Exam 5: Host, Application, and Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

B

Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

A

A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.

(Multiple Choice)
4.9/5
(29)

Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.

(True/False)
4.7/5
(47)

A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.

(Short Answer)
4.9/5
(29)

A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.

(Multiple Choice)
4.8/5
(36)

A ____ is software that is a cumulative package of all security updates plus additional features.

(Multiple Choice)
4.8/5
(38)

What are the three states of data that DLP typically examines?

(Essay)
4.9/5
(40)

In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.

(Multiple Choice)
4.9/5
(37)

Explain how tailgate sensors work.

(Essay)
4.8/5
(26)

Keyed entry locks are much more difficult to defeat than deadbolt locks.

(True/False)
4.8/5
(39)

Passive tags have ranges from about 1/3 inch to ____ feet.

(Multiple Choice)
4.7/5
(26)

Identify one of the capabilities of DLP agents.

(Essay)
4.7/5
(37)

List three recommended key management procedures to achieve the best security when using keyed door locks.

(Essay)
4.8/5
(38)
Match each term with the correct statement below.
Latch a door closed yet do not lock; typically used on hall and closet doors
Storeroom locks
Lock the door but have access to unlock from the outside via a small hole
Keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Patio locks
Correct Answer:
Verified
Premises:
Responses:
Latch a door closed yet do not lock; typically used on hall and closet doors
Storeroom locks
Lock the door but have access to unlock from the outside via a small hole
Keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Patio locks
Lock the door from the inside but cannot be unlocked from the outside
Passage locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Store entry double cylinder locks
Use a key to open the lock from the outside
Classroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Privacy locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Deadbolt locks
(Matching)
4.9/5
(42)

When a policy violation is detected by the DLP agent, it is reported back to the DLP server.

(True/False)
4.7/5
(23)

Describe how a DLP can be configured.

(Essay)
4.8/5
(25)

Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.

(Multiple Choice)
4.8/5
(41)

Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.

(True/False)
4.9/5
(42)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)