For safety reasons, external locked doors on commercial buildings have mechanisms for people on the inside to escape without using a key or combination. One common mechanism uses an infrared motion detector to open an electronic lock for people moving towards a door from the inside. Explain how an air gap under such an external door could be exploited to open that door from the outside?

What will be an ideal response?


Use a large warm metal sheet. Slide the sheet under the door and move it
around to trigger the motion detector and unlock the door.

Computer Science & Information Technology

You might also like to view...

Which major regulation entity within the European Union (EU) was created to maintain a single standard for data protection among all member states in the EU?

A) Directive on Security of Network and Information Systems (the NIS Directive) B) EU General Data Protection Regulation (GDPR) C) European Union Agency for Network and Information Security (ENISA) D) The Consumer Credit Regulations 2010

Computer Science & Information Technology

Which of the following is not a way in which Facebook users can interact with other users?

A) Users can communicate with friends in a public or private fashion. B) Users can chat with their online friends. C) Users receive notifications when other users interact with them and cannot change Facebook's default settings. D) Users can play interactive games with friends on Facebook through the use of Facebook applications.

Computer Science & Information Technology

Which of the following is true of tape?

A. It is no longer used as a primary method of storage but is used most often for long-term storage and backup. B. It is used as a primary method of storage and for long-term storage and backup. C. It is no longer used for long-term storage and backup but is used most often as a primary method of storage. D. It is no longer used as a primary method of storage or for long-term storage and backup.

Computer Science & Information Technology

How many host addresses can be assigned with a subnet mask of 255.255.255.0? Explain how you calculated the result.

What will be an ideal response?

Computer Science & Information Technology