certmaster Explaining Organizational and Physical Security Concepts Flashcards

1
Q

An organization tasked its network analyst with reviewing the system that monitors the building’s locks, intruder alarms, and video surveillance cameras. What is the name of this system?

A.PACS
B.IoT
C.ICS
D.OT

A

A

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

An industrial control system (ICS) provides mechanisms for workflow and process automation. An ICS controls machinery used in critical infrastructures, like power suppliers, water suppliers, health services, telecommunications, and national security services.

A cabled network for industrial applications is known as an operational technology (OT) network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network specialist reviews the organization’s cellular technology and discovers that the current contract uses a service that provides a low-power version of the Long Term Evolution (LTE) or 4g cellular standard and currently has a limited data rate between 20-100 kbps. What baseband radio technology service is the organization now using for cellular service?

A.PACS
B.NB-IoT
C.IoT
D.LTE-M

A

B

Narrowband-IoT (NB-IoT) refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. This means that data rates are limited (20-100 kbps), but most sensors send small packets with low latency rather than making large data transfers.

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

LTE Machine Type Communication (LTE-M) is a low-power system but supports higher bandwidth (up to about 1 Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network engineer needs to decommission a server and wipe all custom configurations. The servers are decommissioned through a process which helps local schools receive IT equipment. What routine will the engineer use to wipe the server?

A.Motion Detection
B.Degauss
C.Asset Tags
D.Factory Reset

A

D

When a server or appliance is disposed of by resale, gift, or recycling, there is risk that software licenses could be misused or valuable configuration information leaked to an attacker. Invoking the built-in factory reset routine to wipe any custom configuration settings or modifications when decommissioning a server, switch, router, firewall, or printer can mitigate these risks.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

Degaussing a hard drive will cause it to be inoperable. This method is best for disposal, not reuse.

An asset tag shows the ID of a device or component and links it to an inventory management database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security consultant needs to add a security system to the doors of a secured room. Which system is most appropriate for detecting and preventing tampering?

A.Circuit
B.Closed-Circuit
C.Motion Detector
D.Biometric

A

B

A closed-circuit alarm is more secure because cutting the circuit can defeat an open-circuit alarm. The security consultant can use this type of system for tamper detection.

A circuit-based alarm sounds when the circuit is opened or closed, depending on the type of alarm. A door, window, or fence opening can cut an open-circuit alarm.

A motion-based alarm is an alarm linked to a detector triggered by movement within a relatively large area, such as a room.

Biometric is an electronic lock integrated with a biometric scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network manager is asked to create a document that provides a detailed diagram of the wiring and port locations for the building. What is the name of this document?

A.Wiring Diagram
B.Rack
C.Floor Plan
D.Change Management

A

C

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A rack system is a specially configured steel shelving system for patch panels, switches and routers, and server devices.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network specialist reviews the organization’s cellular technology and discovers that the current contract uses a low-power system service but supports higher bandwidth up to 1Mbps. What baseband radio technology service is the organization using for cellular service?

A.PACS
B.NB-IoT
C.IoT
D.LTE-M

A

D

LTE Machine Type Communication (LTE-M) is a low-power system but supports higher bandwidth (up to about 1 Mbps).

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

Narrowband-IoT (NB-IoT) refers to a low-power version of the Long Term Evolution (LTE) or 4G cellular standard. The signal occupies less bandwidth than regular cellular. This means that data rates are limited (20-100 kbps), but most sensors send small packets with low latency rather than making large data transfers.

The term Internet of Things (IoT) describes the global network of personal devices, home appliances, home control systems, vehicles, and other items equipped with sensors, software, and network connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly