Chapter 4 Flashcards

1
Q

Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?

Question options:

Lockout sensors

Engineering sensors

Tailgate sensors

Proximity sensors

A

Tailgate sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Question options:

logical token

physical sensor

physical token

hybrid sensor

A

physical token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?

Question options:

Remote Read Tag (RRT)

Radio Frequency Identification tag (RFID)

Barcode tag (BT)

Magnetic tag (MT)

A

Radio Frequency Identification tag (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the maximum effective range of a typical passive RFID tag?

Question options:

12

15

19

25

A

19 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can an area be made secure from a non-secured area via two interlocking doors to a small room?

Question options:

Using a lockout

Using a mantrap

Using a closet

Using a pit

A

Using a mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
A) CCTV
B) ICTC
C) IPTV
D) ITV
A

CCTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:

Question options:

U-lock

safe lock

shield lock

cable lock

A

cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
A) Anti-climb
B) Spiked barrier
C) Roller barrier
D) Rotating spikes
A

Anti-climb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

Question options:

bollard

fence

roller barrier

top hat

A

roller barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?

Question options:

reference

baseline

profile

minimum

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?

Question options:

Account policies

User rights

System services

Resolution settings

A

Resolution settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?

Question options:

feature pack

roll-up

service pack

patch

A

service pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name of this technique?
A) heuristic detection
B) pattern detection
C) hybrid detection
D) combination detection
A

heuristic detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?

Question options:

IPS

scanner

firewall

honeypot

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:

Question options:

Information Detection System

Automated Data Policy

Local Loss Prevention

Data Loss Prevention

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most DLP systems make use of what method of security analysis below?

Question options:

Content aggregation

Content inspection

Content delivery

Content management

A

Content inspection

17
Q
Anti-virus products typically utilize what type of virus scanning analysis?
A) Static analysis
B) Wildcard scanning analysis
C) Heuristic detection analysis
D) String scanning analysis
A

Static analysis

18
Q

​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?

Question options:

​Blacklist filtering

​Whitelist filtering

​Bayesian filtering

​Extension filtering

A

​Bayesian filtering

19
Q

A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:

Question options:

​Mainframe

​Integrated system

​Embedded system

​Internal system

A

​Embedded system

20
Q

What is the best way to prevent data input by a user from having potentially malicious effects on software?​

Question options:

​Client-side validation

​Server-side validation

​Escaping user responses

​SQL validation

A

Escaping user responses