Exam 22: Security Hardware
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
What are biometric devices?
Free
(Essay)
4.8/5
(34)
Correct Answer:
Biometric devices use a physical feature of one's body to assist in authentication.
Match each item with a statement below.
-The ability of a computer or a computer network to keep operating in the event of a hardware failure
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
____ is concerned with understanding who is doing the talking.
(Multiple Choice)
4.9/5
(36)
Just running a RAID Level 5 system means your data are completely safe.
(True/False)
4.9/5
(31)
A ____ is an entryway into a secure area that contains two doors.
(Multiple Choice)
4.8/5
(32)
Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.
(Short Answer)
4.8/5
(31)
Match each item with a statement below.
-The process of making a server more secure by turning off un-necessary protocols and services,applying up-to-date patches,and securing the applications that run on the server
(Multiple Choice)
4.9/5
(44)
Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
(Short Answer)
4.7/5
(37)
Hard drives that can be removed and connected to a running system are called ____ hard drives.
(Multiple Choice)
4.8/5
(38)
Describe the types of doors and locks that should be used to secure an area.
(Essay)
4.8/5
(40)
Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
(Short Answer)
4.9/5
(39)
____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.
(Short Answer)
4.7/5
(30)
RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.
(Multiple Choice)
4.9/5
(41)
A(n)____ is an unsecure network that operates between the public Internet and the private LAN.
(Multiple Choice)
4.7/5
(45)
Iris scanning uses patterns in the iris to generate a biometric ____.
(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)