Lesson 21 - Explain the Importance of Physical Site Security Controls Flashcards

1
Q

Controls that restrict, detect, and monitor access to specific physical areas or assets through measures such as physical barriers, physical tokens, or biometric access controls.

A

Physical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

create access lists and identification mechanisms to allow approved persons through the barriers.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

create barriers around a resource so that access can be controlled through defined entry and exit points.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

keep a record of when entry/exit points are used and detect security breaches.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scanner that reads data from an RFID or NFC tag when in range.

A

proximity reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of gateway that only allows one person through at a time.

A

turnstile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secure entry system with two gateways, only one of which is open at any one time.

A

mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Devices can be physically secured against theft using cable ties and padlocks. Some systems also feature lockable faceplates, preventing access to the power switch and removable drives.

A

Cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Duplicating a smart card by reading (skimming) the confidential data stored on it.

A

Card cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Duplicating a smart card by reading (skimming) the confidential data stored on it.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware plug to prevent malicious data transfer when a device is plugged into a USB charging point.

A

USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A device that transforms one type of energy into another (typically light into an electrical signal).

A

sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Installation of video cameras to supply security monitoring data to a centralized management station.

A

CCTV (closed circuit television)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A remote-controlled or autonomous robot capable of patrolling site premises or monitoring gateways.

A

Robot sentries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of network isolation that physically separates a network from all other networks.

A

air gapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wire mesh container that blocks external electromagnetic fields from entering into the container.

A

Faraday Cage

17
Q

Building control systems maintain an optimum heating, cooling, and humidity level working environment for different parts of the building.

A

HVAC (Heating, Ventilation, Air Conditioning)

18
Q

Arrangement of server racks to maximize the efficiency of cooling systems.

A

hot aisle/cold aisle

19
Q

A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.

A

(Electromagnetic Interference [EMI])

20
Q

Arrangement of server racks to maximize the efficiency of cooling systems.

A

hot aisle/cold aisle

21
Q

A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.

A

(Electromagnetic Interference [EMI])
To reduce interference, data/network cabling should not be run parallel to power cabling. If EMI is a problem, shielded cabling can be installed. Alternatively, the copper cabling could be replaced with fiber optic cabling, which is not susceptible to EMI.

22
Q

Fire detection and suppression systems are mandatory in most public and private commercial premises. Water-based fire suppression is a risk to computer systems, both in the event of fire and through the risk of flood. Alternatives include dry pipe and gas-based systems.

A

Fire suppression

23
Q

The process of thorough and completely removing data from a storage medium so that file remanants cannot be recovered.

A

Media sanitization

24
Q

Leftover information on a storage medium even after basic attempts have been made to remove that data.

A

Data remnants

25
The process of rendering a storage drive inoperable and its data unrecoverable by eliminating the drive's magnetic charge.
Degaussing exposing a hard disk to a powerful electromagnet disrupts the magnetic pattern that stores the data on the disk surface. Note that SSDs, flash media, and optical media cannot be degaussed, only hard disk drives.
26
hitting a hard drive with a hammer can leave a surprising amount of recoverable data, so this type of destruction should be performed with industrial machinery.
Pulverizing
27
The standard method of sanitizing an HDD
overwriting The most basic type of overwriting is called zero filling, which just sets each bit to zero. A more secure method is to overwrite the content with one pass of all zeros, then a pass of all ones, and then a third pass in a pseudorandom pattern.
28
A method of sanitizing a drive using the ATA command set.
Secure Erase (SE) Since 2001, the SATA and Serial Attached SCSI (SAS) specifications have included a Secure Erase (SE) command. This command can be invoked using a drive/array utility or the hdparm Linux utility. On HDDs, this performs a single pass of zero-filling.
29
A method of sanitizing a drive by setting all bits to zero.
zero-filling