Ch 10 Flashcards
What method can be used to map out the needs of an organization for a new facility?
A. Log file audit
B. Critical path analysis
C. Risk analysis
D. Inventory
Answer: B
Critical path analysis can be used to map out the needs of an organization for a new facility. A critical path analysis is the process of identifying relationships between mission-critical applications, processes, and operations and all of the supporting elements.
What infrastructure component is often located in the same position across multiple floors in order to provide a convenient means of linking floor-based networks together?
A. Server room
B. Wiring closet
C. Datacenter
D. Media cabinets
Answer: B
A wiring closet is the infrastructure component is often located in the same position across multiple floors in order to provide a convenient means of linking floor-based networks together.
Which of the following is not a security-focused design element of a facility or site?
A. Separation of work and visitor areas
B. Restricted access to areas with higher value or importance
C. Confidential assets located in the heart or center of a facility
D. Equal access to all locations within a facility
Answer: D
Equal access to all locations within a facility is not a security-focused design element. Each area containing assets or resources of different importance, value, and confidentiality should have a corresponding level of security restriction placed on it.
Which of the following does not need to be true in order to maintain the most efficient and secure server room?
A. It must be human compatible.
B. It must include the use of nonwater fire suppressants.
C. The humidity must be kept between 40 and 60 percent.
D. The temperature must be kept between 60 and 75 degrees Fahrenheit.
Answer: A
A computer room does not need to be human compatible to be efficient and secure. Having a human-incompatible server room provides a greater level of protection against attacks.
Which of the following is not a typical security measure implemented in relation to a media storage facility containing reusable removable media?
A. Employing a librarian or custodian
B. Using a check-in/check-out process
C. Hashing
D. Using sanitization tools on returned media
Answer: C
Hashing is not a typical security measure implemented in relation to a media storage facility containing reusable removable media. Hashing is used when it is necessary to verify the integrity of a dataset, while data on reusable removable media should be removed and not retained. Usually the security features for a media storage facility include using a librarian or custodian, using a check-in/check-out process, and using sanitization tools on returned media.
What is the ideal humidity range for a computer room?
A. 20–40 percent
B. 40–60 percent
C. 60–75 percent
D. 80–95 percent
Answer: B
The humidity in a computer room should ideally be from 40 to 60 percent.
During a recent safety audit an outside security contractor has suggested that you trim back the landscaping around the entrances. In addition, it has been suggested that you install CCTV at all entrances. Which Fact of the Crime prevention through environmental Design (CPTED) approach is being addressed. A. Natural Access Control B. Terrtorial Reinforcement C. Target Hardening D. Natural Surveillance
D. Natural Surveillance
Which control includes mantraps and turnstiles? A. Physical Control B. Environmental Control C. Administrative Control D. Technical Control
A. Physical Control
Which location would be MOST appropriate for the data center of a company's information processing facility? A. The facility's top floor B. The facility's ground floor C. The facility's basement D. The facility's core
D. The Facility’s core
What would be considered an environmental error (select all that apply) A. Overheating B. Static Electricity C. Authentication problems D. Invalid device configuration
A. Overheating
B. Static ELectricity