Search Header Logo

Quiz No. 3 (IAS1-Tues. 6-9)

Authored by Percival Adao

Science

University

Used 3+ times

Quiz No. 3 (IAS1-Tues. 6-9)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the protection of personnel,

hardware, software, networks and data from physical

actions and events that could cause serious loss or

damage to an enterprise, agency or institution.

data breach

authentication

physical security

data confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a device or software application that

monitors a network or systems for malicious activity or policy violations.

surveillance camera

security system

security guards

intrusion detection system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is one of the most important

forms of property protection. It can be used

in industrial or commercial environments to

provide maximum security for assets,

storage areas as well as open spaces on the

property

security fencing

razor wire wrapped around the building

barbed wire along with perimeters

camera system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can

be unlocked and opened to allow for vehicles to enter a facility or road.

When closed, it is easy for foot traffic to get past, so these are ideal for

parks, logging roads, and farms.

security fencing

razor wire wrapped around the building

barrier gates

camera system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protection for loading docks, door

jambs, and other in-plant areas that

may be more likely to see vehicle

accidents.

security fencing

Bollards

barrier gates

camera system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It includes alarm systems and panic buttons that

alert the authorities in the event of an emergency

security fencing

Bollards

barrier gates

physical security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Utilizing system like key cards, biometric scan, or pin codes to regulate entry to secured ares.

surveillance system

access control

security lighting

security guards

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?