Exam 22: Security Hardware

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What are biometric devices?

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

Biometric devices use a physical feature of one's body to assist in authentication.

Match each item with a statement below. -The ability of a computer or a computer network to keep operating in the event of a hardware failure

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

____ is concerned with understanding who is doing the talking.

(Multiple Choice)
4.9/5
(36)

Just running a RAID Level 5 system means your data are completely safe.

(True/False)
4.9/5
(31)

A ____ is an entryway into a secure area that contains two doors.

(Multiple Choice)
4.8/5
(32)

Describe a physical security plan.

(Essay)
4.9/5
(39)

Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.

(Short Answer)
4.8/5
(31)

Match each item with a statement below. -The process of making a server more secure by turning off un-necessary protocols and services,applying up-to-date patches,and securing the applications that run on the server

(Multiple Choice)
4.9/5
(44)

Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.

(Short Answer)
4.7/5
(37)

Describe an Intrusion Detection System.

(Essay)
4.9/5
(32)

Hard drives that can be removed and connected to a running system are called ____ hard drives.

(Multiple Choice)
4.8/5
(38)

Discuss handwriting authentication.

(Essay)
4.9/5
(36)

Describe the types of doors and locks that should be used to secure an area.

(Essay)
4.8/5
(40)

Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.

(Short Answer)
4.9/5
(39)

Iris scanners are more invasive than retinal scanners.

(True/False)
4.8/5
(32)

____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.

(Short Answer)
4.7/5
(30)

RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.

(Multiple Choice)
4.9/5
(41)

A(n)____ is an unsecure network that operates between the public Internet and the private LAN.

(Multiple Choice)
4.7/5
(45)

Iris scanning uses patterns in the iris to generate a biometric ____.

(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)