CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 8
•
32
A security manager is concerned that lost key
cards can be used by an intruder to gain entrance to a facility.
What measure can be used to prevent this?
•
•
33
The risks of excessive humidity in a computing
facility include all of the following
34
Provided it is permitted by local fire codes, which
type of fire sprinkler system is most preferred for computer
rooms?
•
35
•
The innermost portion of an operating system is
known as:
36
A security analyst has a system evaluation criteria
manual called the “Orange Book”. This is a part of:
•
37 The component in a computer where program
instructions are executed is called the: