Chapter 6 Flashcards

1
Q

Residential hardware locks for doors generally fall in ____ categories.

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ locks lock the door from the inside but cannot be unlocked from the outside.

A

Patio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

A

Anti-Climb Paint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ are spiked collars that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing; serves as both a practical and visual deterrent.

A

Anti-Climb Collars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ are independently rotating large cups (in diameter of 5 inches or 115 millimeters) affixed to the top of a fence to prevent the hands of intruders from gripping the top of a fence to climb over it

A

Roller Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is a written document that states how an organization plans to protect the company’s information technology assets.

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a collection of suggestions that should be implemented.

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is a document that outlines specific requirements or rules that must be met.

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ policy defines requirements for using cryptography.

A

Acceptable Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ policy creates standards for using corporate e-mail.

A

E-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ policy helps employees determine what information sent or received by e-mail should be retained and for how long.

A

Email Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ policy establishes criteria for classifying and securing the organization’s information in a manner appropriate to its level of security.

A

Information Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD

A

Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is the process of setting a user’s account to expire.

A

Account expiration

17
Q

The practice called “____” requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals

A

Separation Of Duties

18
Q

____ is the application of science to questions that are of interest to the legal profession.

A

Forensics

19
Q

The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.

A

Computer Forensics Response

20
Q

____ is defined as the ability of an organization to maintain its operations and services in the face of a disruptive event.

A

Business Continuity

21
Q

A ____ is essentially a duplicate of the organization’s main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.

A

Hot Site

22
Q

involves building excess capacity in order to protect against failures

A

Redundancy Planning

23
Q

designed to separate a nonsecure area from a secure area

A

Mantrap

24
Q

maintains power to equipment in the event of an interruption in the primary electrical power source.

A

Uninterruptible Power Supply

25
Q

provides office space but the customer must provide and install all the equipment needed to continue operations

A

Cold Site

26
Q

has all of the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data

A

Warm Site

27
Q

lock the door but have access to unlock from the outside via a small hole.

A

Privacy Locks

28
Q

combination locks that use buttons that must be pushed in the proper sequence to open the door.

A

Cipher Locks

29
Q

performs continuous data backups that can be restored immediately

A

CDP

30
Q

latch a door closed yet do not lock it; typically used on hall and closet doors

A

Passage Locks