Chapter 10 - Physical Security Requirements Flashcards

1
Q

What does not need to be true in order to maintain the most efficient and secure server room?

A

Centralized server rooms need not be human compatible. In fact, the more human incompatible a server room is, the more protection it will offer against casual and determined attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most common form of perimeter security devices or mechanisms?

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is not a disadvantage of using security guards?

A

Security guards are usually unaware of the scope of the operations within a facility and are therefore not thoroughly unaware of the scope of the operations within a facility and are therefore not thoroughly equipped to know how to respond to every situations. Finally, security guards are expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common and inexpensive form of physical access control device?

A

Key locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Static voltage and damage

A

Static Voltage Possible damage
40 Destruction of sensitive circuits and other electronic components
1,000 Scrambling of monitor displays
1,500 Destruction of data stored on hard drive (*)
2,000 Abrupt system shutdown
4,000 Printer jam or component damage
17,000 Permanent circuit damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How critical areas should be lighted?

A

Lighting should be used to discourage intruders and provide safety for personnel, entrances, parking areas and critical sections. Critical areas should be illuminated 8 feet high and 2 feet out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fire suppression methods

A

https://www.freepracticetests.org/quiz/uploads/images/Types%20of%20Fire.JPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which hsuppresses combustion by disrupting a chemical reaction, by doing so it kills the fire?

A

Halon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Design AC unit in information processing Centre?

A

The AC units used in a information processing facility (computer room) must be dedicated and controllable from within the area. They must be on an independent power source from the rest of the room and have a dedicated Emergency Power Off switch. It is positive, not negative pressure that forces smoke and other gases out of the room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Crime Prevention Through Environmental Design (CPTED) the concept of territoriality is best described as

A

The correct answer is: Ownership.
Crime prevention through Environmental Design (CPTED) is a concept that encourages individuals to feel ownership and respect for the territory they consider occupy. By encouraging the use of physical attributes that express ownership, the individual is more apt to protect and be aware in that environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher Lock

A

The combination door lock or cipher lock uses a numeric key pad, push button, or dial to gain entry, it is often seen at airport gate entry doors and smaller server rooms. The combination should be changed at regular interval or whenever an employee with access is transferred, fired or subject to disciplinary action. This reduces risk of the combination being known by unauthorized people.
A cipher lock, is controlled by a mechanical key pad, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry. The drawback is someone looking over a shoulder can see the combination. However, an electric version of the cipher lock is in production in which a display screen will automatically move the numbers around, so if someone is trying to watch the movement on the screen they will not be able to identify the number indicated unless they are standing directly behind the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of locks

A

For your exam you should know below types of lock
Bolting door lock – These locks required the traditional metal key to gain entry. The key should be stamped “do not duplicate” and should be stored and issued under strict management control.
Biometric door lock – An individual’s unique body features such as voice, retina, fingerprint,, hand geometry or signature, activate these locks. This system is used in instances when extremely sensitive facilities must be protected such as in the military.
Electronic door lock – This system uses a magnetic or embedded chip based plastic card key or token entered into a sensor reader to gain access. A special code internally stored in the card or token is read by sensor device that then activates the door locking mechanism.
The Combination door lock or cipher lock uses a numeric key pad or dial to gain entry, and is often seen at airport gate entry doors and smaller server rooms. The combination should be changed at regular interval or whenever an employee with access is transferred, fired or subject to disciplinary action. This reduces risk of the combination being known by unauthorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Capacitance detectors

A

Capacitance detectors monitor an electrical field surrounding the object being monitored. They are used for spot protection within a few inches of the object, rather than for overall room security monitoring used by wave detectors. Penetration of this field changes the electrical capacitance of the field enough to generate and alarm. Wave pattern motion detectors generate a frequency wave pattern and send an alarm if the pattern is disturbed as it is reflected back to its receiver. Field-powered devices are a type of personnel access control devices. Audio detectors simply monitor a room for any abnormal sound wave generation and trigger an alarm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For maximum security design, what type of fence is most effective and cost-effective method (Feet are being used as measurement unit below)?

A

For maximum security design, the use of double fencing with rolls of concertina wire positioned between the two fences is the most effective deterrent and cost-efficient method. In this design, an intruder is required to use an extensive array of ladders and equipment to breach the fences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Safe replacement for halon

A
FM-200
NAF-S-III
CEA-410
FE-13
Water
Inergen
Argon
Argonite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How different suppression agents work

A

Fuel and oxygen help feed fires and should be removed in order to successfully extinguish them with soda acid or CO2. Heat should be reduced by using water. CHemical reactions should be distrusted by using a type of gas (halon, fm-200).

17
Q

How far should portable fire extinguishers be located from electrical equipment?

A

50 feet

18
Q

Internal Partitions

A

Internal partitions only go up to the dropped ceiling and not to the real ceiling. Someone can easily go through the dropped ceiling, climb over the partition, and enter the sensitive area.

19
Q

Seismic IDS

A

Seismic IDS is sensitive to sounds and vibrations and detects noise level changes in the area it is placed in. These devices do not emit any waves, they only listen for sounds within an area and are considered passive devices.

20
Q

Proximity detector or capacitance detector

A

It emits a measurable magnetic field while in use. The detector monitors this electrical field and an alarm sounds if this field is disrupted. These devices are usually used to protect specific objects (art work) as opposed to the whole room.

21
Q

Fire extinguisher should be inspected quarterly, not yearly.

A

N/A

22
Q

Phase Alternative Line (PAL)

A

It provides specific requirements for monitor used with closed-circuit TVs (CCTV)

23
Q

Passive Infrared System

A

It measures changes in heat waves for a specific area by using a series of beams. If the temperature in a specific area where one of the beams terminates suddenly increases, it is possible that person has entered the area.

24
Q

Photoelectric detector

A

Smoke activated detectors use photoelectric optical detectors to detect changed in light intensity. One portion of the detector sends a beam of light to a receiver. If this beam is interrupted, the detector assumes that smoke has caused it and sets off the alarm.

25
Q

Trip Lighting

A

Trip lighting uses a trigger to activate the lights. Many companies use trip lighting around the perimeter so that the outside lights will turn on when someone approaches the facility.

26
Q

Three strategies of CPTED

A

Natural access control, natural surveillance, and natural territorial reinforcement.

27
Q

Data centers should not have Windows.

A

N/A