Chapter 3.9 Flashcards

1
Q

physical controls

A

Physical security controls can be touched. Both the alarm and door locks are physically touchable security controls. The alarm is in place to alert the facility in the event of a breach. The door locks ensure no one leaves the area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative controls

A

Administrative controls are company policy and procedures that guide employee actions. Weekly vulnerability assessments are an example of an administrative control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control diversity

A

Control diversity includes the use of multiple control types such as administrative, technical and physical, working together to create a layered security practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technical controls

A

Technical controls are safeguards implemented by the system through the use of hardware, software and firmware. Firewalls, intrusion detection systems and intrusion prevention systems are considered technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hot and cold aisles

A

Hot and cold aisles are arranged with all the hardware expelling heat toward one aisle where the exhaust vents are placed. The other side of the aisle is designated for cool air. Avoiding the mixture of warm and cold air helps to improve the efficiency of the entire operation and reduce costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HVAC

A

Heating Ventilation and Air Conditioning (HVAC) can also enhance the availability of systems in a data center. HVAC is a costly option and will not work alone to cool the data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fire suppression system

A

A fire suppression system monitors a protected area for fire activity and provides the means to extinguish a fire upon alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

airgap

A

An airgap provides complete physical isolation from other systems. There is no connection of any type. Secure networks, or those that house sensitive information, are typically separated from unsecure networks via airgap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly