Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

which describes an opportunistic attack?

A.

Typically performed by a person with legitimate access

B.

The attacker is usually not acquainted with the target

C.

Often organized, with several people involved

D.

Targeted at a specific system with a specific goal

Using bidirectional predictive interframe in H.264 will

A.

be independently decoded without referencing other frames.

B.

require more bits than if only l-frames are used.

C.

create dependency just to earlier P- and l-frames.

D.

increase the latency in the system.

The interval between two I-frames is known as?

A.

Number of frames (NOF)

B.

Group of pictures (GOP)

C.

Group of frames (GOF)

D.

Number of pictures (NOP)

The main benefit of signed firmware is that

A.

only super administrators are able to initiate a firmware upgrade.

B.

only one device at a time is upgraded, to avoid interruptions.

C.

the integrity of the firmware can be verified by the device before upgrading.

D.

the upgrade can be scheduled to take place at a non-critical time.

What direction of movement (relative to the camera) do video analytics applications detect more easily?

A.

Perpendicular to the camera

B.

Toward the camera

C.

At a 45°angle to the camera

D.

Away from the camera

Which setting affects motion blur in a scene?

A.

Frames per second

B.

Video compression

C.

Pixel density

D.

Shutter speed

Which camera model provides the greatest deterrence effect?

A.

AXIS P3247-LVE

B.

AXIS P1375-E

C.

AXIS M3116-LVE

D.

AXIS F1035-E

Closing the aperture at a fixed focal length provides

A.

a longer depth of field and a higher f-number.

B.

a longer field of view and a lower f-number.

C.

a shorter field of view and a higher f-number.

D.

a shorter depth of field and a higher f-number.

What type of lens does a fixed box camera typically use?

A.

A C-mount lens

B.

ATA-lens

C.

An M12 lens

D.

A CS-mount lens

Keeping firmware up to date helps a device to

A.

maintain its IP-rating.

B.

stay as cybersecure as possible.

C.

remain in focus constantly.

D.

stay compatible with the VMS.