Deck 4: Engineering
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
Play
Full screen (f)
Deck 4: Engineering
1
What security model was developed in the 1970s to address the concerns of information leaks by the U.S. military?
A)GUI Model
B)State Machine Model
C)Bella-LaPadula Model
D)Transition Model
A)GUI Model
B)State Machine Model
C)Bella-LaPadula Model
D)Transition Model
Bella-LaPadula Model
2
What security model addresses the integrity of data with applications, but is not concerned with security levels and confidentiality?
A)GUI Model
B)State Machine Model
C)Bella-LaPadula Model
D)Biba Model
A)GUI Model
B)State Machine Model
C)Bella-LaPadula Model
D)Biba Model
Biba Model
3
What type of security model separates data into one subset that needs to be highly protected and another subset that does not require a high level of protection?
A)GUI Model
B)The Clark-Wilson Model
C)Bella-LaPadula Model
D)Biba Model
A)GUI Model
B)The Clark-Wilson Model
C)Bella-LaPadula Model
D)Biba Model
The Clark-Wilson Model
4
What security model was created to provide access controls that can change dynamically depending upon a user's previous actions and is known as the Chinese Wall model?
A)Brewer and Nash Model
B)The Clark-Wilson Model
C)Bella-LaPadula Model
D)Biba Model
A)Brewer and Nash Model
B)The Clark-Wilson Model
C)Bella-LaPadula Model
D)Biba Model
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
In Paul's office, everyone has access to a computer that only holds secret data. What type of security mode does this office use?
A)System High-Security Mode
B)Dedicated Security Mode
C)Multilevel Security Mode
D)All of the above.
A)System High-Security Mode
B)Dedicated Security Mode
C)Multilevel Security Mode
D)All of the above.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
In Peggy's office, all users have a security clearance to access information, but don't necessarily need to know all the information processed on the system. Why type of security mode is this?
A)System High-Security Mode
B)Dedicated Security Mode
C)Multilevel Security Mode
D)All of the above
A)System High-Security Mode
B)Dedicated Security Mode
C)Multilevel Security Mode
D)All of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Nathan worked for the U.S. Department of Defense when they developed the Trusted Computer System Evaluation Criteria (TCSEC). What is this book known as?
A)The Blue Book
B)The Yellow Book
C)The Orange Book
D)The Green Book
A)The Blue Book
B)The Yellow Book
C)The Orange Book
D)The Green Book
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
S. Department of Defense developed the Trusted Computer System Evaluation Criteria (TCSEC) to evaluate operating systems, applications, and different other products. What is not one of the four criteria topics in the book?
A)Accountability
B)Assurance
C)Security Policy
D)Security Infrastructure
A)Accountability
B)Assurance
C)Security Policy
D)Security Infrastructure
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
What type of application is written to think it is the only program running on an operating system?
A)Time-of-Check
B)Virtual Address Space Mapping
C)Maintenance Hooks
D)Multiplexing Mapping
A)Time-of-Check
B)Virtual Address Space Mapping
C)Maintenance Hooks
D)Multiplexing Mapping
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
What identifies blocks of memory that were once allocated, but are no longer in use and de-allocates the blocks and marks them as free?
A)Postmortem Intake
B)Data Release
C)Garbage collector
D)Error Handling
A)Postmortem Intake
B)Data Release
C)Garbage collector
D)Error Handling
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
Jeremy wants to sneak unauthorized information in an unauthorized manner. How would he do that?
A)Channel Decipher
B)Covert Channels
C)Storage Convert
D)Decipher Storage
A)Channel Decipher
B)Covert Channels
C)Storage Convert
D)Decipher Storage
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
What do security evaluations examine?
A)Security-relevant parts of a system
B)Assurance Policies
C)Security Policies
D)Security Infrastructure of department
A)Security-relevant parts of a system
B)Assurance Policies
C)Security Policies
D)Security Infrastructure of department
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
What was the first attempt at establishing a single standard for evaluating security attributes of computer systems and products by many European countries?
