Download 27 Questions on Host Applications and Data Security - Quiz 4 | CET 4663 and more Quizzes Electrical and Electronics Engineering in PDF only on Docsity! Quiz #4 Chapter 4: Host, Application, and Data Security Due Feb 16 at 11:59pm Points 35 Questions 27 Available after Feb 8 at 8am Time Limit None Allowed Attempts Unlimited Attempt History Attempt Time Score LATEST Attempt 1 17 minutes 35 out of 35 Score for this attempt: 35 out of 35 Submitted Feb 8 at 9:35am This attempt took 17 minutes. Take the Quiz Again 9 / 9 ptsQuestion 1 Match each term with the correct statement below. Use a key to open the lock from the outside Keyed entry locks Correct! Lock the door but have access to unlock from the outside via a small hole Privacy locks Correct! Lock the door from the inside but cannot be unlocked from the outside Patio locks Correct! Latch a door closed yet do not lock; typically used on hall and closet doors Passage locks Correct! Most common type of door lock for keeping out intruders, but its security is minimal Standard keyed entry locks Correct! Extends a solid metal bar into the door frame for extra security Deadbolt locks Correct! The outside is always locked, entry is by key only, and the inside lever is always unlocked Storeroom locks Correct! The outside can be locked or unlocked, and the inside lever is always unlocked Classroom locksCorrect! Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time Store entry double cylinder locks Correct! 1 / 1 ptsQuestion 2 ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door. Biometric locks Cipher locks Correct! Multifactor locks Reaction locks 1 / 1 ptsQuestion 3 A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object. Ulock safe lock shield lock cable lock Correct! 1 / 1 ptsQuestion 4 An anticlimb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing. flat collar spiked collar Correct! slippery collar sharp collar 1 / 1 ptsQuestion 5 A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it. bollard Tailgate sensors Correct! Proximity sensors 1 / 1 ptsQuestion 14 ____ is defined as a security analysis of the transaction within its approved context. Content aggregation Content inspection Correct! Content delivery Content management 1 / 1 ptsQuestion 15 Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service. DLP manager DLP control DLP agent Correct! DLP cipher 1 / 1 ptsQuestion 16 Instead of using a key or entering a code to open a door, a user can display a ____ to identify herself. logical token physical sensor physical token Correct! hybrid sensor 1 / 1 ptsQuestion 17 The signal from an ID badge is detected as the owner moves near a ____, which receives the signal. proximity reader Correct! mantrap barcode scanner magnetic scanner 1 / 1 ptsQuestion 18 ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags. wave pulse AFID RFID Correct! 1 / 1 ptsQuestion 19 Passive tags have ranges from about 1/3 inch to ____ feet. 12 15 19 Correct! 25 1 / 1 ptsQuestion 20 A ____ is designed to separate a nonsecured area from a secured area. lockout mantrap Correct! closet pit 1 / 1 ptsQuestion 21 Using video cameras to transmit a signal to a specific and limited set of receivers is called ____. CCTV Correct! ICTV IPTV ITV 1 / 1 ptsQuestion 22 Securing a restricted area by erecting a barrier is called ____. blocking boundary placement fencing Correct! moating 1 / 1 ptsQuestion 23 Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security based software applications, and monitoring logs. True Correct! False 1 / 1 ptsQuestion 24 Keyed entry locks are much more difficult to defeat than deadbolt locks. True False Correct! 1 / 1 ptsQuestion 25 Cipher locks are the same as combination padlocks. True False Correct! 1 / 1 ptsQuestion 26 Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners. True Correct! False