Académique Documents
Professionnel Documents
Culture Documents
or digest to confirm the identity of a specific message and to confirm that there
have not been any changes to the content.
Selected Answer:
Hash
Answers:
Hash
Map
Key
Encryption
Question 2
A method of encryption that requires the same secret key to encipher and
decipher the message is known as ____ encryption.
Selected Answer:
symmetric
Answers:
asymmetric
symmetric
public
private
A false positive is the failure of an IDPS system to react to an actual attack event.
Answers:
True
False
Most of the technologies that scan human characteristics convert these images
to some form of minutiae.
Selected Answer:
True
Answers:
True
False
NIDPS
SPAN
DPS
IDSE
False
True
False
True
Answers:
True
False
False
True
False
The ____ is the level at which the number of false rejections equals the false
acceptances, and is also known as the equal error rate.
Selected Answer:
CER
Answers:
BIOM
REC
IIS
CER
A common form of mechanical strike locks are electric strike locks, which
(usually) require people to announce themselves before being buzzed through
a locked door.
Selected Answer:
Answers:
False
True
False
True
Answers:
True
False
A wireless security toolkit should include the ability to sniff wireless traffic, scan
wireless hosts, and assess the level of privacy or confidentiality afforded on the
wireless network.
Selected Answer:
True
Answers:
True
False
False
True
False
False
True
False
True
Answers:
True
False
Selected Answer:
biometric
Answers:
manual
programmable
electronic
biometric
Most guards have clear ____ that help them to act decisively in unfamiliar
situations.
Selected Answer:
SOPs
Answers:
MACs
SOPs
POSs
OPSs
Keycard readers based on smart cards are often used to secure computer rooms,
communications closets, and other restricted areas.
Selected Answer:
True
Answers:
True
False
Cold detectors measure rates of change in the ambient temperature in the room.
Selected Answer:
Answers:
False
True
False
Hash algorithms are public functions that create a hash value by converting
variable-length messages into a single fixed-length value.
Selected Answer:
True
Answers:
True
False
Symmetric encryption uses two different but related keys, and either key can be
used to encrypt or decrypt the message.
Selected Answer:
Answers:
False
True
False
In the ____ approach, the sensor detects an unusually rapid increase in the area
temperature within a relatively short period of time.
Selected Answer:
rate-of-rise
Answers:
fixed temperature
permanent temperature
fixed rate
rate-of-rise
False
True
False
True
Answers:
True
False
Selected Answer:
False
Answers:
True
False
True
Answers:
True
False
____ involves a wide variety of computing sites that are distant from the base
organizational facility and includes all forms of telecommuting.
Selected Answer:
Remote site computing
Answers:
Remote site computing
Telecommuting
Remote working
Hot site computing
A device that assures the delivery of electric power without interruption is a(n)
____.
Selected Answer:
UPS
Answers:
GFCI
HVAC
GPS
UPS
False
True
False
wet-pipe
dry-pipe
deluge
sprinkler
The AES algorithm was the first public key encryption algorithm.
Selected Answer:
Answers:
False
True
False
True
Answers:
True
False
____ is the entire range of values that can possibly be used to construct an
individual key.
Selected Answer:
Keyspace
Answers:
Code
Keyspace
Algorithm
Cryptogram
Answers:
True
False
False
True
False
False
True
False
Class ____ fires are extinguished by agents that remove oxygen from the fire.
Selected Answer:
B
Answers:
B
C
D
Fire ____ systems are devices installed and maintained to detect and respond to a
fire, potential fire, or combustion danger situation.
Selected Answer:
suppression
Answers:
detection
suppression
protection
prevention
False
True
False
Which of the following ports is commonly used for the HTTP protocol?
Selected Answer:
80
Answers:
20
25
53
80
The number of horizontal and vertical pixels captured and recorded is known as
the images depth.
Answers:
True
False
Using ____, the system reviews the log files generated by servers, network
devices, and even other IDPSs.
Selected Answer:
LFM
Answers:
LFM
stat IDPS
AppIDPS
HIDPS
Answers:
True
False
Once the attacker has successfully broken an encryption, he or she may launch a
replay attack, which is an attempt to resubmit a recording of the deciphered
authentication to gain entry into a secure source.
Answers:
True
False
IDPS researchers have used padded cell and honeypot systems since the late
____.
Selected Answer:
1980s
Answers:
1960s
1970s
1980s
1990s
Bit stream methods commonly use algorithm functions like the exclusive OR
operation (____).
Selected Answer:
XOR
Answers:
XOR
EOR
NOR
OR
False
True
False
False
True
False
True
Answers:
True
False