Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Show Rich-Text Editor (and character count) Question 40 of 44 2.0 Points Show Ri

ID: 3739563 • Letter: S

Question

Show Rich-Text Editor (and character count)

Question 40 of 44

2.0 Points

Show Rich-Text Editor (and character count)

Question 41 of 44

8.0 Points

Show Rich-Text Editor (and character count)

Question 42 of 44

3.0 Points

Show Rich-Text Editor (and character count)

Question 43 of 44

3.0 Points

Show Rich-Text Editor (and character count)

Question 44 of 44

5.0 Points

Show Rich-Text Editor (and character count)

Explain the relationship between the “4Ds” of physical security and defense in depth? Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)


Mark for Review What's This?

Question 40 of 44

2.0 Points

Why could a power system such as a UPS or generator considered a security measure? Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)


Mark for Review What's This?

Question 41 of 44

8.0 Points

Name and briefly describe the use of each of the four VPN architectures. Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)


Mark for Review What's This?

Question 42 of 44

3.0 Points

Explain one meaning of the phrase: In most cases, you don't design a building for security. You secure the design of a building. Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)


Mark for Review What's This?

Question 43 of 44

3.0 Points

Explain why classical risk analysis (such as rates of occurrence, degree of threat, and costs of loss) may be easier to calculate for physical assets than computer-based assets Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)


Mark for Review What's This?

Question 44 of 44

5.0 Points

Briefly describe how you would control access to a server room or data center, if you had a budget of $50,000-$100,000 for access control. Maximum number of characters (including HTML tags added by text editor): 32,000

Show Rich-Text Editor (and character count)

Explanation / Answer

Solution:

41)

Because it is vulnerable to threats like theft. Because fluctuations provided through these equipment can take the system off for a second and within that time threat can break into the system.

Like taking out CCTV for a moment.

42)

The four architectures of VPN are:

43)

Because physical assets are easy to visualize and we can see them.

44)

According to the budget a good firewall will be used for access control which will provide robust features to the system.

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)