Exam 22: Security Hardware

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.

Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
Verified

A

A(n) ____ is an unsecure network that operates between the public Internet and the private LAN.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

An integrated IDS appliance combines the tap and analysis software all in one device.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

Surrounding a building with a moat is a good way to prevent all but the most serious individuals from attempting to gain access.

(True/False)
4.7/5
(35)

____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.

(Short Answer)
4.8/5
(35)

Iris scanning uses patterns in the iris to generate a biometric ____.

(Multiple Choice)
4.8/5
(34)

Describe an Intrusion Detection System.

(Essay)
4.8/5
(30)

____ is concerned with understanding who is doing the talking.

(Multiple Choice)
4.7/5
(39)

Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.

(Short Answer)
4.9/5
(33)

Describe a physical security plan.

(Essay)
4.9/5
(42)

While nothing can prevent a lost connection due to an unplugged cable, the use of multi-homed computers means that two cables would have to be unplugged at the same time.

(True/False)
4.9/5
(36)

____ is concerned with understanding what a person is saying.

(Multiple Choice)
4.8/5
(35)

____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.

(Multiple Choice)
4.9/5
(31)

Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.

(Short Answer)
4.9/5
(36)

Discuss handwriting authentication.

(Essay)
4.8/5
(38)

What are biometric devices?

(Short Answer)
4.8/5
(33)

A ____ is an entryway into a secure area that contains two doors.

(Multiple Choice)
4.8/5
(22)

Iris scanners are more invasive than retinal scanners.

(True/False)
4.8/5
(36)

_____________________ involves the process of identifying a user to a computer.

(Short Answer)
4.8/5
(37)

Inexpensive video cameras may be used for ____ facial recognition.

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)