Flashcards in IS3230 CHAPTER 9 Deck (29):
Short vertical posts designed to control traffic and prevent vehicular attacks on a building is called ___.
A unique number that identifies an individual in possession of a smart card is called ___.
CARD HOLDER UNIQUE IDENTIFICATION (CHUID)
The point at which Type I errors and Type II errors in a biometric access control system are equal is called ___.
CROSSOVER ERROR RATE (CER)
The percentage of failed attempts to create a sample data set for an individual, divided by the total number of attempts to enroll users is called ___.
FAILURE TO ENROLL RATE
The percentage of impostors that will be recognized as authorized users is called ___.
FALSE ACCEPTANCE RATE
The percentage of attempt by legitimate users that are rejected by the system is called ___.
FALSE REJECTION RATE
The mode in which a biometric system compares live data to a database of known samples and returns one or more matching user profiles is called ___.
Any method that restricts access to a defined area, such as a military base, corporate campus, infrastructure facility, or office building is called ___.
An agreement between an organization and a third party that describes availability levels, security protection levels, and response times to a breach is called ___.
SERVICE LEVEL AGREEMENT (SLA)
A false rejection in a biometric access control system is called ___.
TYPE I ERROR
A false acceptance in a biometric access control system is called ___.
TYPE II ERROR
A device that supplies backup power to servers and other devices is called ___.
UNINTERRUPTIBLE POWER SUPPLY (UPS)
The mode in which a biometric system makes a simple one to one comparison and returns a binary result is called ___.
A metal projection in a warded lock that must line up with the grooves on the key in order to unlock is called ___.
1. A good physical security strategy relies on a single strong point of access control.
TRUE OR FALSE
2. Fencing, lighting, and security guards are all important parts of what aspect of physical security?
1. Outsourced security
3. Perimeter security
4. Access control
3. What is a weak point in perimeter security?
4. Cameras trained on entry and exit points provide which security benefits? (Select two)
1. Theft of resources prevention
2. A record of who enters and leaves the facility
3. Vandalism prevention
4. Allow guards to monitor activity in real time
A record of who enters and leaves the facility
Allow guards to monitor activity in real tim
5. What is a short vertical post designed to control traffic and prevent vehicular attacks on a building?
5. None of the above
None of the above
6. Every package that arrives or leaves a classified government facility is x-rayed.
TRUE OR FALSE
7. A(n) ___ data center has robotic devices that are controlled remotely to change backup tapes and cycle the power on servers.
8. What is the name of the process through which several biometric readings are taken on an individual in order to create an accurate record of the individual's characteristics?
9. The tow primary types of biometric access controls are ___ and ___.
10. Anyone who can forge another person's signature can defeat a biometric access control based on signature analysis.
TRUE OR FALSE
11. The crossover rate of a biometric system is ___.
The point at which Type I and Type II errors are equal
12. Most biometric access control systems are used in which mode?
13. Typical padlocks are an example of which type of locks?
14. What is often equipped with silent alarms that notify security or police that an employee is in trouble?