunta
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Respuesta
-
a. firewall
-
b. honeypot
-
c. IPS
-
d. scanner
Pregunta 10
Pregunta
In Microsoft Windows, a ____ is a collection of security configuration settings.
Respuesta
-
a. security summary
-
b. security template
-
c. security baseline
-
d. security reference