A)Trusted Computer System Evaluation Criteria
B)Information Technology Security Evaluation Criteria
C)Both A and B
D)Neither A nor B
A)Trusted Computer System Evaluation Criteria
B)Information Technology Security Evaluation Criteria
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
What type of model enables an application system to be divided across multiple platforms?
A)Environment Model
B)Application Model
C)Client/Server Model
D)Functionality Model
A)Environment Model
B)Application Model
C)Client/Server Model
D)Functionality Model
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
What is a collection of data stored in a meaningful way that enables multiple users and application to access, view, and modify data as needed?
A)Data Administrators
B)Labeling Systems
C)Databases
D)Manager Systems
A)Data Administrators
B)Labeling Systems
C)Databases
D)Manager Systems
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language separates data into components that run as middleware on a client or server?
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows a Java application to communicate with a database?
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to access back-end database systems?
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Databases are built with programming languages. Which item is not a database language?
A)Data Definition Language
B)Data Manipulation Language
C)Query Language
D)All of the above are languages.
A)Data Definition Language
B)Data Manipulation Language
C)Query Language
D)All of the above are languages.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
If Janet wanted to know data about the data, where could she find that information?
A)Foreign Key
B)Primary Key
C)Data Dictionary
D)Query Base
A)Foreign Key
B)Primary Key
C)Data Dictionary
D)Query Base
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service has uniqueness constraints?
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service deals with foreign keys and primary keys?
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service guarantees that the tuples are uniquely identified by primary key values?
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
A)Rollback Integrity
B)Semantic Integrity
C)Entity Integrity
D)Referential Integrity
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
What has been done if a currant database transaction is cancelled?
A)Integrity Check
B)Commit
C)Rollback
D)Savepoint
A)Integrity Check
B)Commit
C)Rollback
D)Savepoint
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Because threats can be introduced when more than one database is being updated, protection is needed. What can provide that protection?
A)Online Transaction Processing
B)Cell Suppression
C)Content-Dependent Access Control
D)ACID Characteristics
A)Online Transaction Processing
B)Cell Suppression
C)Content-Dependent Access Control
D)ACID Characteristics
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
I want to find out the correlations between information to create metadata. What do I need to do first?
A)Online Transaction Processing
B)Cell Suppression
C)Content-dependent Access Control
D)Data Mining
A)Online Transaction Processing
B)Cell Suppression
C)Content-dependent Access Control
D)Data Mining
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
Yesterday my computer crashed. I think it encountered something that it perceived as insecure. My system seems to be trying to respond to the crash. What options does the computer have?
A)System Reboot
B)Emergency System Restart
C)System Cold Start
D)All of the above
A)System Reboot
B)Emergency System Restart
C)System Cold Start
D)All of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
What protocol works at the transport layer and performs authentication by certification?
A)Secure HTTP
B)Secure Socket Layer
C)Secure Electronic Transaction
D)Cookies
A)Secure HTTP
B)Secure Socket Layer
C)Secure Electronic Transaction
D)Cookies
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
What is the technical specification that indicates how multimedia data and e-mail attachments are to be transferred?
A)Multipurpose Internet Mail Extension (MIME)
B)Privacy-Enhanced Mail (PEM)
C)Message Security Protocol (MSP)
D)Pretty Good Privacy (PGP)
A)Multipurpose Internet Mail Extension (MIME)
B)Privacy-Enhanced Mail (PEM)
C)Message Security Protocol (MSP)
D)Pretty Good Privacy (PGP)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Steven is paying for a product he just purchased over the web. As he types in his credit card number, the number gets encrypted. What type of technology is this?
A)Multipurpose Internet Mail Extension (MIME)
B)HTTP Secure (HTTPS)
C)Message Security Protocol (MSP)
D)Secure Electronic Transaction (SET)
A)Multipurpose Internet Mail Extension (MIME)
B)HTTP Secure (HTTPS)
C)Message Security Protocol (MSP)
D)Secure Electronic Transaction (SET)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
Today, I have been to 17 different websites and each has recorded my interest on the sites. What technology is being used?
