Chapter 3 Flashcards
Which of the following are solutions that address physical security? (Select two.)
Disable guest accounts on computers
Require identification and name badges for all employees
Escort visitors at all times
Implement complex passwords
Scan all floppy disks before use
Require identification and name badges for all employees
Escort visitors at all times
If a fingerprint or retina scan is required to open a secured door, which kind of physical security has been implemented?
Access list
Double-entry door
Mantrap
Biometric locks
Biometric locks
Which option is a benefit of CCTV?
Increase security protection throughout an environment
Provide a corrective control
Expand the area visible by security guards
Reduce the need for locks and sensors on doors
Expand the area visible by security guards
You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose?
PTZ
Dome
C-mount
Bullet
PTZ
Which of the following controls is an example of a physical access control method?
Hiring background checks
Passwords
Access control lists with permissions
Locks on doors
Smart cards
Locks on doors
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?
Use weight scales
Install security cameras
Use key locks rather than electronic locks
Deploy a mantrap
Deploy a mantrap
After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring?
Detection
Prevention
Data breach
Recovery
Recovery
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Smart card
Keypad locks
Proximity card
Smart card
Which of the following allows an easy exit of an area in the event of an emergency, but also prevents entry? (Select two.)
Mantrap
Turnstile
PTZ CCTV
Bollard
Double-entry door
Turnstile
Double-entry door
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns?
Use cable locks to chain the laptops to the desks.
Implement screen saver passwords.
Encrypt all company data on hard drives.
Require strong passwords in the Local Security Policy.
Use cable locks to chain the laptops to the desks.
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access.
Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)
Place your networking equipment in a Van Eck cage.
Place your networking equipment in a room that requires key card entry.
Place your networking equipment in a locked cage.
Place your networking equipment in a TEMPEST cage.
Place your networking equipment in a Faraday cage.
Place your networking equipment in a room that requires key card entry.
Place your networking equipment in a locked cage.
You are an IT consultant. You are visiting a new client’s site to become familiar with their network. As you walk around their facility, you note the following:
Implement a hardware checkout policy.
Replace the tape drive used for backups with external USB hard disks.
Upgrade the server closet lock to a biometric authentication system.
Keep the network infrastructure devices (switch and all-in-one device) in a locked room separate from network servers.
Implement a hardware checkout policy.
Which of the following is the most important thing to do to prevent console access to the router?
Disconnect the console cable when not in use.
Keep the router in a locked room.
Set the console and enable secret passwords.
Implement an access list to prevent console connections
Keep the router in a locked room.
Burning, pulping, and shredding are three ways to securely dispose of data in which form?
Tape
Paper
Cloud
Disk
Paper
A computer or small network that is not connected to the rest of the network or the internet is known as:
DMZ
Air gap
Vault
Faraday cage
Air gap
Which device is used to allow a USB device to charge but blocks the data transfer capabilities of the device?
USB data blocker
Bollard
Air gap
Faraday cage
USB data blocker
Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to prevent emissions from being retrieved from the air?
Faraday cage
USB data blocker
Air gap
PDS
PDS
Which special network area is used to provide added protection by isolating publicly accessible servers?
Internet
VLAN
DMZ
Intranet
DMZ
A Faraday cage is used to prevent what from leaving an area?
Hackers
Electromagnetic emissions
Network packets
Computers
Electromagnetic emissions
It is important to follow correct procedures when running electrical cables next to data cables in order to protect against which environmental concern?
Humidity
Airflow
Temperature
Electromagnetic interference
Electromagnetic interference
Most equipment is cooled by bringing cold air in the front and ducting the heat out of the back. What is the term for where the heat is sent in this type of scenario?
Back aisle
Hot aisle
Cold aisle
Front aisle
Hot aisle
What is the recommended humidity level for server rooms?
10% or lower
30%
50%
70% or higher
50%
Which deviation in power is the longest in duration?
Sag
Transient
Surge
Blackout
Blackout
Power, heating, ventilation, air conditioning systems (HVAC), and utilities are all components of which term?
Network protection
Cold aisle
Infrastructure
Hot aisle
Infrastructure
You maintain a network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting network availability.
Which of the following should you implement?
Positive pressure system
Line conditioner
Negative pressure system
UPS
Backup generator
Positive pressure system
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees.
What should you do to help reduce problems?
Add a humidifier to the server room.
Add line conditioners in the server room.
Add a separate A/C unit in the server room.
Add a de-humidifier to the server room.
Add a separate A/C unit in the server room.
Which device is used to ensure power to a server or network device during short power outages?
Surge protector
Backup generator
Line conditioner
Uninterruptible power supply
Uninterruptible power supply
Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components?
Class A
Class B
Class C
Class D
Class C
You walk by the server room and notice that a fire has started. What should you do first?
Turn on the overhead sprinklers.
Make sure everyone has cleared the area.
Grab a fire extinguisher and try to put out the fire.
Call the fire department.
Make sure everyone has cleared the area.