Question 1
Question
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.
Answer
-
a. shield lock
-
b. U-lock
-
c. safe lock
-
d. cable lock
Question 2
Question
A ____ is designed to separate a non-secured area from a secured area.
Answer
-
a. pit
-
b. mantrap
-
c. closet
-
d. lockout
Question 3
Question
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.
Answer
-
a. DLP agent
-
b. DLP control
-
c. DLP cipher
-
d. DLP manager
Question 4
Question
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.
Answer
-
a. heuristic detection
-
b. hybrid detection
-
c. combination detection
-
d. pattern detection
Question 5
Question
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Answer
-
a. ADP
-
b. DLP
-
c. LLP
-
d. IDS
Question 6
Question
Cipher locks are the same as combination padlocks.
Question 7
Question
Keyed entry locks are much more difficult to defeat than deadbolt locks.
Question 8
Question
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
Question 9
Question
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Answer
-
a. firewall
-
b. honeypot
-
c. IPS
-
d. scanner
Question 10
Question
In Microsoft Windows, a ____ is a collection of security configuration settings.
Answer
-
a. security summary
-
b. security template
-
c. security baseline
-
d. security reference