A)Cookies
B)HTTP Secure (HTTPS)
C)Message Security Protocol (MSP)
D)Secure electronic Transaction (SET)
A)Cookies
B)HTTP Secure (HTTPS)
C)Message Security Protocol (MSP)
D)Secure electronic Transaction (SET)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
What type of access control uses a private key to encrypt a hash value?
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Cryptographic Keys
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Cryptographic Keys
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Bill is storing and transmitting data that can only be read by those that are intended to read it. What is Bill practicing?
A)Calligraphy
B)Topography
C)Cryptography
D)All of the above
A)Calligraphy
B)Topography
C)Cryptography
D)All of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
Encryption is a method of transforming readable data into non-readable data. Which term is not related to encryption?
A)Plaintext
B)Cryptosystem
C)Ciphertext
D)Calligraphy
A)Plaintext
B)Cryptosystem
C)Ciphertext
D)Calligraphy
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
Darrell and Ken are in an argument. Darrell believes algorithms should be publically known, while Ken believes algorithms should be kept secret. What is being argued?
A)Newton's Principle
B)Cipher Principle
C)Kerckhoff's Principle
D)Plain Text Principle
A)Newton's Principle
B)Cipher Principle
C)Kerckhoff's Principle
D)Plain Text Principle
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
Fred is encrypting a message to a coworker that is full of gossip, so his encryption strength had better be good. What doesn't Fred have to worry about when it comes to encryption strength?
A)Key Secrecy
B)Initialization Vectors
C)Key Length
D)What the message is
A)Key Secrecy
B)Initialization Vectors
C)Key Length
D)What the message is
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
Jenny has hidden a message to a coworker about a love triangle involving the boss in the company logo she used in the e-mail. What is Jenny practicing?
A)Stenography
B)Cryptology
C)Steganography
D)Trick Photography
A)Stenography
B)Cryptology
C)Steganography
D)Trick Photography
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
For a cipher to be strong and avoid being broken, two elements must be a part of the encryption. Which attribute pertains to making the relationship between the key and resulting ciphertext as complex as possible?
A)Diffusion
B)Confusion
C)Boxing
D)Blocking
A)Diffusion
B)Confusion
C)Boxing
D)Blocking
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
For a cipher to be strong and avoid being broken, two elements must be a part of the encryption. Which attribute causes a single plaintext bit to have influence over several other ciphertext bits?
A)Diffusion
B)Confusion
C)Boxing
D)Blocking
A)Diffusion
B)Confusion
C)Boxing
D)Blocking
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
John is creating an encryption by replacing every third letter of the alphabet by the fifth letter to its left. Sally, an expert at encryption, immediately notices the pattern and suggests for John to use random values. What would John use to do this?
A)Randomization
B)Initialization Vectors
C)Mapping
D)Isolation
A)Randomization
B)Initialization Vectors
C)Mapping
D)Isolation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
There are two commonly used modes of encryption implementations. Which mode does not encrypt parameters that different link devices use to synchronize communication methods?
A)End-to-end Encryption
B)Note Encryption
C)Link Encryption
D)Layered Encryption
A)End-to-end Encryption
B)Note Encryption
C)Link Encryption
D)Layered Encryption
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
There are two commonly used modes of encryption implantations. Which mode of encryption implementation enables attackers to learn about a captured packet and where it is headed?
A)End-to-end Encryption
B)Note Encryption
C)Link Encryption
D)Layered Encryption
A)End-to-end Encryption
B)Note Encryption
C)Link Encryption
D)Layered Encryption
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
What algorithm enables two systems to exchange a symmetric key securely without requiring a previous relationship?
