CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 5

• 25 An organization ’ s IT manager is establishing a business relationship with an off-site media storage company , for storage of backup media . The storage company has a location 5 miles away from the organization ’ s data center , and another location that is 70 miles away . Why should one location be preferred over the other ?
• 26 The process of erasing magnetic media through the use of a strong magnetic field is known as :
• 27 Which type of fire extinguisher is effective against flammable liquids :
• 28 The type of smoke detector that is designed to detect smoke before it is visible is :
• 29 The term “ N + 1 ” means :
• 30 A building access mechanism where only one person at a time may pass is called a :
• 31 A secure facility needs to control incoming vehicle traffic and be able to stop determined attacks . What control should be implemented :
• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility . What measure can be used to prevent this ?
• 33 The risks of excessive humidity in a computing facility include all of the following

• 25 An organization ’ s IT manager is establishing a business relationship with an off-site media storage company , for storage of backup media . The storage company has a location 5 miles away from the organization ’ s data center , and another location that is 70 miles away . Why should one location be preferred over the other ?

• 26 The process of erasing magnetic media through the use of a strong magnetic field is known as :

• 27 Which type of fire extinguisher is effective against flammable liquids :

• 28 The type of smoke detector that is designed to detect smoke before it is visible is :

• 29 The term “ N + 1 ” means :

• 30 A building access mechanism where only one person at a time may pass is called a :

• 31 A secure facility needs to control incoming vehicle traffic and be able to stop determined attacks . What control should be implemented :

• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility . What measure can be used to prevent this ?

• 33 The risks of excessive humidity in a computing facility include all of the following