Filters
Question type

Iris scanners are more invasive than retinal scanners.

A) True
B) False

Correct Answer

verifed

verified

Iris scanning uses patterns in the iris to generate a biometric ____.


A) synthesis
B) template
C) token
D) methodology

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Hard drives that can be removed and connected to a running system are called ____ hard drives.


A) cold swappable
B) warm pluggable
C) hot swappable
D) warm releasable

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What are biometric devices?

Correct Answer

verifed

verified

Biometric devices use a physical feature of one's body to assist in authentication.

RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.


A) 1
B) 2
C) 3
D) 4

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Match each item with a statement below. -The ability of a computer or a computer network to keep operating in the event of a hardware failure


A) Multi-homed
B) Intrusion Detection System
C) Link aggregation
D) Fault tolerance
E) Hardening

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

D

Describe the types of doors and locks that should be used to secure an area.

Correct Answer

verifed

verified

Any door used to block access to a secur...

View Answer

Match each item with a statement below. -The process of making a server more secure by turning off un-necessary protocols and services,applying up-to-date patches,and securing the applications that run on the server


A) Multi-homed
B) Intrusion Detection System
C) Link aggregation
D) Fault tolerance
E) Hardening

F) C) and D)
G) A) and E)

Correct Answer

verifed

verified

Discuss handwriting authentication.

Correct Answer

verifed

verified

We are very familiar with having to sign...

View Answer

____ is concerned with understanding who is doing the talking.


A) Voice recognition
B) Voice analysis
C) Voice reproduction
D) Voice authentication

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Describe an Intrusion Detection System.

Correct Answer

verifed

verified

IDS stands for Intrusion Detection Syste...

View Answer

A ____ is an entryway into a secure area that contains two doors.


A) caltrap
B) moat
C) manbreak
D) mantrap

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.

Correct Answer

verifed

verified

Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.

Correct Answer

verifed

verified

Describe a physical security plan.

Correct Answer

verifed

verified

With so many methods of providing physic...

View Answer

A(n) ____ is an unsecure network that operates between the public Internet and the private LAN.


A) DMC
B) DMZ
C) DML
D) HDZ

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.

Correct Answer

verifed

verified

Just running a RAID Level 5 system means your data are completely safe.

A) True
B) False

Correct Answer

verifed

verified

____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.


A) Physical security
B) Network security
C) Virtual security
D) Intermediate security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A

Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.

Correct Answer

verifed

verified

Showing 1 - 20 of 30

Related Exams

Show Answer