Module 12 - System and network defense Flashcards
(224 cards)
Which visible physical security measure often serves as the outermost layer of defense around a facility?
Fencing
What height of fencing offers limited delay even to a determined intruder?
2.5 m -{8 ft}
What fence height is generally too high to climb for casual intruders?
2m high -{6-7 ft}
Which fence height would be only for deterring casual trespassers?
1m high -{3-4 ft}
Which short vertical structures are designed to prevent unauthorized vehicle access?
Bollards
What physical security structure allows for controlled vehicle or pedestrian entry at a perimeter?
Security gate system
Which biometric error occurs when a legitimate, registered user is mistakenly denied access?
Type I error (false rejection)
Which security method uses physiological or behavioral traits to verify identity?
Biometrics
Which biometric error is generally considered less critical in cybercrime protection because it prevents access to authorized users?
Type I error (false rejection)
Which biometric error involves unauthorized individuals being wrongly granted access?
Type II error (false acceptance)
In a biometric system what is the percentage of instances where unenrolled individuals are accepted as valid users (Type II error rate)?
The acceptance rate
Which type of access control allows entry through automated systems using a personal ID token?
Access badge
What physical security measure logs attempts to enter an area and provides a record of access events?
Access logs
Which factor is considered the most important when evaluating a biometric authentication system?
Accuracy
Which security personnel type offers real-time decision-making and adaptability but is limited by high cost and potential for human error?
Security
Which environment is used to develop, test, and debug software before deployment and typically has lower security restrictions than production?
A development environment
Which physical security solution offers long-term recording, remote monitoring, motion-triggered alerts, and is more economical for perimeter coverage?
Surveillance
Which security coding technique organizes database data and helps maintain data integrity by simplifying input strings to a known form?
Normalization
What is used to track and manage software code changes across development phases?
Version Control software
Which tagging system allows for tracking assets without needing line-of-sight visibility?
RFID (Radio Frequency Identification)
Which isolated environment allows developers to test and write code without affecting shared development resources or risking overwrites?
A Sandbox
Which process examines how code functions under normal conditions to detect problems early and verify correct behavior before release?
Testing during development
Which activity checks software for errors to ensure quality and typically happens before staging or deployment?
QA (Quality Assurance)
Which environment is designed to mirror the production environment as closely as possible and allows developers to test how the software will perform under real-world security settings?
Staging environments