17) Explaining Organizational and Physical Security Concepts Flashcards

1
Q

A security consultant needs to add a security system to the doors of a secured room. What system will the security consultant install that meets the requirement and protects against tampering?

A. Circuit
B. Closed-Circuit
C. Motion Detector
D. Biometric

A

B. Closed-Circuit

A closed-circuit alarm is more secure because cutting the circuit can defeat an open-circuit alarm. The security consultant can use this type of system for tamper detection.

A circuit-based alarm sounds when the circuit is opened or closed, depending on the type of alarm. A door, window, or fence opening can cut an open-circuit alarm.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

Biometric is an electronic lock integrated with a biometric scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network manager is asked to create a document that provides a detailed diagram of the wiring and port locations for the building. What is the name of this document?

A. Wiring Diagram
B. Rack
C. Floor Plan
D. Change Management

A

C. Floor Plan

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A rack system is a specially configured steel shelving system for patch panels, switches and routers, and server devices.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security consultant needs to add a security system to an office space that triggers an alarm while someone occupies the room. What type of equipment would the security install?

A. Motion Detection
B. Security Camera
C. Circuit
D. Asset Tag

A

A. Motion Detection

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room. The sensors in these detectors are either microwave radio reflection (similar to radar) or passive infrared (PIR), which detect moving heat sources.

A security camera is either fixed or can use Pan-Tilt-Zoom (PTZ) controls.

A circuit-based alarm sounds when the circuit is opened or closed, depending on the type of alarm.

An asset tag shows the ID of a device or component and links it to an inventory management database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network manager needs to create a document that shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC). What is the name of this document?

A. Wiring Diagram
B. Rack
C. Floor Plan
D. Change Management

A

A. Wiring Diagram

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A rack system is a specially configured steel shelving system for patch panels, switches and routers, and server devices.

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network specialist reviews the organization’s cellular technology and discovers that the current contract uses a low-power system service but supports higher bandwidth up to 1Mbps. What baseband radio technology service is the organization using for cellular service?

A. PACS
B. NB-IoT
C. IoT
D. LTE-M

A

D. LTE-M

LTE Machine Type Communication (LTE-M) is a low-power system but supports higher bandwidth (up to about 1 Mbps).

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

Narrowband-IoT (NB-IoT) refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. This means that data rates are limited (20-100 kbps), but most sensors send small packets with low latency rather than making large data transfers.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network consultant considers using a wireless communications protocol mainly used in home automation but believes it could support the organization’s mission. What is the name of this protocol?

A. Z-Wave
B. NB-IoT
C. IoT
D. LTE-M

A

A. Z-Wave

Z-Wave is a wireless communications protocol used primarily for home automation and creates a mesh network topology. The Z-Wave Alliance operates a device and software certification program.

Narrowband-IoT (NB-IoT) refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. Data rates are limited (20-100 kbps), but most sensors send small packets with low latency rather than making large data transfers.

Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

LTE Machine Type Communication (LTE-M) is a low-power system but supports higher bandwidth (up to about 1 Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company tasks its network specialist with configuring a steel shelving system for patch panels, switches and routers, and server devices. What is the name of this system?

A. Wiring Diagram
B. Rack
C. Floor Plan
D. Change Management

A

B. Rack

A rack system is a specially configured steel shelving system for patch panels, switches and routers, and server devices. Racks are standard widths and can fit appliances using standard height multiples of 1.75” called units (U).

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network engineer needs to decommission a server and wipe all custom configurations. The servers are decommissioned through a process which helps local schools receive IT equipment. What routine will the engineer use to wipe the server?

A. Motion Detection
B. Degauss
C. Asset Tags
D. Factory Reset

A

D. Factory Reset

When a server or appliance is disposed of by resale, gift, or recycling, there is risk that software licenses could be misused or valuable configuration information leaked to an attacker. Invoking the built-in factory reset routine to wipe any custom configuration settings or modifications when decommissioning a server, switch, router, firewall, or printer can mitigate these risks.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

Degaussing a hard drive will cause it to be inoperable. This method is best for disposal, not reuse.

