CH 4

Ace your homework & exams now with Quizwiz!

Lock

A mechanical or electronic device designed to secure, hold, or close items operated by a key, combination, or keycard. Locks tend to be the most widely used security device

Biometrics

A mechanism that authenticates an individual through the use of physical traits such as fingerprints, facial recognition, voice-prints, or other distinguishing characteristics

False rejection rate (FRR)

A metric used to describe the probability that a bio metric system will incorrectly reject and authorized user

False acceptance rate (FAR)

A metric used to describe the probability that a bio-metric system will incorrectly accept an unauthorized user

Turnstile

A one-way gate or access control mechanism used to limit traffic and control the flow of people. Commonly observed in locations such as subways and amusements parks

Bollard

A physical barrier that can take the form of heavy steel or concrete posts or subtle structures such as brick and concrete flowerbeds that are designed to prevent ramming attacks from motor vehicles

While guards and dogs are both good for physical security, which of the following more commonly applies to dogs? A. Liability B. Discernment C. Dual Role D. Multifunction

A. Liability

In the field of IT security, the concept of defense is layering more than one control on another. A. True B. False

A. True

During an assessment, you discovered that the target company was using a fax machine. Which of the following is the least important? A. the phone number is publicly available B. the fax machine is in an open, unsecured area C. faxes frequently sit in the printer tray D. the fax machine uses a ribbon

A. the phone number is publicly available

Physical security is less important than logical security. A. True B. False

B. False

Which type of biometric system is frequently found on laptops? A. retina B. fingerprint C. iris D. voice recognition

B. fingerprint

A ______ is used to prevent cars from ramming building.

Bollard

What grade of lock would be appropriate to protect a critical business asset? A. 4 B. 2 C. 1 D. 3

C. 1

____ is a common physcial control that can be used as both a detective and reactive tool. A. A fence B. an alarm C. CCTV D. a lock

C. CCTV

For a fence to deter a determined intruder, it should be at least ___ feet tall. A. four B. five C. eight D. ten

C. eight

_______ defines the camera's effectiveness in viewing objects from a horizontal and vertical view. A. Granularity B. Ability to zoom C. Field of view D. Focal Length

D. Focal Length

______ is an intrusion detection system used exclusively in conjunction with fences. A. Infrared wave patter B. motion detector C. RFID D. PIDAS

D. PIDAS

What do lock pick sets typically contain at a minimum? A. tension wrenches and drivers B. a pick C. a pick and a driver D. a pick and a tension wrench

D. a pick and a tension wrench

A Type 2 error is also known as what? A. false rejection rate B. failure rate C. crossover error rate D. false acceptance rate

D. false acceptance rate

Bluetooth

Short-range wireless technology used to support communication between devices such as cell phones, PDAs, laptops and other types of devices. An open standard designed to support personal area networking (PAN) enviornments


Related study sets

Week 8: Software Testing (Part 2) - CS 427

View Set

Administration and Communication II

View Set

sport psychology chap 3 motivation

View Set

Texas Real Estate Principles 1 (Allied)

View Set

Biology lesson 3.20 Respiration and photosynthesis

View Set