1. Which of the following is hardware used to automatically encrypt a computers drive? A....
Question:
1. Which of the following is hardware used to automatically encrypt a computer’s drive?
A. UEFI
B. FDE
C. SED
D. BIOS
2. What is a term for the process of securing a system by reducing its surface of vulnerability?
A. endpoint detection and response (EDR)
B. sandboxing
C. Hardening
D. fuzzing
3. This checks the programming code as it is running.
A. Dynamic code analysis
B. Static code analysis
C. Application hardening
D. Manual code review
4. Which of the following is software used to fully encrypt a computer’s drive?
A. FDE
B. UEFI
C. BIOS
D. SED
5. Your operating system is rated EAL4 (Evaluation Assurance Level 4) by the Common Criteria. You most likely have a _____.
A. real-time operating system (RTOS)
B. data breach
C. virus
D. trusted operating system
6. What is an example of an endpoint device?
A. Server
B. Switch
C. Firewall
D. Router
7. What do we call the process of starting a computer?
A. Hash
B. Endpoint protection
C. Boot
D. Hardware root of trust
8. This is performed by an automated tool that looks for coding mistakes, which is similar to a spell checker. This checks the programming code without running it.
A. Dynamic code analysis
B. Fuzzing
C. Static code analysis
D. Manual code review
9. _____ is a way for an operating system to prove that it has integrity, after a secure boot.
A. boot attestation
B. Trusted Platform Module (TPM)
C. trusted operating system
D. hardware root of trust
10. What function prevents malware infections at the BIOS/UEFI level and at the operating system level?
A. Multi-factor authentication
B. AES encryption
C. Secure boot
D. IPSec
Income Tax Fundamentals 2015
ISBN: 9781305177772
33rd Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven Gill