Physical Environmental Security Flashcards

2
Q
At what voltage level can static electricity cause destruction of data stored on hard drives?
A) 4,000
B) 17,000
C) 40
D) 1,500
A

1,500

Destruction of data stored on hard drives can be caused by 1,500 volts of static electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What type of physical security controls focus on facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures?
A) Technical
B) Physical
C) Administrative
D) Logical
A

Administrative

Administrative physical security controls include facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is typically not a culprit in causing damage to computer equipment in the event of a fire and a triggered suppression?
A) Heat
B) Suppression medium
C) Smoke
D) Light
A

Light

Light is usually not damaging to most computer equipment, but fire, smoke, and the suppression medium (typically water) are very destructive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What is the ideal humidity range for a computer room?
A) 20-40 percent
B) 40-60 percent
C) 60-75 percent
D) 80-95 percent
A

40-60 percent

The humidity in a computer room should ideally be from 40 to 60 percent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Type B fire extinguisher may use all except which of the following suppression mediums?
A) Water
B) CO2
C) Halon or an acceptable halon substitute
D) Soda acid

A

Water

Water is never the suppression medium in Type B fire extinguishers because they are used on liquid fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a disadvantage of using security guards?
A) Security guards are usually unaware of the scope of the operations within a facility.
B) Not all environments and facilities support security guards.
C) Not all security guards are themselves reliable.
D) Prescreening, bonding, and training does not guarantee effective and reliable security guards.

A

Security guards are usually unaware of the scope of the operations within a facility.

Security guards are usually unaware of the scope of the operations within a facility, which supports confidentiality of those operations and thus helps reduce the possibility that a security guard will be involved in the disclosure of confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
If you want to restrict access into or out of a facility, which would you choose?
A) Gate
B) Turnstile
C) Fence
D) Mantrap
A

Turnstile

A turnstile is a form of gate that prevents more than one person from gaining entry at a time and often restricts movement to one direction. It is used to gain entry but not exit, or vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object?
A) Wave
B) Photoelectric
C) Heat
D) Capacitance
A

Capacitance

A capacitance motion detector senses changes in the electrical or magnetic field surrounding a monitored object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is a double set of doors that is often protected by a guard and is used to contain a subject until their identity and authentication is verified?
A) Gate
B) Turnstile
C) Mantrap
D) Proximity detector
A

Mantrap

A mantrap is a double set of doors that is often protected by a guard and used to contain a subject until their identity and authentication is verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the point of a secondary verification system?
A) To verify the identity of a user
B) To verify the activities of a user
C) To verify the completeness of a system
D) To verify the correctness of a system

A

To verify the correctness of a system

Secondary verification mechanisms are set in place to establish a means of verifying the correctness of detection systems and sensors. This often means combining several types of sensors or systems (CCTV, heat and motion sensors, and so on) to provide a more complete picture of detected events. For more information, please see Chapter 19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What is the most common form of perimeter security devices or mechanisms?
A) Security guards
B) Fences
C) CCTV
D) Lighting
A

Lighting

Lighting is the most common form of perimeter security devices or mechanisms. Your entire site should be clearly lit. This provides for easy identification of personnel and makes it easier to notice intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What is the most common and inexpensive form of physical access control device?
A) Lighting
B) Security guard
C) Key locks
D) Fences
A

Key locks

Key locks are the most common and inexpensive form of physical access control device. Lighting, security guards, and fences are all much more costly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What is a perimeter-defining device used to deter casual trespassing?
A) Gates
B) Fencing
C) Security guards
D) Motion detectors
A

Fencing

Fencing is a perimeter-defining device used to deter casual trespassing. Gates, security guards, and motion detectors do not define a facility’s perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What is the most important goal of all security solutions?
A) Prevention of disclosure
B) Maintaining integrity
C) Human safety
D) Sustaining availability
A

Human safety

Human safety is the most important goal of all security solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent all but which of the following?
A) Piggybacking
B) Espionage
C) Masquerading
D) Abuse
A

Espionage

No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent abuse, masquerading, and piggybacking. Espionage cannot be prevented by physical access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following is the most important aspect of security?
A) Physical security
B) Intrusion detection
C) Logical security
D) Awareness training
A

Physical security

Physical security is the most important aspect of overall security. Without physical security, none of the other aspects of security are sufficient.

18
Q

What is the most common cause of failure for a water-based fire suppression system?
A) Water shortage
B) People
C) Ionization detectors
D) Placement of detectors in drop ceilings

A

People

The most common cause of failure for a water-based system is human error. If you turn off the water source after a fire and forget to turn it back on, you’ll be in trouble for the future. Also, pulling an alarm when there is no fire will trigger damaging water release throughout the office.

19
Q
What method can be used to map out the needs of an organization for a new facility?
A) Log file audit
B) Critical path analysis
C) Risk analysis
D) Inventory
A

Critical path analysis

Critical path analysis can be used to map out the needs of an organization for a new facility. A critical path analysis is the process of identifying relationships between mission critical applications, processes, and operations and all of the supporting elements.

20
Q

Which of the following does not need to be true in order to maintain the most efficient and secure server room?
A) It must be human compatible
.B) It must include the use of nonwater fire suppressants.
C) The humidity must be kept between 40 and 60 percent.
D) The temperature must be kept between 60 and 75 degrees Fahrenheit.

A

It must be human compatible

A computer room does not need to be human compatible to be efficient and secure. Having a human in compatible server room provides a greater level of protection against attacks.

21
Q
Which of the following is not a typical type of alarm that can be triggered for physical security?
A) Preventive
B) Deterrent
C) Repellant
D) Notification
A

Preventive

There is no such thing as a preventive alarm. Alarms are always triggered in response to a detected intrusion or attack.

22
Q

Which of the following is not a security-focused design element of a facility or site?
A) Separation of work and visitor areas
B) Restricted access to areas with higher value or importance
C) Confidential assets located in the heart or center of a facility
D) Equal access to all locations within a facility

A

Equal access to all locations within a facility

Equal access to all locations within a facility is not a security-focused design element. Each area containing assets or resources of different importance, value, and confidentiality should have a corresponding level of security restriction placed on it.

23
Q
What is the best type of water-based fire suppression system for a computer facility?
A) Wet pipe system
B) Dry pipe system
C) Preaction system
D) Deluge system
A

Preaction system

A preaction system is the best type of water-based fire suppression system for a computer facility.