Intrusion detection system

Assignment Help Basic Computer Science
Reference no: EM132849726

1. Your organization has a safe for storing corporate laptops when they are not being used. As part of the security plan, you must ensure that the safe engages an extra lock if the safe's temperature exceeds a certain level. This will provide protection against drilling. Which type of lock should you implement?

A. Passive relock

B. Active relock

C. Thermal relock

2. Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?

A. A proximity detector

B. A passive infrared system

C. An acoustical detection system

3. Your data center has its own lock to prevent entry. Your organization's security plan states that the lock to the data center should be programmable. Which type of lock should you use?

A. Cipher lock

B. Mechanical lock

C. Tumbler lock

4. Which statement is true of lighting of critical areas?

A. Critical areas should use trip lighting and be illuminated ten feet in height to four foot-candles.

B. Critical areas should use standby lighting and be illuminated ten feet in height to two foot-candles.

C. Critical areas should use continuous lighting and be illuminated eight feet in height to two foot-candles.

5. Which option is NOT an administrative control for physical security?

A. Personnel control

B. Intrusion detection

C. Facility management

6. Your organization has asked that you reassess the organization's security plan to see if it fully addresses crime and disruption prevention through deterrence. Which security mechanism covers this issue?

A. Law enforcement notification

B. Fences

C. Smoke detectors

7. Which technologies are considered remote-sensing technologies?

a. unmanned aircraft

b. manned aircraft

c. satellites

d. land-based cameras

A. option a

B. option b

C. option c

D. option d

E. options a, b and c only

F. options b, c, and d only

G. all of the options

8. You want to ensure that employees can use a code to alert the proper authorities when they are under duress. With which physical security measure can this be used?

a. cipher lock

b. security guard

c. combination lock

d. biometric system

A. option a

B. option b

C. option c

D. option d

E. options a and b only

F. options c and d only

9. What is the FIRST priority when responding to a major security incident?
A. Containment

B. Monitoring

C. Restoration

10. Although control effectiveness has recently been tested, a serious compromise occurred. What is the FIRST action that an information security manager should take?

A. Evaluate control objectives

B. Perform a root cause analysis

C. Develop more stringent controls

11. Which of the following is a key component of an incident response policy?

A. Updated call trees

B. Escalation criteria

C. Press release templates

12. Why should an incident management team conduct a post incident review?

A. To identify the hacker

B. To identify affected areas

C. To identify lessons learned

Reference no: EM132849726

Questions Cloud

Integral concepts impacting the health care sector : Key efforts and protocols for ensuring compliance of health care organization in a changing regulatory and economic health care environment
Compute the total variable cost per unit : Tempo Company's fixed budget (based on sales of 16,000 units) for the first quarter reveals the following. Compute the total variable cost per unit
Windows Active Directory Network : How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup.
How does career field intersect with sustainability : How does your career field intersect with sustainability? Are there improvements that could be made in the areas of sustainability in chosen university?
Intrusion detection system : Which intrusion detection system (IDS) uses a magnetic field to detect intrusions? Which technologies are considered remote-sensing technologies?
Disaster recovery plan regular reviews of recovery plan : Which of the following practices would best ensure the adequacy of a disaster recovery plan regular reviews of recovery plan information?
What are trying to capture when creating gesture drawings : What are you trying to capture when creating gesture drawings? How can you envision these assisting in your overall figure drawing skills?
Discuss why found evidence more persuasive : Discuss why you found this evidence more persuasive. Does it match your personal experience? Do you just believe him because of the way he describes it?
Conduct a sensitivity analysis of the project NPV : Suppose the cash flows are prepetuities and the cost of capital is 10%. Conduct a sensitivity analysis of the project's NPV to variations in revenues

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The expectations theory suggests that

The expectations theory suggests that a.) the slope of the yield curve reflects the risk premium incorporated into the yields on long-term bonds.

  Create another function that also accepts the array

Create another function that also accepts the array as its parameter. This functions prints all the elements in the array. Call this function from the main after the previous function call.

  Console-based application named garage sale

The Anderson, Bowman, and Claxton families are running their annual garage sale. Write a console-based application named Garage Sale that prompts the user for a family initial (A,B, orC).

  Consider a system that could function

Consider a system that could function as a Cloud solution. In order for that system to work as needed

  Harnessing information management

In Assignment 1, you investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected in Assignment 1. Use the Internet or Strayer Library to explore the relationship ..

  Enterprise risk management framework

What factors need to be considered when integrating financial risk management into an enterprise risk management framework?

  What is total cost of this set of tools

What is the total cost of this set of tools? Which tools not listed would you add to your toolbox? Why?

  Establish case of disparate treatment discrimination

How would Jane establish a case of disparate treatment discrimination under the standards set forth in the McDonnell Douglas Corp. v. Green case?

  Future trends in information systems infrastructure

What are two future trends in information systems infrastructure and how do you think they will affect the way businesses use IT to gain an advantage

  Firm budget should ever be violated

Explain why budgeting is important for a firm. Do you think that a firm's budget should ever be violated (exceeded)? Explain your rationale.

  Two main functions of user accounts in a network

What are the two main functions of user accounts in a network?

  Determines whether or not the year is a leap year

write a C++ program that accepts the year as user input, determines whether the year is a leap year, and displays a message telling the user whether the entered year is or is not a leap year.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd