nsf_05(4)

Descripción

host, application, and data security
865 538
Test por 865 538, actualizado hace más de 1 año
865 538
Creado por 865 538 hace casi 8 años
34
0

Resumen del Recurso

Pregunta 1

Pregunta
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
Respuesta
  • a. shield lock
  • b. U-lock
  • c. safe lock
  • d. cable lock

Pregunta 2

Pregunta
A ____ is designed to separate a non-secured area from a secured area.
Respuesta
  • a. pit
  • b. mantrap
  • c. closet
  • d. lockout

Pregunta 3

Pregunta
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Respuesta
  • a. DLP agent
  • b. DLP control
  • c. DLP cipher
  • d. DLP manager

Pregunta 4

Pregunta
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
Respuesta
  • a. heuristic detection
  • b. hybrid detection
  • c. combination detection
  • d. pattern detection

Pregunta 5

Pregunta
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Respuesta
  • a. ADP
  • b. DLP
  • c. LLP
  • d. IDS

Pregunta 6

Pregunta
Cipher locks are the same as combination padlocks.
Respuesta
  • True
  • False

Pregunta 7

Pregunta
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Respuesta
  • True
  • False

Pregunta 8

Pregunta
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Respuesta
  • True
  • False

Pregunta 9

Pregunta
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Respuesta
  • a. firewall
  • b. honeypot
  • c. IPS
  • d. scanner

Pregunta 10

Pregunta
In Microsoft Windows, a ____ is a collection of security configuration settings.
Respuesta
  • a. security summary
  • b. security template
  • c. security baseline
  • d. security reference
Mostrar resumen completo Ocultar resumen completo

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_06(7)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
INGENIERÍA CIVÍL QUÍMICA
camila.bertiola