Advertisement Upgrade to remove ads

Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.

True

Keyed Entry locks are much more difficult to defeat than deadbolt locks.

False

Cipher locks are the same as combination padlocks.

True

Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners.

True

When a policy violation is detected by the DLP agent, it is reported back to the DLP server.

True

A basic level of security can be achieved through using the security features found in network hardware.

True

The OSI model breaks networking steps down into a series of six years.

False

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

True

Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.

True

Workgroup switches must work faster than core switches.

False

TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.

False

TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.

False

IEEE 802.1x is commonly used on wireless networks.

True

IP telephony and Voice over IP (VoIP) are identical.

False

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.

True

Bluetooth devices are not backward compatible with previous versions.

False

Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.

True

Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.

False

Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.

False

APs use antennas that radiate a signal in all directions.

True

_____ are combination locks that use buttons which must be pushed in the proper sequence to open the door

B. Cipher locks

______ use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.

C. Tailgate sensors

Instead of using a key or entering a code to open a door, a user can display a _____ to identify herself.

C. Physical token

ID Badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

D. RFID

Passive tags have ranges from about 1/3 inch to ____ feet.

C. 19

securing a restricted area by erecting a barrier
is called ____.

C. Fencing

A ___ can be inserted into the security slot of a portable device

D. Cable lock

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set