A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
a. shield lock
b. U-lock
c. safe lock
d. cable lock
A ____ is designed to separate a non-secured area from a secured area.
a. pit
b. mantrap
c. closet
d. lockout
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
a. DLP agent
b. DLP control
c. DLP cipher
d. DLP manager
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
a. heuristic detection
b. hybrid detection
c. combination detection
d. pattern detection
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
a. ADP
b. DLP
c. LLP
d. IDS
Cipher locks are the same as combination padlocks.
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
a. firewall
b. honeypot
c. IPS
d. scanner
In Microsoft Windows, a ____ is a collection of security configuration settings.
a. security summary
b. security template
c. security baseline
d. security reference