CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 8
• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility . What measure can be used to prevent this ?
• 33 The risks of excessive humidity in a computing facility include all of the following
• 34 Provided it is permitted by local fire codes , which type of fire sprinkler system is most preferred for computer rooms ?
• 35 The innermost portion of an operating system is known as :
• 36 A security analyst has a system evaluation criteria manual called the “ Orange Book ”. This is a part of :
• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility . What measure can be used to prevent this ?
• 33 The risks of excessive humidity in a computing facility include all of the following
• 34 Provided it is permitted by local fire codes , which type of fire sprinkler system is most preferred for computer rooms ?
• 35 The innermost portion of an operating system is known as :
• 36 A security analyst has a system evaluation criteria manual called the “ Orange Book ”. This is a part of :