Chapter 4 Flashcards
Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?
Question options:
Lockout sensors
Engineering sensors
Tailgate sensors
Proximity sensors
Tailgate sensors
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
Question options:
logical token
physical sensor
physical token
hybrid sensor
physical token
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?
Question options:
Remote Read Tag (RRT)
Radio Frequency Identification tag (RFID)
Barcode tag (BT)
Magnetic tag (MT)
Radio Frequency Identification tag (RFID)
What is the maximum effective range of a typical passive RFID tag?
Question options:
12
15
19
25
19 feet
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Question options:
Using a lockout
Using a mantrap
Using a closet
Using a pit
Using a mantrap
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance? A) CCTV B) ICTC C) IPTV D) ITV
CCTV
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Question options:
U-lock
safe lock
shield lock
cable lock
cable lock
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? A) Anti-climb B) Spiked barrier C) Roller barrier D) Rotating spikes
Anti-climb
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
Question options:
bollard
fence
roller barrier
top hat
roller barrier
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
Question options:
reference
baseline
profile
minimum
baseline
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?
Question options:
Account policies
User rights
System services
Resolution settings
Resolution settings
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
Question options:
feature pack
roll-up
service pack
patch
service pack
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name of this technique? A) heuristic detection B) pattern detection C) hybrid detection D) combination detection
heuristic detection
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?
Question options:
IPS
scanner
firewall
honeypot
firewall
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:
Question options:
Information Detection System
Automated Data Policy
Local Loss Prevention
Data Loss Prevention
Data Loss Prevention