click below
click below
Normal Size Small Size show me how
Security+ Chap 5
Chapter 5 Host, Application, and Data Security
Question | Answer |
---|---|
Access list | A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area. |
Access log | A log that can provide details regarding requests for specific files on a system. |
Anti-spyware | Software that helps prevent computers from becoming infected by different types of spyware. |
Anti-virus (AV) | Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus. |
Audit log | A log that can track user authentication attempts. |
Audit records | Logs that are the second common type of security-related operating system logs. |
Spam filtering software that analyzes the contents of every word in an e-mail and determines how frequently a word occurs in order to determine if it is spam. | Bayesian filtering |
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen. | Cable lock |
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring. | Closed-circuit television (CCTV) |
an attack that uses the user's Web browser settings to impersonate the user. | Cross-site request forgery (XSRF) |
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users. | Data loss prevention (DLP) |
A door lock that extends a solid metal bar into the door frame for extra security. | Deadbolt lock |
Faults in a program that occur while the application is running. | Errors (exceptions) |
Logs that can document any unsuccessful events and the most significant successful events. | Event logs |
Securing a restricted area by erecting a barrier. | Fencing |
Hardware or software that is designed to prevent malicious packets from entering or leaving computers. | Firewall (packet filter) |
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program. | Fuzz testing (fuzzing) |
Using the Global Positioning System to detect the location of a portable device. | GPS tracking |
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus. | Heuristic detection |
A firewall that runs as a program on a local system to protect it against attacks. | Host-based software firewall |
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization. | Hotfix |
Verifying a user's input to an application. | Input validation |
A secure storage unit that can be used for storing portable devices. | Locking cabinet |
A record of events that occur. | Log |
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas. | Mantrap |
a general software security update intended to cover vulnerabilities that have been discovered. | Patch |
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing. | Pop-up blocker |
a device that detects an emitted signal in order to identify the owner. | Proximity reader |
A technology that can remotely erase data from a portable device and reset it to its default factory settings. | Remote wipe/sanitation |
A ruggedized steel box with a lock. | Safe |
Logs that are considered the primary source of log data. | Security logs |
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure. | Security policy |
Software that is a cumulative package of all security updates plus additional features. | Service pack |
A sequence of bytes (a string) found in the virus as a virus signature. | Signature file |
Using encryption to mask the content of voice communications. | Voice encryption |