A)The Ericka Algorithm
B)Cipher-based Algorithm
C)Diffie-Hellman Algorithm
D)The Middleton Algorithm
A)The Ericka Algorithm
B)Cipher-based Algorithm
C)Diffie-Hellman Algorithm
D)The Middleton Algorithm
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
Jack is happy that he has not had to pay for e-mail security since 1991 because of Phil Zimmerman. What email security does Jack use?
A)Multipurpose Internet Mail Extension (MIME)
B)Privacy-Enhanced Mail (PEM)
C)Message Security Protocol (MSP)
D)Pretty Good Privacy (PGP)
A)Multipurpose Internet Mail Extension (MIME)
B)Privacy-Enhanced Mail (PEM)
C)Message Security Protocol (MSP)
D)Pretty Good Privacy (PGP)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Jeff keeps trying to successfully attack against an algorithm that has yet to be successfully attacked. What algorithm is Jeff attempting to attack?
A)Blowfish
B)International Data Encryption Algorithm (IDEA)
C)RC4
D)RC6
A)Blowfish
B)International Data Encryption Algorithm (IDEA)
C)RC4
D)RC6
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. What algorithm is easier to perform than to decipher?
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)Knapsack
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)Knapsack
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. Which algorithm is the most efficient, is mathematically rich, and uses the least resources?
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)Knapsack
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)Knapsack
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
Cryptography is really an issue of mathematics being used to put code into an undecipherable form or algorithms. Which algorithm takes a variable-length string and message and produces a fixed-length value?
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)One-Way Hash
A)El Gamal
B)Elliptic Curve Cryptosystems
C)One-Way Functions
D)One-Way Hash
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
What prevents a pattern in Cipher Block Chaining mode by taking the value of one block and adding it to the next block value within the algorithm?
A)Cipher Feedback Mode
B)Cipher Block Chaining (CBC)
C)Counter Mode (CTR)
D)Output Feedback Mode (OFB)
A)Cipher Feedback Mode
B)Cipher Block Chaining (CBC)
C)Counter Mode (CTR)
D)Output Feedback Mode (OFB)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Often, information security experts just focus on attacks through a port, modem, or wireless access port and overlook the possibility of physical attacks. What would be considered a physical attack?
A)Politically-motivated Threats
B)Manmade Threats
C)Both A and B
D)Neither A nor B
A)Politically-motivated Threats
B)Manmade Threats
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Peter has been hired by XYZ Corp. to design their new building. Peter is an expert in environmental design and crime. What discipline is practiced by Peter?
A)Crime Prevention through Environmental Design (CPTED)
B)Crime Prevention for Computer System Theft (CPCS)
C)Environmental Design for Security (EDS)
D)All of the Above
A)Crime Prevention through Environmental Design (CPTED)
B)Crime Prevention for Computer System Theft (CPCS)
C)Environmental Design for Security (EDS)
D)All of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
Environmental risks are always at hand and human behavior is unpredictable. What is usually the first line of defense?
A)Alarm
B)Curb
C)Security Guard
D)Fence
A)Alarm
B)Curb
C)Security Guard
D)Fence
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
Crime Prevention through Environmental Design (CPTED) professionals have three main strategies to protect properties. Which is not one of them?
A)Natural Access Control
B)Natural Surveillance
C)People Placement Control
D)Natural Territorial Reinforcement
A)Natural Access Control
B)Natural Surveillance
C)People Placement Control
D)Natural Territorial Reinforcement
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
What should not be used in protected areas and are used to create barriers between areas?
A)Internal Offices
B)Office partitions
C)Internal Compartments
D)Office Spaces
A)Internal Offices
B)Office partitions
C)Internal Compartments
D)Office Spaces
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
Electric power is necessary for modern life. Companies must understand power issues to protect their computer systems. When clean power is used, there is no interference or voltage fluctuation. What is the proper term for line noise?
A)Electromagnetic Interference
B)Line Disturbance
C)Electromagnetic Disturbance
D)None of the Above
A)Electromagnetic Interference
B)Line Disturbance
C)Electromagnetic Disturbance
D)None of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
What does a device using a metal oxide varistor protect against?
