Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Drew University IS MISC Quiz 4 1)Criminals tend to pick locks because it is a stealthy way to bypass a lock and can make it harder for the victim to determine what has happened

Drew University IS MISC Quiz 4 1)Criminals tend to pick locks because it is a stealthy way to bypass a lock and can make it harder for the victim to determine what has happened

Business

Drew University

IS MISC

Quiz 4

1)Criminals tend to pick locks because it is a stealthy way to bypass a lock and can make it harder for the victim to determine what has happened.

 

 

 

Question 2

A retina pattern system is an eye recognition system that matches the person's blood vessels on the back of the eye.

 

 

 

 

Question 3

Because Voice over IP (VoIP) data is transmitted over a network as data packets much like any other data, it is susceptible to most of the attacks that affect regular data transmission.

 

 

Question 4

When it comes to fencing, 2-inch mesh is more secure than 3/8-inch mesh.

 

 

Question 5

Which type of token does NOT require that the card be inserted or slid through a reader?

 

 

Question 6

Polycarbonate acrylic windows are much stronger than standard glass, offering superior protection.

 

 

 

Question 7

Which of the following types of authentication is based on a behavioral or physiological characteristic that is unique to an individual?

 

 

Question 8

 

Lin is designing the locks for a sensitive data center facility. She would like to choose the strongest possible lock that is appropriate for use in a commercial facility. What type of lock should she choose?

 

 

Question 9

 

Sniffers are physical devices used to record everything a person types on the keyboard.

 

 

 

Question 10

 

Which of the following lock types are smart and programmable?

 

 

Question 11

 

Information in faxes is generally transmitted in a protected manner.

 

Question 12

Which of the following is a disadvantage of alarms?

 

 

 

Question 13

When considering closed circuit TV as a security measure, the focal length must be considered. What is focal length?

Question 14

Which type of physical control device is commonly used at sporting events, subways, and amusement parks to slow the flow of foot traffic into areas and allow screening and authentication of individuals prior to entering an area?

 

 

 

Question 15

 

A point where all traffic must enter or exit a facility is called a                                                       .

 

 

Question 16

 

Encryption can be applied on a file, a folder, or an entire hard disk.

 

 

Question 17

 

by a key, combination, or keycard is a                                           .

 

 

Question 18

 

A measurement of the percentage of individuals who should have been granted to a system via biometrics but were not allowed access is called the                                                                                                       .

 

 

Question 19

 

A fence should limit an intruder's access to a facility as well as provide a psychological barrier.

 

 

Question 20

Which of the following is NOT true of lighting?

 

Question 21

 

 

Bollards must be permanent structures to prevent vehicles from ramming buildings.

 

 

Question 22

 

Vandalism is a type of human security threat.

 

 

Question 23

 

Mateo is testing a new biometric security control. In his testing, 10 authorized users attempted to access the facility; 9 of them were granted access while 1 was denied access. Ten unauthorized users also attempted to access the facility but all were turned away. What is the false rejection rate (FRR) of this control?

 

 

 

Question 24

 

A structure that replaces a normal single door with a phone booth-sized space with a door on each side is called a                                                                                             .

 

 

Question 25

 

In information security, the concept of defense in depth is based on the concept of layering more than one control. These controls can be physical, administrative, or technical in design.

 

 

Question 26

 

The environment in which a new facility is constructed has little impact on the level and type of security needed.

 

 

 

Glare can be an issue with lighting used as a security control.

 

 

Question 28

 

Security guards can be very real deterrents in addition to being able to make decisions and think through situations.

 

 

 

Question 29

 

From a security standpoint, which of the following is NOT desirable in a door?

 

 

Question 30

 

A measurement of the percentage of individuals who have gained access to a system via biometrics but should not have been granted such access is called                                                                                                          .

 

 

Question 31

 

Courtney is designing a physical security program for a store she manages. She would like to prevent vehicles from driving through the front doors of the store but not restrict pedestrian access. What is the most appropriate control?

 

 

Question 32

For security purposes, a facility can never have too much lighting.

 

 

Question 33

 

before they may be reused. Which of the following provides the strongest level of protection?

 

 

Question 34

 

Infrared intrusion detection systems can detect activity outside the normal visual range.

 

 

 

Question 35

 

Mantraps encourage piggybacking, which is the practice of one individual opening the door to let several others enter.

 

 

Question 36

 

Greg is designing the lighting scheme for a building. He would like the lights to be randomly turned on to create an impression of activity. Which lighting scheme should he use?

 

 

Question 37

 

Bluetooth, which is a short-range communication technology, has been shown to be very difficult to attack.

 

 

Question 38

 

Which of the following allows the placing of telephone calls over computer networks and the Internet?

 

 

Question 39

 

Which of the following is NOT a step in the common lock picking method of scraping?

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

7.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions