Deck 4: Host, Application, and Data Security

ملء الشاشة (f)
exit full mode
سؤال
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?

A)CCTV
B)ICTV
C)IPTV
D)ITV
سؤال
What is the maximum effective range of a typical passive RFID tag?

A)12
B)15
C)19
D)25
سؤال
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:

A)U-lock
B)safe lock
C)shield lock
D)cable lock
سؤال
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?

A)​Remote Read Tag (RRT)
B)​Radio Frequency Identification tag (RFID)
C)​Barcode tag (BT)
D)​Magnetic tag (MT)
سؤال
DLP agent sensors are installed on each host device, and monitor for actions such as printing, copying to a USB flash drive, and burning to a CD or DVD.
سؤال
Keyed entry locks are much more difficult to defeat than deadbolt locks.
سؤال
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:

A)Information Detection System
B)Automated Data Policy
C)Local Loss Prevention
D)Data Loss Prevention
سؤال
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?

A)IPS
B)scanner
C)firewall
D)honeypot
سؤال
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
سؤال
​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?

A)​Blacklist filtering
B)​Whitelist filtering
C)​Bayesian filtering
D)​Extension filtering
سؤال
What is the best way to prevent data input by a user from having potentially malicious effects on software?​

A)​Client-side validation
B)​Server-side validation
C)​Escaping user responses
D)​SQL validation
سؤال
Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?

A)Lockout sensors
B)Engineering sensors
C)Tailgate sensors
D)Proximity sensors
سؤال
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?

A)heuristic detection
B)pattern detection
C)hybrid detection
D)combination detection
سؤال
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:

A)​Mainframe
B)​Integrated system
C)​Embedded system
D)​Internal system
سؤال
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
سؤال
DLP agent sensors are unable to read inside compressed files and binary files.​
سؤال
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?

A)Account policies
B)User rights
C)System services
D)Resolution settings
سؤال
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

A)bollard
B)fence
C)roller barrier
D)top hat
سؤال
Most DLP systems make use of what method of security analysis below?

A)Content aggregation
B)Content inspection
C)Content delivery
D)Content management
سؤال
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​An attack that uses the user's web browser settings to impersonate the user
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam.​
سؤال
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
سؤال
How can an area be made secure from a non-secured area via two interlocking doors to a small room?

A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​An operating system for Google Android smartphones and other devices.
سؤال
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

A)logical token
B)physical sensor
C)physical token
D)hybrid sensor
سؤال
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?

A)feature pack
B)roll-up
C)service pack
D)patch
سؤال
____________________ locks keep a record of when the door was opened and by which code.
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
سؤال
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
​Match the following terms to the appropriate definitions.​
سؤال
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.​
سؤال
Anti-virus products typically utilize what type of virus scanning analysis?​

A)​Static analysis
B)​Wildcard scanning analysis
C)​Heuristic detection analysis
D)​String scanning​ analysis
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​Large-scale, industrial control systems.
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective.​
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A structure designed to block the passage of traffic​
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A mobile operating system for Apple iPhones​
سؤال
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?

A)reference
B)baseline
C)profile
D)minimum
سؤال
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A nonrelational database that is better tuned for accessing large data sets.
سؤال
What are the five steps that can be used to ensure the security of an OS?​
سؤال
Describe a mantrap.
سؤال
What are the three states of data that DLP typically examines?
سؤال
How does DLP index matching work?
سؤال
Describe how a DLP can be configured.
سؤال
What can be a time consuming drawback to the use of traditional ID badges? How can this issue be avoided?
سؤال
How does an RFID tag embedded into an ID badge function without a power supply?​
سؤال
What is the difference between deterrent controls and preventive controls?​
سؤال
How can cable conduits that run between two secure areas be protected?
سؤال
Explain how tailgate sensors work.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Host, Application, and Data Security
1
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

A)Anti-climb
B)Spiked barrier
C)Roller barrier
D)Rotating spikes
A
2
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?

A)CCTV
B)ICTV
C)IPTV
D)ITV
A
3
What is the maximum effective range of a typical passive RFID tag?

A)12
B)15
C)19
D)25
C
4
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a:

A)U-lock
B)safe lock
C)shield lock
D)cable lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?

A)​Remote Read Tag (RRT)
B)​Radio Frequency Identification tag (RFID)
C)​Barcode tag (BT)
D)​Magnetic tag (MT)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
DLP agent sensors are installed on each host device, and monitor for actions such as printing, copying to a USB flash drive, and burning to a CD or DVD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Keyed entry locks are much more difficult to defeat than deadbolt locks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:

A)Information Detection System
B)Automated Data Policy
C)Local Loss Prevention
D)Data Loss Prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?

A)IPS
B)scanner
C)firewall
D)honeypot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?

A)​Blacklist filtering
B)​Whitelist filtering
C)​Bayesian filtering
D)​Extension filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is the best way to prevent data input by a user from having potentially malicious effects on software?​

A)​Client-side validation
B)​Server-side validation
C)​Escaping user responses
D)​SQL validation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?

A)Lockout sensors
B)Engineering sensors
C)Tailgate sensors
D)Proximity sensors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?

A)heuristic detection
B)pattern detection
C)hybrid detection
D)combination detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:

A)​Mainframe
B)​Integrated system
C)​Embedded system
D)​Internal system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
DLP agent sensors are unable to read inside compressed files and binary files.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?

A)Account policies
B)User rights
C)System services
D)Resolution settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

A)bollard
B)fence
C)roller barrier
D)top hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Most DLP systems make use of what method of security analysis below?

A)Content aggregation
B)Content inspection
C)Content delivery
D)Content management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks, and tablet computers that can easily be stolen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​An attack that uses the user's web browser settings to impersonate the user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ is a record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
How can an area be made secure from a non-secured area via two interlocking doors to a small room?

A)Using a lockout
B)Using a mantrap
C)Using a closet
D)Using a pit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​An operating system for Google Android smartphones and other devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

A)logical token
B)physical sensor
C)physical token
D)hybrid sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?

A)feature pack
B)roll-up
C)service pack
D)patch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ locks keep a record of when the door was opened and by which code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________________ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden, making any coated surface very difficult to climb.
​Match the following terms to the appropriate definitions.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Anti-virus products typically utilize what type of virus scanning analysis?​

A)​Static analysis
B)​Wildcard scanning analysis
C)​Heuristic detection analysis
D)​String scanning​ analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​Large-scale, industrial control systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A structure designed to block the passage of traffic​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
A mobile operating system for Apple iPhones​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?

A)reference
B)baseline
C)profile
D)minimum
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match the following terms to the appropriate definitions.
a. Access list
b. Activity phase controls
c. Android
d. Barricade
e. Bayesian filtering
f. Cross-site request forgery (XSRF)
g. Fuzz testing
h. iOS
i. NoSQL
j. Supervisory control and data acquisition (SCADA)
​A nonrelational database that is better tuned for accessing large data sets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the five steps that can be used to ensure the security of an OS?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe a mantrap.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the three states of data that DLP typically examines?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does DLP index matching work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe how a DLP can be configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What can be a time consuming drawback to the use of traditional ID badges? How can this issue be avoided?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How does an RFID tag embedded into an ID badge function without a power supply?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is the difference between deterrent controls and preventive controls?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
How can cable conduits that run between two secure areas be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain how tailgate sensors work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.