Join the discussion
Question 1/56
Juan, a safety officer at an organization, installed a physical lock at the entrance of each floor. All employees in the organization were allotted a smart card embedded in their ID cards, which had to be swiped to unlock doors and Access any floor. Which of the following types of physical locks did Juan install In this scenario?
Correct Answer: B
Digital locks are the types of physical locks that Juan installed in this scenario. A physical lock is a device that prevents or restricts access to a physical location or environment, such as a door, a cabinet, a drawer, etc. A physical lock can have different types based on its mechanism or technology. A digital lock is a type of physical lock that uses electronic or digital components, such as a keypad, a card reader, a fingerprint scanner, etc., to unlock or lock . A digital lock can be used to provide enhanced security and convenience to users, but it can also be vulnerable to hacking or tampering. In the scenario, Juan installed a physical lock at the entrance of each floor. All employees in the organization were allotted a smart card embedded in their ID cards, which had to be swiped to unlock doors and access any floor. This means that he installed digital locks for those doors. A mechanical lock is a type of physical lock that uses mechanical components, such as a key, a bolt, a latch, etc., to unlock or lock. A combination lock is a type of physical lock that uses a sequence of numbers or symbols, such as a dial, a wheel, or a keypad, to unlock or lock. An electromagnetic lock is a type of physical lock that uses an electromagnet and an armature plate to unlock or lock.
Add Comments
- Other Question (56q)
- Q1. Juan, a safety officer at an organization, installed a physical lock at the entrance of ea...
- Q2. Bob was recently hired by a medical company after it experienced a major cyber security br...
- Q3. Identify a machine in the network with 5SH service enabled. Initiate an SSH Connection to ...
- Q4. Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was ...
- Q5. Myles, a security professional at an organization, provided laptops for all the employees ...
- Q6. Dany, a member of a forensic team, was actively involved in an online crime investigation ...
- Q7. Gideon, a forensic officer, was examining a victim's Linux system suspected to be involved...
- Q8. Steve, a network engineer, was tasked with troubleshooting a network issue that is causing...
- Q9. Lorenzo, a security professional in an MNC, was instructed to establish centralized authen...
- Q10. Grace, an online shopping freak, has purchased a smart TV using her debit card. During onl...
- Q11. Jaden, a network administrator at an organization, used the ping command to check the stat...
- Q12. The IH&R team in an organization was handling a recent malware attack on one of the ho...
- Q13. Camden, a network specialist in an organization, monitored the behavior of the organizatio...
- Q14. The SOC department in a multinational organization has collected logs of a security event ...
- Q15. Hayes, a security professional, was tasked with the implementation of security controls fo...
- Q16. A web application www.movieabc.com was found to be prone to SQL injection attack. You are ...
- Q17. Arabella, a forensic officer, documented all the evidence related to the case in a standar...
- Q18. Kason, a forensic officer, was appointed to investigate a case where a threat actor has bu...
- Q19. Rickson, a security professional at an organization, was instructed to establish short-ran...
- Q20. Charlie, a security professional in an organization, noticed unauthorized access and eaves...
- Q21. You are Harris working for a web development company. You have been assigned to perform a ...
- Q22. Ashton is working as a security specialist in SoftEight Tech. He was instructed by the man...
- Q23. A threat intelligence feed data file has been acquired and stored in the Documents folder ...
- Q24. Steve, a network engineer, was tasked with troubleshooting a network issue that is causing...
- Q25. Ryleigh, a system administrator, was instructed to perform a full back up of organizationa...
- Q26. Zion belongs to a category of employees who are responsible for implementing and managing ...
- Q27. Maisie. a new employee at an organization, was given an access badge with access to only t...
- Q28. Mark, a security analyst, was tasked with performing threat hunting to detect imminent thr...
- Q29. An loT device placed in a hospital for safety measures has sent an alert to the server. Th...
- Q30. Kayden successfully cracked the final round of interviews at an organization. After a few ...
- Q31. Grace, an online shopping enthusiast, purchased a smart TV using her debit card. During on...
- Q32. Martin, a network administrator at an organization, received breaching alerts for an appli...
- Q33. Mark, a security analyst, was tasked with performing threat hunting to detect imminent thr...
- Q34. Johnson, an attacker, performed online research for the contact details of reputed cyberse...
- Q35. A startup firm contains various devices connected to a wireless network across the floor. ...
- Q36. Ryleigh, a system administrator, was instructed to perform a full back up of organizationa...
- Q37. Elliott, a security professional, was tasked with implementing and deploying firewalls in ...
- Q38. A software company has implemented a wireless technology to track the employees' attendanc...
- Q39. Elliott, a security professional, was appointed to test a newly developed application depl...
- Q40. In an organization, all the servers and database systems are guarded in a sealed room with...
- Q41. Leilani, a network specialist at an organization, employed Wireshark for observing network...
- Q42. Richard, a professional hacker, was hired by a marketer to gather sensitive data and infor...
- Q43. A threat intelligence feed data file has been acquired and stored in the Documents folder ...
- Q44. You are a penetration tester working to test the user awareness of the employees of the cl...
- Q45. You are Harris working for a web development company. You have been assigned to perform a ...
- Q46. Shawn, a forensic officer, was appointed to investigate a crime scene that had occurred at...
- Q47. Tenda, a network specialist at an organization, was examining logged data using Windows Ev...
- Q48. Jase. a security team member at an organization, was tasked with ensuring uninterrupted bu...
- Q49. A web application www.movieabc.com was found to be prone to SQL injection attack. You are ...
- Q50. Sam, a software engineer, visited an organization to give a demonstration on a software to...
- Q51. Malachi, a security professional, implemented a firewall in his organization to trace inco...
- Q52. Leo has walked to the nearest supermarket to purchase grocery. At the billing section, the...
- Q53. Richards, a security specialist at an organization, was monitoring an IDS system. While mo...
- Q54. Leilani, a network specialist at an organization, employed Wireshark for observing network...
- Q55. A software team at an MNC was involved in a project aimed at developing software that coul...
- Q56. You have been assigned to perform a vulnerability assessment of a web server located at IP...
