Chapter 6 Flashcards

1
Q

Residential hardware locks for doors generally fall in ____ categories.

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ locks lock the door from the inside but cannot be unlocked from the outside.

A

Patio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

A

Anti-Climb Paint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ are spiked collars that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing; serves as both a practical and visual deterrent.

A

Anti-Climb Collars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it

A

Roller Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a collection of suggestions that should be implemented.

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a document that outlines specific requirements or rules that must be met.

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ policy defines requirements for using cryptography.

A

Acceptable Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ policy creates standards for using corporate e-mail.

A

E-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ policy helps employees determine what information sent or received by e-mail should be retained and for how long.

A

Email Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ policy establishes criteria for classifying and securing the organization’s information in a manner appropriate to its level of security.

A

Information Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD

A

Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is the process of setting a user’s account to expire.

A

Account expiration

17
Q

The practice called “____” requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals

A

Separation Of Duties

18
Q

____ is the application of science to questions that are of interest to the legal profession.

19
Q

The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.

A

Computer Forensics Response

20
Q

____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.

A

Business Continuity

21
Q

A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.

22
Q

involves building excess capacity in order to protect against failures

A

Redundancy Planning

23
Q

designed to separate a nonsecure area from a secure area

24
Q

maintains power to equipment in the event of an interruption in the primary electrical power source.

A

Uninterruptible Power Supply

25
provides office space but the customer must provide and install all the equipment needed to continue operations
Cold Site
26
has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data
Warm Site
27
lock the door but have access to unlock from the outside via a small hole.
Privacy Locks
28
combination locks that use buttons that must be pushed in the proper sequence to open the door.
Cipher Locks
29
performs continuous data backups that can be restored immediately
CDP
30
latch a door closed yet do not lock it; typically used on hall and closet doors
Passage Locks