An asset tag shows the ID of a device or component and links it to an inventory management database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due to concerns of losing or misplacing equipment, the organization asks the network office to track all electrical equipment. What will the office use to track the organization’s equipment?

A. Circuit
B. Cameras
C. Asset Tags
D. Motion Detection

A

C. Asset Tags

An asset tag shows the ID of a device or component and links it to an inventory management database. Radio Frequency ID (RFID) asset tracking tags allow electronic surveillance of managed assets and are detectable at entry/exit points to prevent theft.

A circuit-based alarm sounds when the circuit is opened or closed, depending on the type of alarm.

A security camera is either fixed or operated using Pan-Tilt-Zoom (PTZ) controls. Different cameras suit different purposes. A fixed, narrow focal length camera positioned on the doorway is adequate to record images of individuals entering through an access control vestibule.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Due to an increase in foot traffic from outside groups throughout the building, the organization asks the security office to employ equipment that will allow visual monitoring across the organization. What equipment would best be suited to manage this request?

A. Circuit
B. Cameras
C. Motion Detection
D. Asset Tag

A

B. Cameras

A security camera is either fixed or operated using Pan-Tilt-Zoom (PTZ) controls. Different cameras suit different purposes. A fixed, narrow focal length camera positioned on the doorway is adequate to record images of individuals entering through an access control vestibule.

A circuit-based alarm sounds when the circuit is opened or closed, depending on the type of alarm.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

An asset tag shows the ID of a device or component and links it to an inventory management database. Radio Frequency ID (RFID) asset tracking tags allow electronic surveillance of managed assets and are detectable at entry/exit points to prevent theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An organization tasked its network analyst with reviewing the system that monitors the building’s locks, intruder alarms, and video surveillance cameras. What is the name of this system?

A. PACS
B. IoT
C. ICS
D. OT

A

A. PACS

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

An industrial control system (ICS) provides mechanisms for workflow and process automation. An ICS controls machinery used in critical infrastructures, like power suppliers, water suppliers, health services, telecommunications, and national security services.

A cabled network for industrial applications is known as an operational technology (OT) network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization tasked its network consultant with reviewing the system that provides workflow and process automation mechanisms. What is the name of this system?

A. PACS
B. IoT
C. ICS
D. IT

A

C. ICS (Industrial Control system)

An industrial control system (ICS) provides mechanisms for workflow and process automation. An ICS controls machinery used in critical infrastructures, like power suppliers, water suppliers, health services, telecommunications, and national security services.

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

An information technology (IT) system is oriented around the computing of business information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network consultant needs to develop a plan that sets out the procedures, tools, methods of communication, and guidelines when mitigating a problem. What is the name of this plan?

A. Security Response
B. Service Level Agreement
C. Incident Response Plan
D. Disaster Recovery Plan

A

C. Incident Response Plan

An incident response plan sets out the procedures, tools, methods of communication, and guidelines for dealing with security incidents.

Security response plans and procedures establish what to do when certain types of events occur. These plans attempt to minimize impacts by anticipating adverse events.

A service level agreement (SLA) is a contractual agreement setting out the detailed terms of an ongoing service. This can be a legally binding formal contract between supplier and customer businesses or a less formal agreement, such as an SLA between internal departments.

Whereas an incident response focuses on individual security policy violations, a disaster recovery plan (DRP) addresses large-scale incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network consultant needs to create a documentation process that minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way. What is the name of this process?

A. Wiring Diagram
B. Rack
C. Floor Plan
D. Change Management

A

D. Change Management

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A rack system is a specially configured steel shelving system for patch panels, switches and routers, and server devices.

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network specialist reviews the organization’s cellular technology and discovers that the current contract uses a service that provides a low-power version of the Long Term Evolution (LTE) or 4g cellular standard and currently has a limited data rate between 20-100 kbps. What baseband radio technology service is the organization now using for cellular service?

A. PACS
B. NB-IoT
C. IoT
D. LTE-M

A

B. NB-ioT

Narrowband-IoT (NB-IoT) refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. This means that data rates are limited (20-100 kbps), but most sensors send small packets with low latency rather than making large data transfers.

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

LTE Machine Type Communication (LTE-M) is a low-power system but supports higher bandwidth (up to about 1 Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly