Deck 5: Host, Application, and Data Security

ملء الشاشة (f)
exit full mode
سؤال
ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

A) wave
B) pulse
C) AFID
D) RFID
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.

A) U-lock
B) safe lock
C) shield lock
D) cable lock
سؤال
Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
سؤال
A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.

A) bollard
B) fence
C) roller barrier
D) top hat
سؤال
A ____ is designed to separate a nonsecured area from a secured area.

A) lockout
B) mantrap
C) closet
D) pit
سؤال
Passive tags have ranges from about 1/3 inch to ____ feet.

A) 12
B) 15
C) 19
D) 25
سؤال
In Microsoft Windows, a ____ is a collection of security configuration settings.

A) security baseline
B) security reference
C) security summary
D) security template
سؤال
Keyed entry locks are much more difficult to defeat than deadbolt locks.
سؤال
Instead of using a key or entering a code to open a door, a user can display a ____ to identify herself.

A) logical token
B) physical sensor
C) physical token
D) hybrid sensor
سؤال
Cipher locks are the same as combination padlocks.
سؤال
____ can be prewired for electrical power as well as wired network connections.

A) Locking cabinets
B) Fences
C) Locking drawers
D) Desks
سؤال
____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.

A) Lockout sensors
B) Engineering sensors
C) Tailgate sensors
D) Proximity sensors
سؤال
An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.

A) flat collar
B) spiked collar
C) slippery collar
D) sharp collar
سؤال
When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
سؤال
The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.

A) proximity reader
B) mantrap
C) barcode scanner
D) magnetic scanner
سؤال
Securing a restricted area by erecting a barrier is called ____.

A) blocking
B) boundary placement
C) fencing
D) moating
سؤال
Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.

A) CCTV
B) ICTV
C) IPTV
D) ITV
سؤال
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
سؤال
____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.

A) Biometric locks
B) Cipher locks
C) Multifactor locks
D) Reaction locks
سؤال
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

A) reference
B) baseline
C) profile
D) minimum
سؤال
Identify the five steps in the process to secure operating system software.
سؤال
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

A) IDS
B) ADP
C) LLP
D) DLP
سؤال
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
سؤال
Describe RFID tags.
سؤال
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.

A) IPS
B) scanner
C) firewall
D) honeypot
سؤال
What are the three most important elements to secure in any information technology setting?
سؤال
Describe a mantrap.
سؤال
Explain remote wipe/sanitation.
سؤال
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.

A) DLP manager
B) DLP control
C) DLP agent
D) DLP cipher
سؤال
____________________ locks keep a record of when the door was opened and by which code.
سؤال
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.

A) heuristic detection
B) pattern detection
C) hybrid detection
D) combination detection
سؤال
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
سؤال
____________________ security involves restricting access to the areas in which equipment is located.
سؤال
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
سؤال
List three recommended key management procedures to achieve the best security when using keyed door locks.
سؤال
What are the three states of data that DLP typically examines?
سؤال
____ is defined as a security analysis of the transaction within its approved context.

A) Content aggregation
B) Content inspection
C) Content delivery
D) Content management
سؤال
A ____ is software that is a cumulative package of all security updates plus additional features.

A) feature pack
B) roll-up
C) service pack
D) patch
سؤال
Explain how tailgate sensors work.
سؤال
Identify one of the capabilities of DLP agents.
سؤال
Describe how a DLP can be configured.
سؤال
Match between columns
Latch a door closed yet do not lock; typically used on hall and closet doors
Deadbolt locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Keyed entry locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Privacy locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Patio locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Passage locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Standard keyed entry locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Storeroom locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Classroom locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Store entry double cylinder locks
Lock the door but have access to unlock from the outside via a small hole
Deadbolt locks
Lock the door but have access to unlock from the outside via a small hole
Keyed entry locks
Lock the door but have access to unlock from the outside via a small hole
Privacy locks
Lock the door but have access to unlock from the outside via a small hole
Patio locks
Lock the door but have access to unlock from the outside via a small hole
Passage locks
Lock the door but have access to unlock from the outside via a small hole
Standard keyed entry locks
Lock the door but have access to unlock from the outside via a small hole
Storeroom locks
Lock the door but have access to unlock from the outside via a small hole
Classroom locks
Lock the door but have access to unlock from the outside via a small hole
Store entry double cylinder locks
Most common type of door lock for keeping out intruders, but its security is minimal
Deadbolt locks
Most common type of door lock for keeping out intruders, but its security is minimal
Keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Privacy locks
Most common type of door lock for keeping out intruders, but its security is minimal
Patio locks
Most common type of door lock for keeping out intruders, but its security is minimal
Passage locks
Most common type of door lock for keeping out intruders, but its security is minimal
Standard keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Storeroom locks
Most common type of door lock for keeping out intruders, but its security is minimal
Classroom locks
Most common type of door lock for keeping out intruders, but its security is minimal
Store entry double cylinder locks
Lock the door from the inside but cannot be unlocked from the outside
Deadbolt locks
Lock the door from the inside but cannot be unlocked from the outside
Keyed entry locks
Lock the door from the inside but cannot be unlocked from the outside
Privacy locks
Lock the door from the inside but cannot be unlocked from the outside
Patio locks
Lock the door from the inside but cannot be unlocked from the outside
Passage locks
Lock the door from the inside but cannot be unlocked from the outside
Standard keyed entry locks
Lock the door from the inside but cannot be unlocked from the outside
Storeroom locks
Lock the door from the inside but cannot be unlocked from the outside
Classroom locks
Lock the door from the inside but cannot be unlocked from the outside
Store entry double cylinder locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Deadbolt locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Keyed entry locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Privacy locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Patio locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Passage locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Standard keyed entry locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Storeroom locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Classroom locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Store entry double cylinder locks
Use a key to open the lock from the outside
Deadbolt locks
Use a key to open the lock from the outside
Keyed entry locks
Use a key to open the lock from the outside
Privacy locks
Use a key to open the lock from the outside
Patio locks
Use a key to open the lock from the outside
Passage locks
Use a key to open the lock from the outside
Standard keyed entry locks
Use a key to open the lock from the outside
Storeroom locks
Use a key to open the lock from the outside
Classroom locks
Use a key to open the lock from the outside
Store entry double cylinder locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Deadbolt locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Keyed entry locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Privacy locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Patio locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Passage locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Standard keyed entry locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Storeroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Classroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Store entry double cylinder locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Deadbolt locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Keyed entry locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Privacy locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Patio locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Passage locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Standard keyed entry locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Storeroom locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Classroom locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Store entry double cylinder locks
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Host, Application, and Data Security
1
ID badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

A) wave
B) pulse
C) AFID
D) RFID
D
2
A ____ can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device, while a cable connected to the lock can then be secured to a desk or immobile object.

A) U-lock
B) safe lock
C) shield lock
D) cable lock
D
3
Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.
True
4
A ____ is an independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.

A) bollard
B) fence
C) roller barrier
D) top hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ____ is designed to separate a nonsecured area from a secured area.

A) lockout
B) mantrap
C) closet
D) pit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Passive tags have ranges from about 1/3 inch to ____ feet.

A) 12
B) 15
C) 19
D) 25
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
In Microsoft Windows, a ____ is a collection of security configuration settings.

A) security baseline
B) security reference
C) security summary
D) security template
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Keyed entry locks are much more difficult to defeat than deadbolt locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Instead of using a key or entering a code to open a door, a user can display a ____ to identify herself.

A) logical token
B) physical sensor
C) physical token
D) hybrid sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cipher locks are the same as combination padlocks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ can be prewired for electrical power as well as wired network connections.

A) Locking cabinets
B) Fences
C) Locking drawers
D) Desks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.

A) Lockout sensors
B) Engineering sensors
C) Tailgate sensors
D) Proximity sensors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
An anti-climb collar is a ____ that extends horizontally for up to 3 feet (1 meter) from the pole to prevent anyone from climbing.

A) flat collar
B) spiked collar
C) slippery collar
D) sharp collar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
When a policy violation is detected by the DLP agent, it is reported back to the DLP server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The signal from an ID badge is detected as the owner moves near a ____, which receives the signal.

A) proximity reader
B) mantrap
C) barcode scanner
D) magnetic scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Securing a restricted area by erecting a barrier is called ____.

A) blocking
B) boundary placement
C) fencing
D) moating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.

A) CCTV
B) ICTV
C) IPTV
D) ITV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.

A) Biometric locks
B) Cipher locks
C) Multifactor locks
D) Reaction locks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

A) reference
B) baseline
C) profile
D) minimum
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Identify the five steps in the process to secure operating system software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
____ is a system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

A) IDS
B) ADP
C) LLP
D) DLP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe RFID tags.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ is hardware or software that is designed to prevent malicious packets from entering or leaving computers.

A) IPS
B) scanner
C) firewall
D) honeypot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the three most important elements to secure in any information technology setting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe a mantrap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Explain remote wipe/sanitation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Each host (desktop, wireless laptop, smartphone, gateway server) runs a local application called a ____, which is sent over the network to the devices and runs as an OS service.

A) DLP manager
B) DLP control
C) DLP agent
D) DLP cipher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ locks keep a record of when the door was opened and by which code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
In ____, a virtualized environment is created that simulates the central processing unit (CPU) and memory of the computer.

A) heuristic detection
B) pattern detection
C) hybrid detection
D) combination detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____________________ security involves restricting access to the areas in which equipment is located.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
List three recommended key management procedures to achieve the best security when using keyed door locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the three states of data that DLP typically examines?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ is defined as a security analysis of the transaction within its approved context.

A) Content aggregation
B) Content inspection
C) Content delivery
D) Content management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
A ____ is software that is a cumulative package of all security updates plus additional features.

A) feature pack
B) roll-up
C) service pack
D) patch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Explain how tailgate sensors work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Identify one of the capabilities of DLP agents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe how a DLP can be configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Latch a door closed yet do not lock; typically used on hall and closet doors
Deadbolt locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Keyed entry locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Privacy locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Patio locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Passage locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Standard keyed entry locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Storeroom locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Classroom locks
Latch a door closed yet do not lock; typically used on hall and closet doors
Store entry double cylinder locks
Lock the door but have access to unlock from the outside via a small hole
Deadbolt locks
Lock the door but have access to unlock from the outside via a small hole
Keyed entry locks
Lock the door but have access to unlock from the outside via a small hole
Privacy locks
Lock the door but have access to unlock from the outside via a small hole
Patio locks
Lock the door but have access to unlock from the outside via a small hole
Passage locks
Lock the door but have access to unlock from the outside via a small hole
Standard keyed entry locks
Lock the door but have access to unlock from the outside via a small hole
Storeroom locks
Lock the door but have access to unlock from the outside via a small hole
Classroom locks
Lock the door but have access to unlock from the outside via a small hole
Store entry double cylinder locks
Most common type of door lock for keeping out intruders, but its security is minimal
Deadbolt locks
Most common type of door lock for keeping out intruders, but its security is minimal
Keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Privacy locks
Most common type of door lock for keeping out intruders, but its security is minimal
Patio locks
Most common type of door lock for keeping out intruders, but its security is minimal
Passage locks
Most common type of door lock for keeping out intruders, but its security is minimal
Standard keyed entry locks
Most common type of door lock for keeping out intruders, but its security is minimal
Storeroom locks
Most common type of door lock for keeping out intruders, but its security is minimal
Classroom locks
Most common type of door lock for keeping out intruders, but its security is minimal
Store entry double cylinder locks
Lock the door from the inside but cannot be unlocked from the outside
Deadbolt locks
Lock the door from the inside but cannot be unlocked from the outside
Keyed entry locks
Lock the door from the inside but cannot be unlocked from the outside
Privacy locks
Lock the door from the inside but cannot be unlocked from the outside
Patio locks
Lock the door from the inside but cannot be unlocked from the outside
Passage locks
Lock the door from the inside but cannot be unlocked from the outside
Standard keyed entry locks
Lock the door from the inside but cannot be unlocked from the outside
Storeroom locks
Lock the door from the inside but cannot be unlocked from the outside
Classroom locks
Lock the door from the inside but cannot be unlocked from the outside
Store entry double cylinder locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Deadbolt locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Keyed entry locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Privacy locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Patio locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Passage locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Standard keyed entry locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Storeroom locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Classroom locks
The outside can be locked or unlocked, and the inside lever is always unlocked
Store entry double cylinder locks
Use a key to open the lock from the outside
Deadbolt locks
Use a key to open the lock from the outside
Keyed entry locks
Use a key to open the lock from the outside
Privacy locks
Use a key to open the lock from the outside
Patio locks
Use a key to open the lock from the outside
Passage locks
Use a key to open the lock from the outside
Standard keyed entry locks
Use a key to open the lock from the outside
Storeroom locks
Use a key to open the lock from the outside
Classroom locks
Use a key to open the lock from the outside
Store entry double cylinder locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Deadbolt locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Keyed entry locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Privacy locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Patio locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Passage locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Standard keyed entry locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Storeroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Classroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked
Store entry double cylinder locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Deadbolt locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Keyed entry locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Privacy locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Patio locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Passage locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Standard keyed entry locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Storeroom locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Classroom locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time
Store entry double cylinder locks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.