IS3230 CHAPTER 9 Flashcards Preview

IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE > IS3230 CHAPTER 9 > Flashcards

Flashcards in IS3230 CHAPTER 9 Deck (29):
1

Short vertical posts designed to control traffic and prevent vehicular attacks on a building is called ___.

BOLLARDS

2

A unique number that identifies an individual in possession of a smart card is called ___.

CARD HOLDER UNIQUE IDENTIFICATION (CHUID)

3

The point at which Type I errors and Type II errors in a biometric access control system are equal is called ___.

CROSSOVER ERROR RATE (CER)

4

The percentage of failed attempts to create a sample data set for an individual, divided by the total number of attempts to enroll users is called ___.

FAILURE TO ENROLL RATE

5

The percentage of impostors that will be recognized as authorized users is called ___.

FALSE ACCEPTANCE RATE

6

The percentage of attempt by legitimate users that are rejected by the system is called ___.

FALSE REJECTION RATE

7

The mode in which a biometric system compares live data to a database of known samples and returns one or more matching user profiles is called ___.

IDENTIFICATION MODE

8

Any method that restricts access to a defined area, such as a military base, corporate campus, infrastructure facility, or office building is called ___.

PERIMETER SECURITY

9

An agreement between an organization and a third party that describes availability levels, security protection levels, and response times to a breach is called ___.

SERVICE LEVEL AGREEMENT (SLA)

10

A false rejection in a biometric access control system is called ___.

TYPE I ERROR

11

A false acceptance in a biometric access control system is called ___.

TYPE II ERROR

12

A device that supplies backup power to servers and other devices is called ___.

UNINTERRUPTIBLE POWER SUPPLY (UPS)

13

The mode in which a biometric system makes a simple one to one comparison and returns a binary result is called ___.

VERIFICATION MODE

14

A metal projection in a warded lock that must line up with the grooves on the key in order to unlock is called ___.

WARD

15

1. A good physical security strategy relies on a single strong point of access control.
TRUE OR FALSE

FALSE

16

2. Fencing, lighting, and security guards are all important parts of what aspect of physical security?
1. Outsourced security
2. Biometrics
3. Perimeter security
4. Access control

Perimeter security

17

3. What is a weak point in perimeter security?
1. Road
2. Gate
3. Pathway
4. Window

Gate

18

4. Cameras trained on entry and exit points provide which security benefits? (Select two)
1. Theft of resources prevention
2. A record of who enters and leaves the facility
3. Vandalism prevention
4. Allow guards to monitor activity in real time

A record of who enters and leaves the facility
Allow guards to monitor activity in real tim

19

5. What is a short vertical post designed to control traffic and prevent vehicular attacks on a building?
1. Balustrade
2. Barrier
3. Barm
4. Bollard
5. None of the above

None of the above

20

6. Every package that arrives or leaves a classified government facility is x-rayed.
TRUE OR FALSE

TRUE

21

7. A(n) ___ data center has robotic devices that are controlled remotely to change backup tapes and cycle the power on servers.

Dark

22

8. What is the name of the process through which several biometric readings are taken on an individual in order to create an accurate record of the individual's characteristics?
1. Scanning
2. Identification
3. Verification
4. Enrollment
5. Creation

Creation

23

9. The tow primary types of biometric access controls are ___ and ___.

Physiological
Behavioral

24

10. Anyone who can forge another person's signature can defeat a biometric access control based on signature analysis.
TRUE OR FALSE

FALSE

25

11. The crossover rate of a biometric system is ___.

The point at which Type I and Type II errors are equal

26

12. Most biometric access control systems are used in which mode?
1. Identification
2. Production
3. Elimination
4. Verification
5. Restrictive

Restrictive

27

13. Typical padlocks are an example of which type of locks?
1. Warded
2. Tumbler
3. Combination
4. Cipher

Warded

28

14. What is often equipped with silent alarms that notify security or police that an employee is in trouble?
1. Warded
2. Tumbler
3. Combination
4. Cipher

Cipher

29

15. What is the first step in designing a physical security system?
1. Hire a security outsourcing firm
2. Conduct a security audit
3. Purchase a biometric access control system
4. Install a video surveillance system
5. Replace traditional locks with programmable cipher locks

Conduct a security audit