Deck 22: Security Hardware
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
Play
Full screen (f)
Deck 22: Security Hardware
1
Surrounding a building with a moat is a good way to prevent all but the most serious individuals from attempting to gain access.
True
2
Inexpensive video cameras may be used for ____ facial recognition.
A) biological
B) synthetic
C) biometric
D) digital
A) biological
B) synthetic
C) biometric
D) digital
C
3
An integrated IDS appliance combines the tap and analysis software all in one device.
True
4
Iris scanning uses patterns in the iris to generate a biometric ____.
A) synthesis
B) template
C) token
D) methodology
A) synthesis
B) template
C) token
D) methodology
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ is an unsecure network that operates between the public Internet and the private LAN.
A) DMC
B) DMZ
C) DML
D) HDZ
A) DMC
B) DMZ
C) DML
D) HDZ
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
Just running a RAID Level 5 system means your data are completely safe.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.
A) Physical security
B) Network security
C) Virtual security
D) Intermediate security
A) Physical security
B) Network security
C) Virtual security
D) Intermediate security
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.
A) 1
B) 2
C) 3
D) 4
A) 1
B) 2
C) 3
D) 4
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ is an entryway into a secure area that contains two doors.
A) caltrap
B) moat
C) manbreak
D) mantrap
A) caltrap
B) moat
C) manbreak
D) mantrap
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
Wireless networks can be found easily while driving around a neighborhood with a wireless laptop in your car in a technique called ____.
A) wan whacking
B) war stalking
C) war driving
D) wireless warring
A) wan whacking
B) war stalking
C) war driving
D) wireless warring
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
_____________________ involves the process of identifying a user to a computer.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
Iris scanners are more invasive than retinal scanners.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
____ is concerned with understanding what a person is saying.
A) Voice recognition
B) Voice authentication
C) Voice processing
D) Voice translation
A) Voice recognition
B) Voice authentication
C) Voice processing
D) Voice translation
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
____ is concerned with understanding who is doing the talking.
A) Voice recognition
B) Voice analysis
C) Voice reproduction
D) Voice authentication
A) Voice recognition
B) Voice analysis
C) Voice reproduction
D) Voice authentication
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
Hard drives that can be removed and connected to a running system are called ____ hard drives.
A) cold swappable
B) warm pluggable
C) hot swappable
D) warm releasable
A) cold swappable
B) warm pluggable
C) hot swappable
D) warm releasable
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
While nothing can prevent a lost connection due to an unplugged cable, the use of multi-homed computers means that two cables would have to be unplugged at the same time.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss handwriting authentication.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Describe an Intrusion Detection System.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
What are biometric devices?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Describe the types of doors and locks that should be used to secure an area.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
Describe a physical security plan.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Match between columns
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck