Chapter 10 - Physical Security Requirements Flashcards
What does not need to be true in order to maintain the most efficient and secure server room?
Centralized server rooms need not be human compatible. In fact, the more human incompatible a server room is, the more protection it will offer against casual and determined attacks.
What is the most common form of perimeter security devices or mechanisms?
Lighting
What is not a disadvantage of using security guards?
Security guards are usually unaware of the scope of the operations within a facility and are therefore not thoroughly unaware of the scope of the operations within a facility and are therefore not thoroughly equipped to know how to respond to every situations. Finally, security guards are expensive.
What is the most common and inexpensive form of physical access control device?
Key locks
Static voltage and damage
Static Voltage Possible damage
40 Destruction of sensitive circuits and other electronic components
1,000 Scrambling of monitor displays
1,500 Destruction of data stored on hard drive (*)
2,000 Abrupt system shutdown
4,000 Printer jam or component damage
17,000 Permanent circuit damage
How critical areas should be lighted?
Lighting should be used to discourage intruders and provide safety for personnel, entrances, parking areas and critical sections. Critical areas should be illuminated 8 feet high and 2 feet out.
Fire suppression methods
https://www.freepracticetests.org/quiz/uploads/images/Types%20of%20Fire.JPG
Which hsuppresses combustion by disrupting a chemical reaction, by doing so it kills the fire?
Halon
Design AC unit in information processing Centre?
The AC units used in a information processing facility (computer room) must be dedicated and controllable from within the area. They must be on an independent power source from the rest of the room and have a dedicated Emergency Power Off switch. It is positive, not negative pressure that forces smoke and other gases out of the room.
Crime Prevention Through Environmental Design (CPTED) the concept of territoriality is best described as
The correct answer is: Ownership.
Crime prevention through Environmental Design (CPTED) is a concept that encourages individuals to feel ownership and respect for the territory they consider occupy. By encouraging the use of physical attributes that express ownership, the individual is more apt to protect and be aware in that environment
Cipher Lock
The combination door lock or cipher lock uses a numeric key pad, push button, or dial to gain entry, it is often seen at airport gate entry doors and smaller server rooms. The combination should be changed at regular interval or whenever an employee with access is transferred, fired or subject to disciplinary action. This reduces risk of the combination being known by unauthorized people.
A cipher lock, is controlled by a mechanical key pad, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry. The drawback is someone looking over a shoulder can see the combination. However, an electric version of the cipher lock is in production in which a display screen will automatically move the numbers around, so if someone is trying to watch the movement on the screen they will not be able to identify the number indicated unless they are standing directly behind the victim.
Types of locks
For your exam you should know below types of lock
Bolting door lock – These locks required the traditional metal key to gain entry. The key should be stamped “do not duplicate” and should be stored and issued under strict management control.
Biometric door lock – An individual’s unique body features such as voice, retina, fingerprint,, hand geometry or signature, activate these locks. This system is used in instances when extremely sensitive facilities must be protected such as in the military.
Electronic door lock – This system uses a magnetic or embedded chip based plastic card key or token entered into a sensor reader to gain access. A special code internally stored in the card or token is read by sensor device that then activates the door locking mechanism.
The Combination door lock or cipher lock uses a numeric key pad or dial to gain entry, and is often seen at airport gate entry doors and smaller server rooms. The combination should be changed at regular interval or whenever an employee with access is transferred, fired or subject to disciplinary action. This reduces risk of the combination being known by unauthorized people.
Capacitance detectors
Capacitance detectors monitor an electrical field surrounding the object being monitored. They are used for spot protection within a few inches of the object, rather than for overall room security monitoring used by wave detectors. Penetration of this field changes the electrical capacitance of the field enough to generate and alarm. Wave pattern motion detectors generate a frequency wave pattern and send an alarm if the pattern is disturbed as it is reflected back to its receiver. Field-powered devices are a type of personnel access control devices. Audio detectors simply monitor a room for any abnormal sound wave generation and trigger an alarm.
For maximum security design, what type of fence is most effective and cost-effective method (Feet are being used as measurement unit below)?
For maximum security design, the use of double fencing with rolls of concertina wire positioned between the two fences is the most effective deterrent and cost-efficient method. In this design, an intruder is required to use an extensive array of ladders and equipment to breach the fences.
Safe replacement for halon
FM-200 NAF-S-III CEA-410 FE-13 Water Inergen Argon Argonite