Exam 4: Engineering
Exam 1: Assessment7 Questions
Exam 2: Assets9 Questions
Exam 3: Communication39 Questions
Exam 4: Engineering69 Questions
Exam 5: ID and Access17 Questions
Exam 6: Management51 Questions
Exam 7: Operations85 Questions
Exam 8: Software22 Questions
Select questions type
Peter has been hired by XYZ Corp. to design their new building. Peter is an expert in environmental design and crime. What discipline is practiced by Peter?
(Multiple Choice)
4.9/5
(38)
What type of application is written to think it is the only program running on an operating system?
(Multiple Choice)
4.9/5
(41)
What do CCTVs, electromechanical devices, and vibration sensors have in common?
(Multiple Choice)
4.8/5
(35)
What is the technical specification that indicates how multimedia data and e-mail attachments are to be transferred?
(Multiple Choice)
4.8/5
(36)
Encryption is a method of transforming readable data into non-readable data. Which term is not related to encryption?
(Multiple Choice)
4.8/5
(34)
Jeff keeps trying to successfully attack against an algorithm that has yet to be successfully attacked. What algorithm is Jeff attempting to attack?
(Multiple Choice)
4.8/5
(35)
Doors come in many different styles and functionalities, such as vault doors or industrial doors. When two doors are used to stop an individual from getting in or out what are being created?
(Multiple Choice)
4.8/5
(34)
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows a Java application to communicate with a database?
(Multiple Choice)
4.8/5
(41)
There are two commonly used modes of encryption implementations. Which mode does not encrypt parameters that different link devices use to synchronize communication methods?
(Multiple Choice)
4.9/5
(35)
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language separates data into components that run as middleware on a client or server?
(Multiple Choice)
4.9/5
(35)
Which device is a smoke-activated detector and is good at early warnings?
(Multiple Choice)
4.7/5
(28)
Yesterday my computer crashed. I think it encountered something that it perceived as insecure. My system seems to be trying to respond to the crash. What options does the computer have?
(Multiple Choice)
4.8/5
(45)
What has been done if a currant database transaction is cancelled?
(Multiple Choice)
4.9/5
(46)
What is a collection of data stored in a meaningful way that enables multiple users and application to access, view, and modify data as needed?
(Multiple Choice)
4.8/5
(31)
What does a device using a metal oxide varistor protect against?
(Multiple Choice)
4.8/5
(39)
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service guarantees that the tuples are uniquely identified by primary key values?
(Multiple Choice)
4.8/5
(29)
Nathan worked for the U.S. Department of Defense when they developed the Trusted Computer System Evaluation Criteria (TCSEC). What is this book known as?
(Multiple Choice)
4.8/5
(34)
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to access back-end database systems?
(Multiple Choice)
4.8/5
(31)
What security model was developed in the 1970s to address the concerns of information leaks by the U.S. military?
(Multiple Choice)
4.9/5
(34)
Crime Prevention through Environmental Design (CPTED) professionals have three main strategies to protect properties. Which is not one of them?
(Multiple Choice)
4.9/5
(45)
Showing 41 - 60 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)