More Subjects
Week 6 Questions and Answers
Student’s Name
Institution
Date
Q1. Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or another location that you are familiar with.
Infrared sensor
It is designed to detect certain characteristics to ensure that either the building or home is secure. It detects heat, radiation, and motion therefore, it can detect any intruder from a distance. It is an electronic sensor, which detects radiation from an object and therefore, it makes it impossible for any individual or an object to make an entry into a secure area.
Pressure Sensor
It is a gadget device, which is used to measure the pressure of liquids or gases. Several organizations use this device for the detection of any movement in order to prevent unauthorized entry. The device is buried underground so that it can detect any change and trigger alert.
Electric fence
The electric fence is mostly used to keep people and animals away from a secure or prohibited area. It is mostly used with infrared and pressure sensor on different or the same site. The sensor system is implemented between two fences, which include the thermal cameras at different lengths.
Q2: Describe the differences between the hot, warm, and cold site methods of facility recovery. What is a rolling hot site? What is a reciprocal agreement?
A cold site in an IT point of view is the situation where the system has been set, but there is not a proper backup system set. Hot is the duplicate the parent or the original site used for the backup. It is the original copy of the original production site CITATION Ken16 \l 1033 (Kennedy, 2016). This includes network system, personnel, and the power grids used for instant backup of data. There is usually little or no downtime when taking the host site to the backup.
Q3: What are the four characteristics that help ensure that evidence is legally admissible in court? Describe hearsay evidence and its admissibility
The four features, which are used to assist in gathering evidence to be admitted in court are Hearsay, authenticate, and relevant or privilege CITATION Sul17 \l 1033 (Sullivan & Betan, 2017). The hearsay is described as a statement more than what it is declared when giving testimony during the hearing given to prove the truth. It can be used before the court of law because it passes the “foolproof Hearsay Test.”
References
BIBLIOGRAPHY Kennedy, C. (2016). Difference between a cold, warm and hot disaster recovery site. http://resource.onlinetech.com/what-is-the-difference-between-a-cold-warm-and-hot-disaster-recovery-site/, 2-31.
Sullivan, E., & Betan, H. (2017). IT Disaster Management and Backup. International Journal of Information and technology, 2-15.
More Subjects
Join our mailing list
© All Rights Reserved 2024