IS3230 CHAPTER 9 Flashcards

1
Q

Short vertical posts designed to control traffic and prevent vehicular attacks on a building is called ___.

A

BOLLARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A unique number that identifies an individual in possession of a smart card is called ___.

A

CARD HOLDER UNIQUE IDENTIFICATION (CHUID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The point at which Type I errors and Type II errors in a biometric access control system are equal is called ___.

A

CROSSOVER ERROR RATE (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The percentage of failed attempts to create a sample data set for an individual, divided by the total number of attempts to enroll users is called ___.

A

FAILURE TO ENROLL RATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The percentage of impostors that will be recognized as authorized users is called ___.

A

FALSE ACCEPTANCE RATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The percentage of attempt by legitimate users that are rejected by the system is called ___.

A

FALSE REJECTION RATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The mode in which a biometric system compares live data to a database of known samples and returns one or more matching user profiles is called ___.

A

IDENTIFICATION MODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any method that restricts access to a defined area, such as a military base, corporate campus, infrastructure facility, or office building is called ___.

A

PERIMETER SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An agreement between an organization and a third party that describes availability levels, security protection levels, and response times to a breach is called ___.

A

SERVICE LEVEL AGREEMENT (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A false rejection in a biometric access control system is called ___.

A

TYPE I ERROR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A false acceptance in a biometric access control system is called ___.

A

TYPE II ERROR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A device that supplies backup power to servers and other devices is called ___.

A

UNINTERRUPTIBLE POWER SUPPLY (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The mode in which a biometric system makes a simple one to one comparison and returns a binary result is called ___.

A

VERIFICATION MODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A metal projection in a warded lock that must line up with the grooves on the key in order to unlock is called ___.

A

WARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A good physical security strategy relies on a single strong point of access control.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Fencing, lighting, and security guards are all important parts of what aspect of physical security?
  2. Outsourced security
  3. Biometrics
  4. Perimeter security
  5. Access control
A

Perimeter security

17
Q
  1. What is a weak point in perimeter security?
  2. Road
  3. Gate
  4. Pathway
  5. Window
A

Gate

18
Q
  1. Cameras trained on entry and exit points provide which security benefits? (Select two)
  2. Theft of resources prevention
  3. A record of who enters and leaves the facility
  4. Vandalism prevention
  5. Allow guards to monitor activity in real time
A

A record of who enters and leaves the facility

Allow guards to monitor activity in real tim

19
Q
  1. What is a short vertical post designed to control traffic and prevent vehicular attacks on a building?
  2. Balustrade
  3. Barrier
  4. Barm
  5. Bollard
  6. None of the above
A

None of the above

20
Q
  1. Every package that arrives or leaves a classified government facility is x-rayed.
    TRUE OR FALSE
A

TRUE

21
Q
  1. A(n) ___ data center has robotic devices that are controlled remotely to change backup tapes and cycle the power on servers.
A

Dark

22
Q
  1. What is the name of the process through which several biometric readings are taken on an individual in order to create an accurate record of the individual’s characteristics?
  2. Scanning
  3. Identification
  4. Verification
  5. Enrollment
  6. Creation
A

Creation

23
Q
  1. The tow primary types of biometric access controls are ___ and ___.
A

Physiological

Behavioral

24
Q
  1. Anyone who can forge another person’s signature can defeat a biometric access control based on signature analysis.
    TRUE OR FALSE
A

FALSE

25
Q
  1. The crossover rate of a biometric system is ___.
A

The point at which Type I and Type II errors are equal

26
Q
  1. Most biometric access control systems are used in which mode?
  2. Identification
  3. Production
  4. Elimination
  5. Verification
  6. Restrictive
A

Restrictive

27
Q
  1. Typical padlocks are an example of which type of locks?
  2. Warded
  3. Tumbler
  4. Combination
  5. Cipher
A

Warded

28
Q
  1. What is often equipped with silent alarms that notify security or police that an employee is in trouble?
  2. Warded
  3. Tumbler
  4. Combination
  5. Cipher
A

Cipher

29
Q
  1. What is the first step in designing a physical security system?
  2. Hire a security outsourcing firm
  3. Conduct a security audit
  4. Purchase a biometric access control system
  5. Install a video surveillance system
  6. Replace traditional locks with programmable cipher locks
A

Conduct a security audit