Home
You may like this!
186.
Which of the following is a good defense against tailgating and piggybacking?
  • A.
    Cameras
  • B.
    Guards
  • C.
    Turnstiles
  • D.
    Mantraps
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Mantraps are intended to control access and thus stop the occurrence of physical breaches as a result of piggybacking and tailgating.
Report
Name Email  
187.
Which of the following is a wall that is less than full height?
  • A.
    Drop wall
  • B.
    False wall
  • C.
    Short wall
  • D.
    Plenum wall
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A false wall is one that extends only to a drop ceiling and not to the actual ceiling. These types of walls can easily be climbed over to allow access to a previously inaccessible room.
Report
Name Email  
188.
In the field of IT security, the concept of defense in depth is the layering of more than one control on another. Why is this?
  • A.
    To provide better protection
  • B.
    To build dependency among layers
  • C.
    To increase logging ability
  • D.
    To satisfy auditors
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Defense in depth provides much better protection than a single layer. It also provides a means to slow down and frustrate an attacker.
Report
Name Email  
189.
Which intrusion prevention system can be used in conjunction with fences?
  • A.
    Infrared wave patter
  • B.
    Bollards
  • C.
    Audio
  • D.
    PIDAS
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Bollards can be used with fences to block a vehicle from crashing through a fence and making an easy-to-use entrance.
Report
Name Email  
190.
Frequency of type 2 errors is also known as what?
  • A.
    False rejection rate
  • B.
    Failure rate
  • C.
    Crossover error rate
  • D.
    False acceptance rate
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A type 2 error is also known as a false rejection error, where someone who should have had access was denied it.
Report
Name Email