Primary security associated with cell phones

Primary security associated with cell phones
Which of the following type of hardware vulnerability can allow
local users to cause a denial of service or the system not to boot?
❍ A. USB
❍ B. BIOS
❍ C. NAS
❍ D. PDA
2. Which of the following is an inherent security risk when using network attached storage?
❍ A. It is easy to lose this type of storage device.
❍ B. Running applications this way leaves little trace on the
host system.
❍ C. Organizations often fail to protect data on storage subsystems.
❍ D. Antivirus software cannot be installed on large storage
systems.
Quick Answer:
Quick Check ✓
41
Detailed Answer: 51
Quick Answer: 41
Detailed Answer: 51
Quick Answer: 41
Detailed Answer: 51
Quick Answer: 41
Detailed Answer: 51
Domain 1.0: Systems Security 15
3. Which of the following is the primary security concern associated
with cell phones and other mobile devices?
❍ A. This type of storage device can easily be lost or stolen.
❍ B. Antivirus software cannot be installed on this type of
storage device.
❍ C. The data cannot be encrypted on this type of storage
device.
❍ D. It is easy to crack the password on this type of storage device.
4. Which of the following can result in the exploitation of a BIOS vulnerability? (Select all correct answers.)
❍ A. Hard drive failure
❍ B. System not to boot
❍ C. System to lock up
❍ D. Denial of service
5. Which of the following is the greatest security risk when allowing
personal small, high-capacity, removable storage devices on the
network?
❍ A. A disgruntled employee can easily misuse data.
❍ B. There is no way scan the device for malware.
❍ C. The data transferred cannot be encrypted.
❍ D. The device can easily break off in the attached computer.
6. Which of the following is the most appropriate method to disable
unauthorized users from accessing USB storage devices?
❍ A. Edit the Registry.
❍ B. Fill the USB slots with glue.
❍ C. Edit Security Accounts Manager.
❍ D. Use Group Policy.
7. Which of the following are ways the BIOS can be compromised?
(Select all correct answers.)
❍ A. Modifying Registry keys
❍ B. Known vulnerabilities
❍ C. Bypassing access cont

Still stressed from student homework?
Get quality assistance from academic writers!
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 9294730077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code SOLVE