Try the new Google Books
Check out the new look and enjoy easier access to your favorite features
Try the new Google Books
Check out the new look and enjoy easier access to your favorite features
Page 2
5.The asymmetric encryption systems use a single key to both encrypt and decrypt a message.
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant
Gaseous emission systems can be used in the suppression of fires. _________________________ A) True |
A) True |
Class __________ fires are extinguished by agents that remove oxygen from the fire. A) A B) B C) C D) D |
B) B |
__________ occurs when an authorized person opens a door, and other people, who may or may not be authorized, also enter. A) Crowdsurfing B) Tailgating C) Freeloading D) Hitchhiking |
B) Tailgating |
For laptops, there are theft alarms made up of a PC card or other device that contains a motion detector. A) True |
A) True |
Class __________ fires are safely extinguished with non-conducting agents only. A) A B) B C) C D) D |
C) C |
Most guards have clear __________ that help them to act decisively in unfamiliar situations. A) MACs B) SOPs C) POSs D) OPSs |
B) SOPs |
Fire __________ systems are devices installed and maintained to detect and respond to a fire, potential fire, or combustion danger situation. A) detection B) suppression C) protection D) prevention |
B) suppression |
__________ sensors project and detect an infrared beam across an area. A) Photoelectric B) Smoke C) Air-aspirating D) Thermal |
A) Photoelectric |
The most sophisticated locks are __________ locks. A) manual B) programmable C) electronic D) biometric |
D) biometric |
When the lock of a door fails and causes the the door become unlocked, it is classified as a fail-secure lock. A) True |
B) False |
__________ involves a wide variety of computing sites outside the organization’s primary facility and includes all forms of telecommuting. A) Remote site computing B) Telecommuting C) Remote working D) Hot site computing |
A) Remote site computing |
Keycard readers based on smart cards are often used to secure computer rooms, communications closets, and other restricted areas. A) True |
A) True |
A device that assures the delivery of electric power without interruption is a(n) __________. A) GFCI B) HVAC C) GPS D) UPS |
D) UPS |
Mechanical locks can accept a variety of inputs as keys, including magnetic strips on ID cards, radio signals from name badges, personal identification numbers (PINs) typed into a keypad, or some combination of these to activate an electrically powered servo to unlock the mechanism. _________________________ A) True |
B) False |
Vibration detectors measure rates of change in the ambient temperature in the room. _________________________ A) True |
B) False |
__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security. A) Programmable B) Manual C) Biometric D) Electronic |
A) Programmable |
Grounding ensures that the returning flow of current is properly discharged to the ground. _________________________ A) True |
A) True |
A wet-pipe system is usually considered appropriate in computer rooms. A) True |
B) False |
Telecommuters should use a securable operating system that requires password authentication. A) True |
A) True |
Computing and other electrical equipment used in areas where water can accumulate must be uniquely grounded, using __________ equipment. A) UPS B) HVAC C) GFCI D) ESD |
C) GFCI |
Guards can evaluate each situation as it arises and make reasoned responses. _________________________ A) True |
A) True |
Standby power supply (SPS) UPSs provide power conditioning. A) True |
B) False |
Interior walls only partially reach to the next floor, which leaves a space above the ceiling. This space is called a(n) __________. A) kneespace B) attic C) plenum D) padding |
C) plenum |
Smoke detection systems are perhaps the most common means of detecting a potentially dangerous fire, and they are required by building codes in most residential dwellings and commercial buildings. _________________________ A) True |
A) True |
Water-based systems are inexpensive, nontoxic, and can often be created by using an existing sprinkler system that may have been present in earlier construction. A) True |
A) True |
The online UPS can deliver a constant, smooth, conditioned power stream to computing systems. A) True |
A) True |
Carbon dioxide systems remove a fire’s supply of oxygen. A) True |
A) True |
There are very few qualified and professional agencies that provide physical security consulting and services. A) True |
B) False |
In the __________ UPS, the internal components of the standby models are replaced with a pair of inverters and converters. A) line-interactive B) ferroresonant C) true online D) offline |
A) line-interactive |
Physical security is just as important as logical security to an information security program. _________________________ A) True |
A) True |
Fire suppression systems typically work by denying an environment one of the three requirements for a fire to burn: a spark, fuel, and oxygen. A) True |
B) False |
One of the leading causes of damage to sensitive circuitry is __________. A) CPU B) EPA C) ESD D) HVAC |
C) ESD |
Water damage is considered less dangerous to computer systems than hazardous chemicals like Halon. A) True |
B) False |
For laptops, there are theft alarms made up of a PC card or other device that contains a motion detector. A) True |
A) True |
Electronic monitoring includes __________ systems. A) blocked video B) local video C) open-circuit television D) closed-circuit television |
D) closed-circuit television |
Videoconferencing is off site computing that uses Internet connections, dialup connections, connections over leased point-to-point links between offices, and other mechanisms. _________________________ A) True |
B) False |
Vibration sensors fall into the motion sensor category. A) True |
B) False |
In a(n) double conversion offline UPS, the primary power source is the inverter, and the power feed from the utility is constantly recharging the battery, which in turn powers the output inverter.. _________________________ A) True |
B) False |
Keycard readers based on smart cards are often used to secure computer rooms, communications closets, and other restricted areas. A) True |
A) True |
Manual fire detection systems, include human responses, such as calling the fire department and manually activated alarms. _________________________ A) True |
A) True |