CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 5

• 25 An organization’ s IT manager is establishing a business relationship with an off-site media storage company, for storage of backup media. The storage company has a location 5 miles away from the organization’ s data center, and another location that is 70 miles away. Why should one location be preferred over the other?
• 26 The process of erasing magnetic media through the use of a strong magnetic field is known as:
• 27 Which type of fire extinguisher is effective against flammable liquids:
• 28 The type of smoke detector that is designed to detect smoke before it is visible is:
• 29 The term“ N + 1” means:
• 30 A building access mechanism where only one person at a time may pass is called a:
• 31 A secure facility needs to control incoming vehicle traffic and be able to stop determined attacks. What control should be implemented:
• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?
• 33 The risks of excessive humidity in a computing facility include all of the following

• 25 An organization’ s IT manager is establishing a business relationship with an off-site media storage company, for storage of backup media. The storage company has a location 5 miles away from the organization’ s data center, and another location that is 70 miles away. Why should one location be preferred over the other?

• 26 The process of erasing magnetic media through the use of a strong magnetic field is known as:

• 27 Which type of fire extinguisher is effective against flammable liquids:

• 28 The type of smoke detector that is designed to detect smoke before it is visible is:

• 29 The term“ N + 1” means:

• 30 A building access mechanism where only one person at a time may pass is called a:

• 31 A secure facility needs to control incoming vehicle traffic and be able to stop determined attacks. What control should be implemented:

• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this?

• 33 The risks of excessive humidity in a computing facility include all of the following