Chapter 3 Flashcards
Which of the following are solutions that address physical security? (Select two.)
Disable guest accounts on computers
Require identification and name badges for all employees
Escort visitors at all times
Implement complex passwords
Scan all floppy disks before use
Require identification and name badges for all employees
Escort visitors at all times
If a fingerprint or retina scan is required to open a secured door, which kind of physical security has been implemented?
Access list
Double-entry door
Mantrap
Biometric locks
Biometric locks
Which option is a benefit of CCTV?
Increase security protection throughout an environment
Provide a corrective control
Expand the area visible by security guards
Reduce the need for locks and sensors on doors
Expand the area visible by security guards
You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose?
PTZ
Dome
C-mount
Bullet
PTZ
Which of the following controls is an example of a physical access control method?
Hiring background checks
Passwords
Access control lists with permissions
Locks on doors
Smart cards
Locks on doors
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?
Use weight scales
Install security cameras
Use key locks rather than electronic locks
Deploy a mantrap
Deploy a mantrap
After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring?
Detection
Prevention
Data breach
Recovery
Recovery
Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Biometric locks
Smart card
Keypad locks
Proximity card
Smart card
Which of the following allows an easy exit of an area in the event of an emergency, but also prevents entry? (Select two.)
Mantrap
Turnstile
PTZ CCTV
Bollard
Double-entry door
Turnstile
Double-entry door
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns?
Use cable locks to chain the laptops to the desks.
Implement screen saver passwords.
Encrypt all company data on hard drives.
Require strong passwords in the Local Security Policy.
Use cable locks to chain the laptops to the desks.
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access.
Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)
Place your networking equipment in a Van Eck cage.
Place your networking equipment in a room that requires key card entry.
Place your networking equipment in a locked cage.
Place your networking equipment in a TEMPEST cage.
Place your networking equipment in a Faraday cage.
Place your networking equipment in a room that requires key card entry.
Place your networking equipment in a locked cage.
You are an IT consultant. You are visiting a new client’s site to become familiar with their network. As you walk around their facility, you note the following:
Implement a hardware checkout policy.
Replace the tape drive used for backups with external USB hard disks.
Upgrade the server closet lock to a biometric authentication system.
Keep the network infrastructure devices (switch and all-in-one device) in a locked room separate from network servers.
Implement a hardware checkout policy.
Which of the following is the most important thing to do to prevent console access to the router?
Disconnect the console cable when not in use.
Keep the router in a locked room.
Set the console and enable secret passwords.
Implement an access list to prevent console connections
Keep the router in a locked room.
Burning, pulping, and shredding are three ways to securely dispose of data in which form?
Tape
Paper
Cloud
Disk
Paper
A computer or small network that is not connected to the rest of the network or the internet is known as:
DMZ
Air gap
Vault
Faraday cage
Air gap