Match each term with the correct statement below.

A. Access to the tangible elements of the system, such as servers
B. Events that are beyond human control, such as a flood or an earthquake
C. Process employed to detect a penetration of secure space
D. A form of access control, frequently electronic, that is designed to detect the presence of intruders
E. The countermeasures placed on the boundary between secure and unsecured space
F. A countermeasure in physical security based around optimum placement of protected space in the general environment
G. Physical structures, usually made of cement or steel, that are designed to impede the progress of a vehicle or other large entity, like a tank
H. A token with computer-readable information inscribed on it that grants access to secure space
I. The act of committing willful damage to an asset


A. Physical access
B. Natural disasters
C. Intrusion detection
D. Sensors
E. Perimeter controls
F. Location
G. Bollards
H. Smart card
I. Vandalism

Computer Science & Information Technology

You might also like to view...

If radio buttons radBlue and radGreen are located in one GroupBox, and two other radio buttons radBanana and radCherry are in a second GroupBox, which of the following Boolean expressions could be true?

a. radBlue.Checked And radGreen.Checked b. radBanana.Checked And radCherry.Checked c. radBlue.Checked And radBanana.Checked d. radGreen.Checked And radBanana.Checked e. Answers (a) and (c) are correct f. Answers (c) and (d) are correct

Computer Science & Information Technology

Discuss the potential advantages and drawbacks in the use of an X.500 directory service in place of DNS and the Internet mail delivery programs. Sketch the design of a mail delivery system for an internetwork in which all mail users and mail hosts are registered in an X.500 database.

What will be an ideal response?

Computer Science & Information Technology

The ________ displays the current document in its own window with the viewing and editing menus from the Web App, but without the toolbars and tabs from the browser.

a. Pop-Out b. Pop-Up c. Pull-Up d. Pull-Out

Computer Science & Information Technology

Panels are _________________________ when they display only their tab.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology