Deck 22: Security Hardware

ملء الشاشة (f)
exit full mode
سؤال
Surrounding a building with a moat is a good way to prevent all but the most serious individuals from attempting to gain access.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Inexpensive video cameras may be used for ____ facial recognition.

A) biological
B) synthetic
C) biometric
D) digital
سؤال
An integrated IDS appliance combines the tap and analysis software all in one device.
سؤال
Iris scanning uses patterns in the iris to generate a biometric ____.

A) synthesis
B) template
C) token
D) methodology
سؤال
A(n) ____ is an unsecure network that operates between the public Internet and the private LAN.

A) DMC
B) DMZ
C) DML
D) HDZ
سؤال
Just running a RAID Level 5 system means your data are completely safe.
سؤال
Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
سؤال
____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.

A) Physical security
B) Network security
C) Virtual security
D) Intermediate security
سؤال
RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.

A) 1
B) 2
C) 3
D) 4
سؤال
A ____ is an entryway into a secure area that contains two doors.

A) caltrap
B) moat
C) manbreak
D) mantrap
سؤال
Wireless networks can be found easily while driving around a neighborhood with a wireless laptop in your car in a technique called ____.

A) wan whacking
B) war stalking
C) war driving
D) wireless warring
سؤال
_____________________ involves the process of identifying a user to a computer.
سؤال
Iris scanners are more invasive than retinal scanners.
سؤال
____ is concerned with understanding what a person is saying.

A) Voice recognition
B) Voice authentication
C) Voice processing
D) Voice translation
سؤال
____ is concerned with understanding who is doing the talking.

A) Voice recognition
B) Voice analysis
C) Voice reproduction
D) Voice authentication
سؤال
Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
سؤال
Hard drives that can be removed and connected to a running system are called ____ hard drives.

A) cold swappable
B) warm pluggable
C) hot swappable
D) warm releasable
سؤال
While nothing can prevent a lost connection due to an unplugged cable, the use of multi-homed computers means that two cables would have to be unplugged at the same time.
سؤال
____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.
سؤال
Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.
سؤال
Discuss handwriting authentication.
سؤال
Describe an Intrusion Detection System.
سؤال
What are biometric devices?
سؤال
Describe the types of doors and locks that should be used to secure an area.
سؤال
Describe a physical security plan.
سؤال
Match between columns
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Hardening
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Intrusion Detection System
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Fault tolerance
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Multi-homed
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Link aggregation
Can be used to combine the bandwidth of two network adapters
Hardening
Can be used to combine the bandwidth of two network adapters
Intrusion Detection System
Can be used to combine the bandwidth of two network adapters
Fault tolerance
Can be used to combine the bandwidth of two network adapters
Multi-homed
Can be used to combine the bandwidth of two network adapters
Link aggregation
Computers with two network adapters
Hardening
Computers with two network adapters
Intrusion Detection System
Computers with two network adapters
Fault tolerance
Computers with two network adapters
Multi-homed
Computers with two network adapters
Link aggregation
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Hardening
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Intrusion Detection System
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Fault tolerance
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Multi-homed
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Link aggregation
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Hardening
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Intrusion Detection System
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Fault tolerance
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Multi-homed
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Link aggregation
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 22: Security Hardware
1
Surrounding a building with a moat is a good way to prevent all but the most serious individuals from attempting to gain access.
True
2
Inexpensive video cameras may be used for ____ facial recognition.

A) biological
B) synthetic
C) biometric
D) digital
C
3
An integrated IDS appliance combines the tap and analysis software all in one device.
True
4
Iris scanning uses patterns in the iris to generate a biometric ____.

A) synthesis
B) template
C) token
D) methodology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ____ is an unsecure network that operates between the public Internet and the private LAN.

A) DMC
B) DMZ
C) DML
D) HDZ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
Just running a RAID Level 5 system means your data are completely safe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.

A) Physical security
B) Network security
C) Virtual security
D) Intermediate security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
RAID Level ____ Disk Mirroring is used to make an exact copy of data on two drives.

A) 1
B) 2
C) 3
D) 4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A ____ is an entryway into a secure area that contains two doors.

A) caltrap
B) moat
C) manbreak
D) mantrap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
Wireless networks can be found easily while driving around a neighborhood with a wireless laptop in your car in a technique called ____.

A) wan whacking
B) war stalking
C) war driving
D) wireless warring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
_____________________ involves the process of identifying a user to a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
Iris scanners are more invasive than retinal scanners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is concerned with understanding what a person is saying.

A) Voice recognition
B) Voice authentication
C) Voice processing
D) Voice translation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ is concerned with understanding who is doing the talking.

A) Voice recognition
B) Voice analysis
C) Voice reproduction
D) Voice authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
Hard drives that can be removed and connected to a running system are called ____ hard drives.

A) cold swappable
B) warm pluggable
C) hot swappable
D) warm releasable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
While nothing can prevent a lost connection due to an unplugged cable, the use of multi-homed computers means that two cables would have to be unplugged at the same time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
____________________ scanning uses patterns in the blood vessels of the retina at the back of the eye.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
Bandwidth ____________________ is where anyone with a wireless device can connect to the unsecure wireless network and use its bandwidth for free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
Discuss handwriting authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe an Intrusion Detection System.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are biometric devices?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe the types of doors and locks that should be used to secure an area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe a physical security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match between columns
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Hardening
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Intrusion Detection System
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Fault tolerance
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Multi-homed
The ability of a computer or a computer network to keep operating in the event of a hardware failure
Link aggregation
Can be used to combine the bandwidth of two network adapters
Hardening
Can be used to combine the bandwidth of two network adapters
Intrusion Detection System
Can be used to combine the bandwidth of two network adapters
Fault tolerance
Can be used to combine the bandwidth of two network adapters
Multi-homed
Can be used to combine the bandwidth of two network adapters
Link aggregation
Computers with two network adapters
Hardening
Computers with two network adapters
Intrusion Detection System
Computers with two network adapters
Fault tolerance
Computers with two network adapters
Multi-homed
Computers with two network adapters
Link aggregation
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Hardening
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Intrusion Detection System
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Fault tolerance
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Multi-homed
The process of making a server more secure by turning off un-necessary protocols and services, applying up-to-date patches, and securing the applications that run on the server
Link aggregation
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Hardening
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Intrusion Detection System
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Fault tolerance
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Multi-homed
A combination of hardware and software that is used to detect malicious traffic on a network, such as a denial of service attack, worms, and network-based exploits
Link aggregation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.