Questão 1
Questão
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
Responda
-
a. shield lock
-
b. U-lock
-
c. safe lock
-
d. cable lock
Questão 2
Questão
A ____ is designed to separate a non-secured area from a secured area.
Responda
-
a. pit
-
b. mantrap
-
c. closet
-
d. lockout
Questão 3
Questão
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Responda
-
a. DLP agent
-
b. DLP control
-
c. DLP cipher
-
d. DLP manager
Questão 4
Questão
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
Responda
-
a. heuristic detection
-
b. hybrid detection
-
c. combination detection
-
d. pattern detection
Questão 5
Questão
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Responda
-
a. ADP
-
b. DLP
-
c. LLP
-
d. IDS
Questão 6
Questão
Cipher locks are the same as combination padlocks.
Questão 7
Questão
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Questão 8
Questão
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Questão 9
Questão
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Responda
-
a. firewall
-
b. honeypot
-
c. IPS
-
d. scanner
Questão 10
Questão
In Microsoft Windows, a ____ is a collection of security configuration settings.
Responda
-
a. security summary
-
b. security template
-
c. security baseline
-
d. security reference