A)Electromagnetic Interference
B)Line Disturbance
C)Power Surges
D)Brownouts
A)Electromagnetic Interference
B)Line Disturbance
C)Power Surges
D)Brownouts
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
What do constant voltage transformers regulate?
A)Power Surges
B)Brownouts
C)Blackouts
D)None of the above
A)Power Surges
B)Brownouts
C)Blackouts
D)None of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
It has been raining on and off the last month and extremely hot on some days. There has been a lot of static and it appears that one of the wires at your desk is corroding. What can cause these two problems?
A)Rain
B)Humidity
C)Hot Spells
D)All of the Above
A)Rain
B)Humidity
C)Hot Spells
D)All of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
What type of air-conditioning system maintains air quality and lessens contaminants?
A)Open-loop
B)Closed-loop
C)Both A and B
D)Neither A nor B
A)Open-loop
B)Closed-loop
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
What type of lock provides protection from bystanders learning a set code?
A)Combination Locks
B)Tumbler Locks
C)Cipher Locks
D)Pin Tumbler Locks
A)Combination Locks
B)Tumbler Locks
C)Cipher Locks
D)Pin Tumbler Locks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Shelia notices that her computer hardware isn't working properly. She has also noticed that the night cleaning crew hasn't been in for a week. What could be causing Shelia's hardware problems?
A)Dust
B)Fingerprints within the computer system
C)Smoke
D)All of the Above
A)Dust
B)Fingerprints within the computer system
C)Smoke
D)All of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
Which device is a smoke-activated detector and is good at early warnings?
A)Fire Suppressors
B)Fire Extinguishers
C)Photoelectric
D)None of the Above
A)Fire Suppressors
B)Fire Extinguishers
C)Photoelectric
D)None of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Where are wiring and cables strung?
A)Overhead Areas
B)Areas Underground
C)Plenum Areas
D)Perimeter of Building
A)Overhead Areas
B)Areas Underground
C)Plenum Areas
D)Perimeter of Building
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Fire can cause massive losses and cost lots in damage. What type of gas is used to interfere with the chemical reaction of fire?
A)FM-200
B)NAF-S-III
C)CEA-410
D)All of the Above
A)FM-200
B)NAF-S-III
C)CEA-410
D)All of the Above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
What gas is no longer used to interrupt the chemical reaction of fire due to it causing ozone depletion?
A)FM-200
B)Am-200
C)Halon
D)Helium
A)FM-200
B)Am-200
C)Halon
D)Helium
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
Mike is placing portable fire extinguishers around the building where there is electrical equipment. How far should these fire extinguishers be from the electrical equipment?
A)10 ft
B)75 ft
C)25 ft
D)50 ft
A)10 ft
B)75 ft
C)25 ft
D)50 ft
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
What do CCTVs, electromechanical devices, and vibration sensors have in common?
A)They are Photoelectric Systems.
B)They are Intrusion Detection Devices.
C)They are Passive Infrared Systems.
D)They are Acoustical detection Systems.
A)They are Photoelectric Systems.
B)They are Intrusion Detection Devices.
C)They are Passive Infrared Systems.
D)They are Acoustical detection Systems.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
Doors come in many different styles and functionalities, such as vault doors or industrial doors. When two doors are used to stop an individual from getting in or out what are being created?
A)Door-jam
B)Door-block
C)Mantrap
D)Man-block
A)Door-jam
B)Door-block
C)Mantrap
D)Man-block
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
You are a security guard on the night shift. As you watch the CCTVs, you see the outside lights turn on within a specific area. What type of intrusion detection system are you evaluating?
A)CCTV
B)Responsive Area Illumination
C)Responsive Tracking
D)CCTV Activated lighting
A)CCTV
B)Responsive Area Illumination
C)Responsive Tracking
D)CCTV Activated lighting
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck