Problems affecting device security Flashcards

1
Q

What type of security does a 3-layer or multiple barrier system refer to?

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Setting up security zones controls what?

A

To control where employees are allowed to go inside a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of double-door security is used in high security areas?

A

Mantraps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What additional security could you install within a server room?

A

Network closets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cipher doors and proximity locks should ideally control access to what?

A

Server rooms and network closets with important infrastructure like routers, switches, firewalls and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

you want to provide secure access to a room and want to use dual-factor authentication, do you use a proximity card or a key fob?

A

Key fob. It can be used in addition to providing a PIN for multifactor access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometric systems use what two types of ‘factor’ authentication?

A

Characteristic factors and Behavioral factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are biometric systems susceptible to?

A

False positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What advantage do security guards have over automated systems?

A

They can use discriminating judgement in a situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You can improve the logical security of your network by dividing it into smaller administrative security zones by creating and using what?

A

Creating VLANs and using a DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can help to speed up the data-recovery process when having to use a recovery site? List the two types

A

Performing snapshot backups

1) copy-on-write
2) split mirror

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What involves testing to seek to exploit vulnerabilities as opposed to just identify them?

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 types of testing strategies used in penetration testing?

A

1) Blind testing
2) Double-Blind Test
3) Target Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of penetration test involves the testing team having limited knowledge of the system but the organization’s security team knows an attack is coming?

A

Blind Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In what what type of penetration test does the organization’s security team not know about the planned attack?

A

Double Blind Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly