Beruflich Dokumente
Kultur Dokumente
A. 0ost-based systems detect attacks on the hosts and network-based systems don¶t
B. Network-based systems detect attacks against the IDS and host-based systems only
detect attacks against the host
C. 0ost-based IDSs only determine if an attack was successful
D. Network-based IDSs rely on the use of network probes, while host-based systems rely on
software installed on each host
A. A false positive results when an attack or intrusion causes an alarm to be generated
B. A false positive is an alert sent to an incorrect management station
C. A false positive results when the IDS system reports an alarm, although no actual
intrusion occurs on the network
D. here is no such thing as a false positive
A. Anomaly detection uses profiles, while misuse detection uses signatures
B. Misuse detection uses profiles, while anomaly uses signatures
C. Anomaly detection uses network-based, while misuse detection uses
host based
D. No difference exists between misuse detection and anomaly detection
1.
a. ÿagnetic stripe
b. Wiegand swipe readers
c. Proximity
d. Bar code
2.
a. 3at 5e UTP
b. 3at 3 UTP
c. RG-6
d. 18-gauge five-conductor with an overall shield
3.
a. 37 bits
b. 32 bits
c. 26 bits
d. all of the above
4.
a. an identification number that's included in each access credential
b. the access controller panelâΦΡs ÿ 3 address
c. the clientâΦΡs access software activation code
d. the installerâΦΡs account number
5. á
a. True
b. False
6.
a. palm prints
b. fingerprints
c. human irises
d. human pulse rates
8.
a. fail-secure
b. fail-safe
D.
a. the number of credentials to be issued.
b. the number of doors to be secured.
c. life safety and approval.
d. how fast credentials can be read and access allowed.
10.@
!
!
a. self-contained batteries.
b. separate power supplies.
c. 3
d. power from the access controller panel.
11.
a. 50
b. 100
c. 200
d. 500
12.
a. £thernet
b. Internet
c. RS-485
d. telephone modem
13.´
a. True
b. False
17.
a. True
b. False
18.
!
a. 1.5 amps @ 24 VD3
b. 2 amps @ 24 VD3
c. 300 milliamps @ 24 VD3
d. 150 milliamps @ 24 VD3
nswer below.
When some authorized users walk past this door from the inside, they hear the door strike release.
What's causing this?
nswer below.
a
1. c
2. d âΦ͞ In most cases six-conductor O S (over all shielded) is installed, as cable manufacturers
donâΦΡt regularly manufacture equivalent five-conductor. ItâΦΡs important to properly
connect the reader cables shielding to ground.
3. d âΦ͞ 3ard populations can be purchased with different bit formats.
4. a âΦ͞ The site code (also called a facility code) is like the prefix of a telephone number and is
included in the data string of each credential issued for a particular system.
5. False
6. d âΦ͞ uman pulse rate. Biometric readers can be purchased that can read all of the other listed
inputs.
7. False âΦ͞ 3redential readers are usually connected to an access controller panel.
8. b âΦ͞ Fail-safe.
D. c âΦ͞ Life safety and approval.
10.b âΦ͞ Separate power supplies.
11.c âΦ͞ 200.
12.a, b, c, and d âΦ͞ The communications capability of particular access controller panels can be
one or multiple methods.
13.False âΦ͞ Keypads are slower than cards or âΦœhardâΦ credentials, as the user must remember
his or her number and punch it in.
14.a âΦ͞ Door position switches should not be connected to both the access control system and the
intrusion alarm system, unless the switch selected is DPDT (double pole, double throw) which
provides electrically separate connections to the respective systems.
15.b
16.True âΦ͞ Some magnetic locks and strikes have electric spike protection built in (this is
sometimes called diode protected). If the door release isnâΦΡt internally protected, a bridge
rectifier circuit should be connected.
17.True
18.d âΦ͞ Door-release devices operating at 12 VD3 typically have a higher current requirement than
those that operate at 24 VD3 do.
1D.c.
20.False âΦ͞ The correct term is âΦœmantrap.âΦ