CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 8

• 32 A security manager is concerned that lost key cards can be used by an intruder to gain entrance to a facility. What measure can be used to prevent this? • • 33 The risks of excessive humidity in a computing facility include all of the following 34 Provided it is permitted by local fire codes, which type of fire sprinkler system is most preferred for computer rooms? • 35 • The innermost portion of an operating system is known as: 36 A security analyst has a system evaluation criteria manual called the “Orange Book”. This is a part of: • 37 The component in a computer where program instructions are executed is called the: