Name:     ID: 
 
    Email: 

CNG 131 Chapter 15

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

Physical security is subject to a different set of threats than previously discussed aspects of security.
 

 2. 

To facilitate the new ADA requirements, the facility should have several barrier-free access points to the exterior.
 

 3. 

Preset locks, with a typical metal key, are perhaps the most secure.
 

 4. 

Cipher locks are programmable and use keypads to control access into the facility.
 

 5. 

Multicriteria locks combine the strengths of two or more of the other lock types.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

Programmable locks that utilize a keypad for entering a personal identification number or password are called:
a.
preset locks
c.
cipher locks
b.
slot locks
d.
device locks
 

 7. 

What are locks called that secure computer hardware and network devices?
a.
preset locks
c.
cipher locks
b.
slot locks
d.
device locks
 

 8. 

Typical locks that use a physical lock and key are called:
a.
preset locks
c.
cipher locks
b.
slot locks
d.
device locks
 

 9. 

What are locks called that cover expansion slots on computer devices?
a.
preset locks
c.
cipher locks
b.
slot locks
d.
device locks
 

 10. 

Magnetic card readers that can sense a card within a certain distance are called:
a.
piggybacking
c.
wireless proximity readers
b.
online system
d.
master keyring
 

 11. 

What type of lock covers and controls on/off switches?
a.
switch lock
c.
port lock
b.
switch control
d.
slot lock
 

 12. 

What do you call a UPS that stays inactive until a critical power event occurs?
a.
standby
c.
sleeper
b.
inactive
d.
green
 

 13. 

A biometric technique that measures the length and width of the hand and fingers of a user to create a unique identifier is called:
a.
signature dynamics
c.
hand geometry
b.
online system
d.
finger geometry
 

 14. 

A feature on cipher locks that allows supervisors to change access codes as needed is called:
a.
cipher alarm
c.
master key
b.
master keyring
d.
hostage alarm
 

 15. 

What type of a UPS system uses AC voltage to charge batteries and converts the DC output from the batteries to regulate voltage?
a.
monitoring system
c.
standby system
b.
wireless system
d.
online system
 

 16. 

What the ability of an unauthorized user to gain access to a critical information by pretending to be an authorized user called?
a.
hacking
c.
social engineering
b.
key override
d.
door delay
 

 17. 

What do you call a device that provides electricity when the primary power supply is interrupted?
a.
UPS
c.
key override
b.
piggybacking
d.
None of the above
 

 18. 

What is the feature on a cipher lock that allows supervisors or emergency personnel to override the setting of a lock to gain access to a facility?
a.
slot lock
c.
hostage alarm
b.
key override
d.
master keyring
 

 19. 

What do you call the situation when an unauthorized user gains access to a facility by following closely behind an authorized employee that has gained access to a facility?
a.
cybersquatting
c.
piggybacking
b.
proximity reader
d.
None of the above
 

 20. 

What is a feature on cipher locks called that will alert security if a door is propped open for too long?
a.
door delay
c.
device lock
b.
port lock
d.
slot lock
 

 21. 

What does UPS stand for?
a.
uninterruptible power surge
c.
uninterruptible power supply
b.
uninterruptible protection system
d.
universal power supply
 

 22. 

When should a carbon dioxide fire suppression mechanism be used instead of water?
a.
electrical fire
c.
trash can fire
b.
paper fire
d.
open area fire
 

 23. 

How does Halon gas fight fires?
a.
reduces heat
c.
reduce the fuel intake of the fire
b.
eliminates oxygen
d.
disrupts a chemical reaction taking place
 

 24. 

Which of the following is not a physical security control?
a.
fence
c.
guard dog
b.
lock
d.
firewall
 

 25. 

What is a cipher lock?
a.
uses cryptographic keys
c.
uses a token and perimeter reader
b.
has a key that cannot be reproduced
d.
uses a keypad
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
piggybacking
e.
cipher locks
b.
slot locks
f.
port control
c.
preset locks
g.
wireless proximity readers
d.
social engineering
h.
device locks
 

 26. 

Programmable locks that use a keypad for entering a PIN.
 

 27. 

Locks that secure computer hardware and network devices.
 

 28. 

Typical locks that use a physical lock and key.
 

 29. 

Magnetic card readers that can sense a card within a certain distance.
 

 30. 

Unauthorized person gaining access to a facility by following closely behind an authorized person.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
door delay
e.
UPS
b.
standby
f.
cable traps
c.
switch controls
g.
cover locks
d.
key override
h.
slot locks
 

 31. 

Locks that cover expansion slots on computer devices.
 

 32. 

Feature on cipher locks that allows supervisors or emergency personnel to override the setting.
 

 33. 

Device lock that prevents unauthorized unplugging of cables from computer devices.
 

 34. 

Feature on cipher locks that alert security if a door is propped open for too long.
 

 35. 

Device that provides electricity when the primary power supply is interrupted.
 



 
Submit          Reset Help