Filters
Question type

Study Flashcards

What is the difference between deterrent controls and preventive controls?​

Correct Answer

verifed

verified

Deterrent controls attempt to ...

View Answer

Most DLP systems make use of what method of security analysis below?


A) Content aggregation
B) Content inspection
C) Content delivery
D) Content management

Correct Answer

verifed

verified

Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?


A) Lockout sensors
B) Engineering sensors
C) Tailgate sensors
D) Proximity sensors

Correct Answer

verifed

verified

Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?


A) ​Remote Read Tag (RRT)
B) ​Radio Frequency Identification tag (RFID)
C) ​Barcode tag (BT)
D) ​Magnetic tag (MT)

Correct Answer

verifed

verified

Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?


A) heuristic detection
B) pattern detection
C) hybrid detection
D) combination detection

Correct Answer

verifed

verified

Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:


A) U-lock
B) safe lock
C) shield lock
D) cable lock

Correct Answer

verifed

verified

A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:


A) ​Mainframe
B) ​Integrated system
C) ​Embedded system
D) ​Internal system

Correct Answer

verifed

verified

Describe a mantrap.

Correct Answer

verifed

verified

A mantrap is designed to separate a nons...

View Answer

Match the following terms to the appropriate definitions. -​A nonrelational database that is better tuned for accessing large data sets.


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​An operating system for Google Android smartphones and other devices.


A) Access list
B) Activity phase controls
C) Android
D) Barricade
E) Bayesian filtering
F) Cross-site request forgery (XSRF)
G) Fuzz testing
H) iOS
I) NoSQL
J) Supervisory control and data acquisition (SCADA)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer