Exam 5: Host, Application, and Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.

(Multiple Choice)
4.9/5
(31)

Describe RFID tags.

(Essay)
4.9/5
(33)

What are the three most important elements to secure in any information technology setting?

(Essay)
4.9/5
(33)

A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

(Multiple Choice)
4.7/5
(28)

____ is defined as a security analysis of the transaction within its approved context.

(Multiple Choice)
5.0/5
(33)

Securing a restricted area by erecting a barrier is called ____.

(Multiple Choice)
4.9/5
(36)

A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.

(Multiple Choice)
4.8/5
(34)

____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.

(Short Answer)
4.7/5
(32)

Describe a mantrap.

(Essay)
4.8/5
(40)

____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

(Multiple Choice)
4.8/5
(32)

____________________ locks keep a record of when the door was opened and by which code.

(Short Answer)
4.8/5
(42)

ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

(Multiple Choice)
4.9/5
(42)

____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.

(Short Answer)
4.7/5
(30)

____________________ security involves restricting access to the areas in which equipment is located.

(Short Answer)
4.9/5
(33)

In Microsoft Windows, a ____ is a collection of security configuration settings.

(Multiple Choice)
4.9/5
(40)

____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.

(Multiple Choice)
4.9/5
(34)

____ can be prewired for electrical power as well as wired network connections.

(Multiple Choice)
4.9/5
(34)

A ____ is designed to separate a nonsecured area from a secured area.

(Multiple Choice)
4.8/5
(39)

Explain remote wipe/sanitation.

(Essay)
4.8/5
(34)

Identify the five steps in the process to secure operating system software.

(Essay)
5.0/5
(28)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)