02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Review Questions 411<br />

7. Which of the following is a wall that is less than full height?<br />

A. Drop wall<br />

B. False wall<br />

C. Short wall<br />

D. Plenum wall<br />

8. In the field of IT security, the concept of defense in depth is the layering of more than one<br />

control on another. Why is this?<br />

A. To provide better protection<br />

B. To build dependency among layers<br />

C. To increase logging ability<br />

D. To satisfy auditors<br />

9. What is an intrusion prevention system used exclusively in conjunction with fences?<br />

A. Infrared wave patter<br />

B. Bollards<br />

C. Audio<br />

D. PIDAS<br />

10. Frequency of type 2 errors is also known as what?<br />

A. False rejection rate<br />

B. Failure rate<br />

C. Crossover error rate<br />

D. False acceptance rate<br />

11. Which type of biometric system is frequently found on laptops but can be used on entryways<br />

as well?<br />

A. Retina<br />

B. Fingerprint<br />

C. Iris<br />

D. Voice recognition<br />

12. Which of the following could be considered required components of an alarm system?<br />

A. A visual alerting method<br />

B. An audio alerting method<br />

C. Automatic dialup<br />

D. Both A and B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!