IS3230 CHAPTER 9 Flashcards
Short vertical posts designed to control traffic and prevent vehicular attacks on a building is called ___.
BOLLARDS
A unique number that identifies an individual in possession of a smart card is called ___.
CARD HOLDER UNIQUE IDENTIFICATION (CHUID)
The point at which Type I errors and Type II errors in a biometric access control system are equal is called ___.
CROSSOVER ERROR RATE (CER)
The percentage of failed attempts to create a sample data set for an individual, divided by the total number of attempts to enroll users is called ___.
FAILURE TO ENROLL RATE
The percentage of impostors that will be recognized as authorized users is called ___.
FALSE ACCEPTANCE RATE
The percentage of attempt by legitimate users that are rejected by the system is called ___.
FALSE REJECTION RATE
The mode in which a biometric system compares live data to a database of known samples and returns one or more matching user profiles is called ___.
IDENTIFICATION MODE
Any method that restricts access to a defined area, such as a military base, corporate campus, infrastructure facility, or office building is called ___.
PERIMETER SECURITY
An agreement between an organization and a third party that describes availability levels, security protection levels, and response times to a breach is called ___.
SERVICE LEVEL AGREEMENT (SLA)
A false rejection in a biometric access control system is called ___.
TYPE I ERROR
A false acceptance in a biometric access control system is called ___.
TYPE II ERROR
A device that supplies backup power to servers and other devices is called ___.
UNINTERRUPTIBLE POWER SUPPLY (UPS)
The mode in which a biometric system makes a simple one to one comparison and returns a binary result is called ___.
VERIFICATION MODE
A metal projection in a warded lock that must line up with the grooves on the key in order to unlock is called ___.
WARD
- A good physical security strategy relies on a single strong point of access control.
TRUE OR FALSE
FALSE
- Fencing, lighting, and security guards are all important parts of what aspect of physical security?
- Outsourced security
- Biometrics
- Perimeter security
- Access control
Perimeter security
- What is a weak point in perimeter security?
- Road
- Gate
- Pathway
- Window
Gate
- Cameras trained on entry and exit points provide which security benefits? (Select two)
- Theft of resources prevention
- A record of who enters and leaves the facility
- Vandalism prevention
- Allow guards to monitor activity in real time
A record of who enters and leaves the facility
Allow guards to monitor activity in real tim
- What is a short vertical post designed to control traffic and prevent vehicular attacks on a building?
- Balustrade
- Barrier
- Barm
- Bollard
- None of the above
None of the above
- Every package that arrives or leaves a classified government facility is x-rayed.
TRUE OR FALSE
TRUE
- A(n) ___ data center has robotic devices that are controlled remotely to change backup tapes and cycle the power on servers.
Dark
- What is the name of the process through which several biometric readings are taken on an individual in order to create an accurate record of the individual’s characteristics?
- Scanning
- Identification
- Verification
- Enrollment
- Creation
Creation
- The tow primary types of biometric access controls are ___ and ___.
Physiological
Behavioral
- Anyone who can forge another person’s signature can defeat a biometric access control based on signature analysis.
TRUE OR FALSE
FALSE
- The crossover rate of a biometric system is ___.
The point at which Type I and Type II errors are equal
- Most biometric access control systems are used in which mode?
- Identification
- Production
- Elimination
- Verification
- Restrictive
Restrictive
- Typical padlocks are an example of which type of locks?
- Warded
- Tumbler
- Combination
- Cipher
Warded
- What is often equipped with silent alarms that notify security or police that an employee is in trouble?
- Warded
- Tumbler
- Combination
- Cipher
Cipher
- What is the first step in designing a physical security system?
- Hire a security outsourcing firm
- Conduct a security audit
- Purchase a biometric access control system
- Install a video surveillance system
- Replace traditional locks with programmable cipher locks
Conduct a security audit