2.7 Flashcards

Explain the importance of physical security controls.

1
Q

Also called a mantrap. Is composed of two closely spaced doors that require the user to card through one and then the other sequentially. Makes it nearly impossible to trail through a doorway undetected.

A

Access control vestibules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The practice of using specialized patterns, colors, and materials to conceal or disguise industrial equipment, machinery, infrastructure, or facilities within their surroundings.

A

Industrial camouflage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When two different people have to perform respective tasks that are both necessary for an action to occur. A means of checks and balances.

A

Two-person integrity/control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is the measurement of biological attributes or processes with the goal of identification of a party possessing those measurements.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevents attackers from infecting a device with malware or stealing data through a USB port.

A

USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a sensor method that provides a remote means of monitoring everything from water leaks to humidity problems.

A

Moisture detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a device or component that detects and measures physical phenomena or environmental changes and converts them into electrical signals or digital data for analysis, monitoring, or control purposes.

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a sensor method that listens for specific sounds.

A

Noise detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are sensors that provide a signal at a specified distance. The most common application of these are card readers connected to doors.

A

Proximity reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide the same utility as computer logs for a security investigation. They act as a record of what was observed at specific points in time.

A

Visitor logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An enclosure of conductive material that is grounded. Is used to shield against electromagnetic interference (EMI).

A

Faraday cages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a term used to describe the physical and logical separation of a network from all other networks. This separation is designed to prevent unauthorized data transfers to and from the network.

A

Air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used in networking to indicate a zone where access controls are not as strict as the inside, or as open as the outside; it’s a place of joint cooperation and controlled risk.

A

Screened subnet (previously
known as demilitarized zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The objective is to prevent any physical damage to the physical layer portion of the system.

A

Protected cable distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cold air is produced by HVAC equipment, and this cold air is sent to servers. The servers shed their heat, making air hot, which is removed. The aisles keep the hot air from mixing with the cold air, making the cooling efficient.

A

Hot and cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a process by which paper fibers are suspended in a liquid and recombined into new paper, completely destroying the physical layout of the old paper.

A

Pulping

15
Q

When data is no longer being used, it is important to destroy the data before losing physical control over the media it is on.

A

Secure data destruction

16
Q

Is a physical process of destruction using excessive physical force to break an item into unusable pieces.

A

Pulverizing

17
Q

A safer method for destroying files on magnetic storage devices (that is, magnetic tape and hard drives) is to destroy the data magnetically, using a strong magnetic field to degauss the media.

A

Degaussing