100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber Security Exam Review |Complete Questions with A+ Graded Answers $9.59   Add to cart

Exam (elaborations)

Cyber Security Exam Review |Complete Questions with A+ Graded Answers

 5 views  0 purchase
  • Course
  • Institution

Cyber Security Exam Review Which of the following is a physical access control? A receptionist What is the most widely used first factor in a multi-factor authentication scheme? A password _________ is a major security tool that adds value to an object or to information. Exclusion ...

[Show more]

Preview 2 out of 9  pages

  • April 18, 2024
  • 9
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Cyber Security Exam Review
Which of the following is a physical access control?
A receptionist


What is the most widely used first factor in a multi-factor authentication scheme?
A password


_________ is a major security tool that adds value to an object or to information.
Exclusion


Examine Figure CT-1 and determine which of the following security devices would be most
effective in detecting intruders that circumvent the detectors on the exterior gates.
An IR activated camera


From the following options, select the camera with the best set of specifications for monitoring a 24/7
cash machine that must operate in both day time and low-level night time lighting conditions, while
providing a high-resolution, detailed view to monitor the different banking functions the machine is
used for.
Camera 1 - 2240 x 1680 pixel resolution, 0.5 lux rating


What type of security camera provides the ability to maintain a degree of secrecy by using
illumination that is outside of the visible light spectrum?
Infrared security camera


In an infrastructure security system, which perimeter is typically involves physical barriers such as
walls, doors and windows?
The Inner perimeter


Identify the advantages associated with selecting an IP camera over any other camera types.
IP addressing capabilities


If you are implementing a relay-controlled gate in the outer perimeter of a remotely-located
electrical substation, what type of control circuit would you create for the controller?
Fail secure


What type of solenoid operated deadbolt lock would you install on an exterior door designated as an
Emergency Exit?
A fail soft lock


What is the meaning of lux rating as it applies to surveillance cameras?
amount of light required for an acceptable image


__________ is the science technique and art of establishing a system of inclusion/exclusion to
tangible assets.
Physical security

, What specific configuration would need to be included for the gates that provide ingress and egress
through the outer perimeter of the facility depicted in Figure CT-1?
The configuration for the zone or zones that include the gates would need to include an alarm delay.


From the following report types, select the options that would produces an incorrect rejection of the
individual, thereby, locking them out of a facility or security area that they should have access to.
(Select all that apply.)

a. False Rejection

b. False Acceptance

c. False positive failures

d. False negative failures
A, D


Which human biometric feature typically offers the most reliable authentication source?
Eye


What type of sensor detects a visible or invisible beam of light, and responds to a change in the
received light intensity?
photoelectric sensor


From the following options, select the entries that represent a physical barrier. (Select two.)

a. locked door

b. RFID badge reader

c. receptionist

d. surveillance camera
A, C


Select the camera lens type that would offer the best choice for monitoring a narrow hallway.
Verifocal lens


What is the process of determining that someone is who they say they are called?
Authentication


________ are typically placed in passageways to monitor activity near critical assets.
Surveillance cameras


In Figure CT-1, what type of security device would enable authorized employees to access the
control room without needing to issue them passwords that could be forgotten, written down or
compromised in some other way while still allowing remote logging of accesses?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.59
  • (0)
  Add to cart