Chapter 3 Flashcards

1
Q

Which of the following are solutions that address physical security? (Select two.)

Disable guest accounts on computers

Require identification and name badges for all employees

Escort visitors at all times

Implement complex passwords

Scan all floppy disks before use

A

Require identification and name badges for all employees

Escort visitors at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a fingerprint or retina scan is required to open a secured door, which kind of physical security has been implemented?

Access list

Double-entry door

Mantrap

Biometric locks

A

Biometric locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which option is a benefit of CCTV?

Increase security protection throughout an environment

Provide a corrective control

Expand the area visible by security guards

Reduce the need for locks and sensors on doors

A

Expand the area visible by security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose?

PTZ

Dome

C-mount

Bullet

A

PTZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following controls is an example of a physical access control method?

Hiring background checks

Passwords

Access control lists with permissions

Locks on doors

Smart cards

A

Locks on doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?

Use weight scales

Install security cameras

Use key locks rather than electronic locks

Deploy a mantrap

A

Deploy a mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring?

Detection

Prevention

Data breach

Recovery

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Biometric locks

Smart card

Keypad locks

Proximity card

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following allows an easy exit of an area in the event of an emergency, but also prevents entry? (Select two.)

Mantrap

Turnstile

PTZ CCTV

Bollard

Double-entry door

A

Turnstile
Double-entry door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns?

Use cable locks to chain the laptops to the desks.

Implement screen saver passwords.

Encrypt all company data on hard drives.

Require strong passwords in the Local Security Policy.

A

Use cable locks to chain the laptops to the desks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access.

Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)

Place your networking equipment in a Van Eck cage.

Place your networking equipment in a room that requires key card entry.

Place your networking equipment in a locked cage.

Place your networking equipment in a TEMPEST cage.

Place your networking equipment in a Faraday cage.

A

Place your networking equipment in a room that requires key card entry.

Place your networking equipment in a locked cage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are an IT consultant. You are visiting a new client’s site to become familiar with their network. As you walk around their facility, you note the following:

Implement a hardware checkout policy.

Replace the tape drive used for backups with external USB hard disks.

Upgrade the server closet lock to a biometric authentication system.

Keep the network infrastructure devices (switch and all-in-one device) in a locked room separate from network servers.

A

Implement a hardware checkout policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most important thing to do to prevent console access to the router?

Disconnect the console cable when not in use.

Keep the router in a locked room.

Set the console and enable secret passwords.

Implement an access list to prevent console connections

A

Keep the router in a locked room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Burning, pulping, and shredding are three ways to securely dispose of data in which form?

Tape

Paper

Cloud

Disk

A

Paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer or small network that is not connected to the rest of the network or the internet is known as:

DMZ

Air gap

Vault

Faraday cage

A

Air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device is used to allow a USB device to charge but blocks the data transfer capabilities of the device?

USB data blocker

Bollard

Air gap

Faraday cage

A

USB data blocker

17
Q

Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to prevent emissions from being retrieved from the air?

Faraday cage

USB data blocker

Air gap

PDS

A

PDS

18
Q

Which special network area is used to provide added protection by isolating publicly accessible servers?

Internet

VLAN

DMZ

Intranet

A

DMZ

19
Q

A Faraday cage is used to prevent what from leaving an area?

Hackers

Electromagnetic emissions

Network packets

Computers

A

Electromagnetic emissions

20
Q

It is important to follow correct procedures when running electrical cables next to data cables in order to protect against which environmental concern?

Humidity
Airflow
Temperature
Electromagnetic interference

A

Electromagnetic interference

21
Q

Most equipment is cooled by bringing cold air in the front and ducting the heat out of the back. What is the term for where the heat is sent in this type of scenario?

Back aisle
Hot aisle
Cold aisle
Front aisle

A

Hot aisle

22
Q

What is the recommended humidity level for server rooms?

10% or lower
30%
50%
70% or higher

A

50%

23
Q

Which deviation in power is the longest in duration?

Sag
Transient
Surge
Blackout

A

Blackout

24
Q

Power, heating, ventilation, air conditioning systems (HVAC), and utilities are all components of which term?

Network protection
Cold aisle
Infrastructure
Hot aisle

A

Infrastructure

25
Q

You maintain a network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting network availability.

Which of the following should you implement?

Positive pressure system
Line conditioner
Negative pressure system
UPS
Backup generator

A

Positive pressure system

26
Q

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees.

What should you do to help reduce problems?

Add a humidifier to the server room.
Add line conditioners in the server room.
Add a separate A/C unit in the server room.
Add a de-humidifier to the server room.

A

Add a separate A/C unit in the server room.

27
Q

Which device is used to ensure power to a server or network device during short power outages?

Surge protector
Backup generator
Line conditioner
Uninterruptible power supply

A

Uninterruptible power supply

28
Q

Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components?

Class A
Class B
Class C
Class D

A

Class C

29
Q

You walk by the server room and notice that a fire has started. What should you do first?

Turn on the overhead sprinklers.
Make sure everyone has cleared the area.
Grab a fire extinguisher and try to put out the fire.
Call the fire department.

A

Make sure everyone has cleared the area.