Show Rich-Text Editor (and character count) Question 40 of 44 2.0 Points Show Ri
ID: 3739563 • Letter: S
Question
Show Rich-Text Editor (and character count)
Question 40 of 44
2.0 Points
Show Rich-Text Editor (and character count)
Question 41 of 44
8.0 Points
Show Rich-Text Editor (and character count)
Question 42 of 44
3.0 Points
Show Rich-Text Editor (and character count)
Question 43 of 44
3.0 Points
Show Rich-Text Editor (and character count)
Question 44 of 44
5.0 Points
Show Rich-Text Editor (and character count)
Explain the relationship between the “4Ds” of physical security and defense in depth? Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Mark for Review What's This?
Question 40 of 44
2.0 Points
Why could a power system such as a UPS or generator considered a security measure? Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Mark for Review What's This?
Question 41 of 44
8.0 Points
Name and briefly describe the use of each of the four VPN architectures. Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Mark for Review What's This?
Question 42 of 44
3.0 Points
Explain one meaning of the phrase: In most cases, you don't design a building for security. You secure the design of a building. Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Mark for Review What's This?
Question 43 of 44
3.0 Points
Explain why classical risk analysis (such as rates of occurrence, degree of threat, and costs of loss) may be easier to calculate for physical assets than computer-based assets Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Mark for Review What's This?
Question 44 of 44
5.0 Points
Briefly describe how you would control access to a server room or data center, if you had a budget of $50,000-$100,000 for access control. Maximum number of characters (including HTML tags added by text editor): 32,000Show Rich-Text Editor (and character count)
Explanation / Answer
Solution:
41)
Because it is vulnerable to threats like theft. Because fluctuations provided through these equipment can take the system off for a second and within that time threat can break into the system.
Like taking out CCTV for a moment.
42)
The four architectures of VPN are:
43)
Because physical assets are easy to visualize and we can see them.
44)
According to the budget a good firewall will be used for access control which will provide robust features to the system.
I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)