436 Appendix A ■ Answers to Review Questions
- D. Mantraps are intended to control access and thus stop the occurrence of physical
breaches as a result of piggybacking and tailgating. - B. A false wall is one that only extends to a drop ceiling and not to the actual ceiling. These
types of walls can easily be climbed over to allow access to a previously inaccessible room. - A. Defense in depth provides much better protection than a single layer. It also provides a
means to slow down and frustrate an attacker. - B. Bollards can be used with fences to block a vehicle from crashing through a fence and
making an easy-to-use entrance. - A. A type 2 error is also known as a false rejection error, where someone who should have
had access was denied it. - B. Fingerprint systems are now becoming more common on laptops and portable devices.
They can also be used to authenticate individuals for access to facilities. - D. Audio and visual components are both vital.
- D. A pick and a tension wrench are the minimum equipment included in a lock-pick kit.
- A. A publicly available phone number is not a security risk in many cases as the machine
may be one that can be sent information from anywhere. - A. A drop ceiling is a false ceiling or one that conceals ducting and insulation.
- B. Portals are more commonly referred to by the term mantrap.
- C. A cipher lock is a form of combination lock that requires a code to be entered in order to
open the door or area. - A. Fences in many cases are the first line of defense that an intruder would encounter.
- C. Encryption of an entire drive deters the theft of a drive or device; however, it will not
keep the drive from being stolen. - B. Flash drives offer several advantages, including their size, speed, and portability.
A disadvantage for security personnel is that they can hold a lot of data and be very
easily hidden.
bapp01.indd 436 22-07-2014 10:56:37