Chapter 10: Physical Security Requirements Flashcards
A ______ plan outlines the security needs of your organization and emphasizes methods or mechanisms to employ to provide security. Such a plan is developed through risk assessment and critical path analysis.
secure facility
_____ is a systematic effort to identify relationships between mission-critical applications, processes, and operations and all the necessary supporting elements.
Critical path analysis
_______ is the tendency for various technologies, solutions, utilities, and systems to evolve and merge over time.
Technology convergence
True or False:
Site selection should be based on the security needs of the organization.
True
What prioritized order should physical security for an environment be?
Deter
Deny
Detect
Delay
Determine
Decide
True or False:
An SLA clearly defines the response time a vendor will provide in the event of an equipment failure emergency.
True
True or False:
Server rooms should be located at the lowest floor of the building.
False; core
A _____ policy (or clean-desk-space policy) is used to instruct workers how and why to clean off their desks at the end of each work period.
clean-desk
A ____ is often used by government and military agencies, divisions, and contractors to provide a secure environment for highly sensitive data storage and computation.
sensitive compartmented information facility (SCIF)
The first stage or level of power management is using _____ protectors.
surge
_____ is the interference of power through some form of disturbance, interruption, or fluctuation.
Noise