Deck 22: Security Hardware
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 22: Security Hardware
1
Iris scanning uses patterns in the iris to generate a biometric ____.
A)synthesis
B)template
C)token
D)methodology
A)synthesis
B)template
C)token
D)methodology
B
2
Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.
piggybacking
3
Inexpensive video cameras may be used for ____ facial recognition.
A)biological
B)synthetic
C)biometric
D)digital
A)biological
B)synthetic
C)biometric
D)digital
C
4
_____________________ involves the process of identifying a user to a computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
____ is concerned with understanding who is doing the talking.
A)Voice recognition
B)Voice analysis
C)Voice reproduction
D)Voice authentication
A)Voice recognition
B)Voice analysis
C)Voice reproduction
D)Voice authentication
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Wireless networks can be found easily while driving around a neighborhood with a wireless laptop in your car in a technique called ____.
A)wan whacking
B)war stalking
C)war driving
D)wireless warring
A)wan whacking
B)war stalking
C)war driving
D)wireless warring
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
An integrated IDS appliance combines the tap and analysis software all in one device.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
Just running a RAID Level 5 system means your data are completely safe.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.
A)Physical security
B)Network security
C)Virtual security
D)Intermediate security
A)Physical security
B)Network security
C)Virtual security
D)Intermediate security
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Surrounding a building with a moat is a good way to prevent all but the most serious individuals from attempting to gain access.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is an entryway into a secure area that contains two doors.
A)caltrap
B)moat
C)manbreak
D)mantrap
A)caltrap
B)moat
C)manbreak
D)mantrap
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.
A)1
B)2
C)3
D)4
A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
____ is concerned with understanding what a person is saying.
A)Voice recognition
B)Voice authentication
C)Voice processing
D)Voice translation
A)Voice recognition
B)Voice authentication
C)Voice processing
D)Voice translation
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Hard drives that can be removed and connected to a running system are called ____ hard drives.
A)cold swappable
B)warm pluggable
C)hot swappable
D)warm releasable
A)cold swappable
B)warm pluggable
C)hot swappable
D)warm releasable
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Iris scanners are more invasive than retinal scanners.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
While nothing can prevent a lost connection due to an unplugged cable,the use of multi-homed computers means that two cables would have to be unplugged at the same time.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
A(n)____ is an unsecure network that operates between the public Internet and the private LAN.
A)DMC
B)DMZ
C)DML
D)HDZ
A)DMC
B)DMZ
C)DML
D)HDZ
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Describe an Intrusion Detection System.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
A combination of hardware and software that is used to detect malicious traffic on a network,such as a denial of service attack,worms,and network-based exploits
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
A combination of hardware and software that is used to detect malicious traffic on a network,such as a denial of service attack,worms,and network-based exploits
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
Computers with two network adapters
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
Computers with two network adapters
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
Can be used to combine the bandwidth of two network adapters
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
Can be used to combine the bandwidth of two network adapters
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
What are biometric devices?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Describe the types of doors and locks that should be used to secure an area.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
The process of making a server more secure by turning off un-necessary protocols and services,applying up-to-date patches,and securing the applications that run on the server
Match each item with a statement below.
a.Multi-homed
d.Fault tolerance
b.Intrusion Detection System
e.Hardening
c.Link aggregation
The process of making a server more secure by turning off un-necessary protocols and services,applying up-to-date patches,and securing the applications that run on the server
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss handwriting authentication.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Describe a physical security plan.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck