True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
Physical security is subject to a different set of threats than previously discussed
aspects of security.
|
|
2.
|
To
facilitate the new ADA requirements, the facility should have several barrier-free access points to
the exterior.
|
|
3.
|
Preset locks, with a typical metal key, are perhaps the most secure.
|
|
4.
|
Cipher locks are programmable and use keypads to control access into the
facility.
|
|
5.
|
Multicriteria locks combine the strengths of two or more of the other lock
types.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
Programmable locks that utilize a keypad for entering a personal identification number
or password are called: a. | preset locks | c. | cipher locks | b. | slot
locks | d. | device
locks | | | | |
|
|
7.
|
What
are locks called that secure computer hardware and network devices? a. | preset
locks | c. | cipher
locks | b. | slot locks | d. | device locks | | | | |
|
|
8.
|
Typical locks that use a physical lock and key are called: a. | preset
locks | c. | cipher
locks | b. | slot locks | d. | device locks | | | | |
|
|
9.
|
What
are locks called that cover expansion slots on computer devices? a. | preset
locks | c. | cipher
locks | b. | slot locks | d. | device locks | | | | |
|
|
10.
|
Magnetic card readers that can sense a card within a certain distance are
called: a. | piggybacking | c. | wireless
proximity readers | b. | online system | d. | master keyring | | | | |
|
|
11.
|
What
type of lock covers and controls on/off switches? a. | switch lock | c. | port lock | b. | switch
control | d. | slot
lock | | | | |
|
|
12.
|
What
do you call a UPS that stays inactive until a critical power event occurs? a. | standby | c. | sleeper | b. | inactive | d. | green | | | | |
|
|
13.
|
A
biometric technique that measures the length and width of the hand and fingers of a user to create a
unique identifier is called: a. | signature dynamics | c. | hand geometry | b. | online
system | d. | finger
geometry | | | | |
|
|
14.
|
A
feature on cipher locks that allows supervisors to change access codes as needed is
called: a. | cipher
alarm | c. | master
key | b. | master
keyring | d. | hostage
alarm | | | | |
|
|
15.
|
What
type of a UPS system uses AC voltage to charge batteries and converts the DC output from the
batteries to regulate voltage? a. | monitoring system | c. | standby system | b. | wireless
system | d. | online
system | | | | |
|
|
16.
|
What
the ability of an unauthorized user to gain access to a critical information by pretending to be an
authorized user called? a. | hacking | c. | social engineering | b. | key
override | d. | door
delay | | | | |
|
|
17.
|
What
do you call a device that provides electricity when the primary power supply is
interrupted? a. | UPS | c. | key
override | b. | piggybacking | d. | None of the above | | | | |
|
|
18.
|
What
is the feature on a cipher lock that allows supervisors or emergency personnel to override the
setting of a lock to gain access to a facility? a. | slot lock | c. | hostage alarm | b. | key
override | d. | master
keyring | | | | |
|
|
19.
|
What
do you call the situation when an unauthorized user gains access to a facility by following closely
behind an authorized employee that has gained access to a facility? a. | cybersquatting | c. | piggybacking | b. | proximity reader | d. | None of the above | | | | |
|
|
20.
|
What
is a feature on cipher locks called that will alert security if a door is propped open for too
long? a. | door
delay | c. | device
lock | b. | port
lock | d. | slot
lock | | | | |
|
|
21.
|
What
does UPS stand for? a. | uninterruptible power surge | c. | uninterruptible power supply | b. | uninterruptible
protection system | d. | universal power
supply | | | | |
|
|
22.
|
When
should a carbon dioxide fire suppression mechanism be used instead of water? a. | electrical
fire | c. | trash can
fire | b. | paper
fire | d. | open area
fire | | | | |
|
|
23.
|
How
does Halon gas fight fires? a. | reduces heat | c. | reduce the fuel intake of the fire | b. | eliminates
oxygen | d. | disrupts a
chemical reaction taking place | | | | |
|
|
24.
|
Which
of the following is not a physical security control? a. | fence | c. | guard
dog | b. | lock | d. | firewall | | | | |
|
|
25.
|
What
is a cipher lock? a. | uses
cryptographic keys | c. | uses a token and
perimeter reader | b. | has a key that cannot be
reproduced | d. | uses a
keypad | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | piggybacking | e. | cipher
locks | b. | slot locks | f. | port control | c. | preset
locks | g. | wireless
proximity readers | d. | social engineering | h. | device locks | | | | |
|
|
26.
|
Programmable locks that use a keypad for entering a PIN.
|
|
27.
|
Locks
that secure computer hardware and network devices.
|
|
28.
|
Typical locks that use a physical lock and key.
|
|
29.
|
Magnetic card readers that can sense a card within a certain distance.
|
|
30.
|
Unauthorized person gaining access to a facility by following closely behind an
authorized person.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | door
delay | e. | UPS | b. | standby | f. | cable traps | c. | switch
controls | g. | cover
locks | d. | key override | h. | slot locks | | | | |
|
|
31.
|
Locks
that cover expansion slots on computer devices.
|
|
32.
|
Feature on cipher locks that allows supervisors or emergency personnel to override the
setting.
|
|
33.
|
Device lock that prevents unauthorized unplugging of cables from computer
devices.
|
|
34.
|
Feature on cipher locks that alert security if a door is propped open for too
long.
|
|
35.
|
Device that provides electricity when the primary power supply is
interrupted.
|