CR2241 - Chapter 9

Generate an image showing various cybersecurity elements such as a firewall, network devices, and a secure supply chain, in a modern digital style.

Supply Chain Security Quiz

Test your knowledge on supply chain security, operating systems, and network devices with our engaging quiz! This quiz covers a range of topics to enhance your understanding and skills in cybersecurity.

  • 20 multiple choice questions
  • Focus on security methods and technologies
  • Improve your cybersecurity awareness
20 Questions5 MinutesCreated by ProtectingData202
Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device.
Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected.
It is virtually impossible to closely monitor every step in the supply chain.
Supply chains take advantage of the trusted “chain of trust” concept.
Which type of operating system runs on a firewall, router, or switch?
Server OS
Network OS
Device OS
Resource OS
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
Barricade
Fencing
Roller barrier
Type V controls
Which of the following is NOT a motion detection method?
Magnetism
Radio frequency
Moisture
Infrared
Which type of residential lock is most often used for keeping out intruders?
Encrypted key lock
Keyed entry lock
Privacy lock
Passage lock
A lock that extends a solid metal bar into the door frame for extra security is the .
Triple bar lock
Deadman’s lock
Full bar lock
Deadbolt lock
Which statement about a mantrap is true?
It is illegal in the United States.
It monitors and controls two interlocking doors to a room.
It is a special keyed lock
It requires the use of a cipher lock.
Which of the following is NOT a typical OS security configuration?
Employing least functionality
Restricting patch management
Disabling default accounts/ passwords
Disabling unnecessary ports and services
Which of the following can be used to secure a laptop or mobile device?
Mobile connector
Cable lock
Mobile chain
Security tab
Which of the following is NOT a characteristic of an alarmed carrier PDS?
Requires periodic visual inspections
Uses continuous monitoring
Carrier can be hidden above the ceiling
Eliminates the need to seal connections
Which of the following is NOT a memory vulnerability?
DLL injection
Pointer deference
Buffer overflow
Variable overflow
Which stage is a “quality assurance” test that verifies the code functions as intended?
Production stage
Testing stage
Staging stage
Development stage
Which model uses a sequential design process?
Waterfall model
Rigid model
Agile model
Secure model
What allows for a single configuration to be set and then deployed to many or all users?
Snap-In Replication (SIR)
Active Directory
Group Policy
Command Configuration
Which of the following is a cumulative package of all patches?
Rollup
Service pack
Patch
Hotfix
Which of the following is NOT an advantage to an automated patch update service?
Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs.
Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth and time because each computer does not have to connect to an external server.
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.
Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available.
How can an SDIO card be made secure?
Using the security mechanisms on a standard Wi-Fi network
Turning on patch updates to the SDIO card.
Requiring a username before accessing the SDIO card.
SDIO cards are natively secure and no security settings are needed.
How does heuristic detection detect a virus?
A virtualized environment is created and the code is executed in it.
A string of bytes from the virus is compared against the suspected file
The bytes of a virus are placed in different “piles” and then used to create a profile.
The virus signature file is placed in a suspended chamber before streaming to the CPU.
Which of these is a list of approved email senders?
Blacklist
Whitelist
Bluelist
Yellowlist
Which of the following types of testing uses unexpected or invalid inputs?
Stress testing
Dynamic analysis
Static analysis
Runtime testing
{"name":"CR2241 - Chapter 9", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on supply chain security, operating systems, and network devices with our engaging quiz! This quiz covers a range of topics to enhance your understanding and skills in cybersecurity.20 multiple choice questionsFocus on security methods and technologiesImprove your cybersecurity awareness","img":"https:/images/course2.png"}
Powered by: Quiz Maker