CISSP Domain 3: Physical Security Flashcards

1
Q

What are the logical (technical) controls for physical security?

A
  • building access controls
  • intrusion detection
  • alarms
  • CCTV and monitoring
  • HVAC
  • power supplies
  • fire detection and suppression
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are administrative controls for physical security?

A
  • facility construction
  • facility selection
  • site management
  • building design
  • personnel controls
  • awarness trainig
  • emergency response
  • emergency procedure defined within the emergency response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the physical controls for physical security?

A
  • fencing
  • lightning
  • locks
  • construction materials
  • mantraps (access control vestibules)
  • dogs
  • guards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe efficacy of fences by hight:
* 3-4 feet
* 6-7 feet
* 8+ feet (topped with barbed wire)

A
  • 3-4 feet
    • deters casual traspasser
  • 6-7 feet
    • too difficult to climb easily
    • may block vision (providing additional security)
  • 8+ feet (topped with barbed wire)
    • will deter determined intruders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s PIDAS?

A
  • Perimeter Intrusion Detection and Assessment System
  • detects someone attmpting to climb a fence
  • expensive and may generate false positive alarms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of a fence?
What type of control?

A
  • to deter the potential intruder
  • therefore deterrent control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of PIDS?
What type of control?

A
  • detect potential intruder
  • therefore detective control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s Blackout?

A

prolonged loss of power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s Brownout?

A

prolonged low voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s Fault?

A

short/momentary loss of power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s Surge?

A

prolonged high voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s Spike?

A

momentary/temporary high voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s Sag?

A

temporary low voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of electrical impact?
Name from high voltage to low/none.

A
  • surge
  • spike
  • sag
  • brownout
  • fault
  • blackout
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the rule of an effective lighting design?

A

should not illuminate of guards, dogs, patrol posts, or other similar security elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How should be the lighting for perimeter detection designed?

A

lighting for perimeter protection should illuminate critical areas with 2 feet of candle power from a hight of 8 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How should be the light poles placed for perimeter protection?

A
  • the same distance apart as the diameter of the illuminated area
  • means 20 feet of coverage means poles 20 feet apart
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s the ideal humidity?

A

40%-60%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s the ideal and damage temperature for computers?

A
  • ideal = 60-75 F (15-23 C)
  • damage = 175 F (80 C)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the temperature in which managed storaged devices can be damaged?

A

100 F or 38 C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What can be caused by too much humidity?

A

corrosion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can be caused by too little humidity?

A

static electricity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the different classes of fire and suppression agents?

A
  • Class A (ash) fires
    • common combustibles such as wood, paper, etc
    • most common and should be extinguished with water or soda acid
  • Class B (biol) fires
    • burning alcohol, oil, and other petroleum products
    • extinguished with gas (CO2, halon) or soda acid
    • never use water to extinguish a class B fire
  • Class C (conductive) fires
    • electrical fires which are fed by electricity and may occur in equipment or wiring
    • electrical fires are conductive and the extinguishing agent must be non-conductive, such as any type of gas CO2, halon)
  • Class D (dilythium) fires
    • burning metals, which are extinguished with dry powder
  • Class K (Kitchen) fires
    • kitchen fires, such as burning oil or grease
    • wet chemicals are used to extinguish class K fires
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the categories of fire detection systems?

A
  • smoke sensing
  • flame sensing
  • heat sensing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Water can be used to put out which types of fire?

A

only class A, everything else cannot be put out with water

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Smoke is damaging to what equipment?

A

storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Heat is damaging to what equipment?

A

electronic or computer components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Suppression mediums can do what type of damage?

A

can cause short circuits, initiate corrosion or otherwise render equipment useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the different sprinkler systems?

A
  • preaction systems
  • wet pipe systems
  • dry pipe systems
  • deluge systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe preaction systems

A
  • use closed sprinkler heads
  • the pipe is charged with compressed air instead of water
  • good for areas with people and computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe wet pipe systems

A
  • have water present in the pipes at all times, posing an unacceptable level of risk for a data center containing electronics that might be damaged if a pipe leaks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe dry pipe systems

A
  • filled with compressed air
  • only contain water when triggered in the event of a possible fire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Describe deluge systems

A
  • similar to dry pipes, except the sprinkler heads are open and larger than dry pipe heads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Describe gas discharge systems

A

more effective than water discharge systems, but should not be used in environments where people are located, because they work by removing oxygen from the air

35
Q

Describe halon as fire suppressant

A
  • effective, but bad for the environment (ozone depleting)
  • turns to toxic gas at 900 F (482 Celsius)
36
Q

What are suitable replacements for halon?

A
  • FM-200 (HFC 227ea)
  • CEA-410 or CEA-308
  • NAF-S-III (HCFC Blend A)
  • FE-13 (HCFC-23)
  • Argon (IG55) or Argonite (IG01)
  • Inergen (IG541)
  • Aero-K
37
Q

What are the types of electromagnetic interference?

A
  1. common mode noise
  2. traverse mode noise
38
Q

Describe common mode noise

A

generated by the difference in power between the hot and ground wires of a power source operating electrical equipment

39
Q

Describe taverse mode noise

A

generated by a difference in power in the hot and neutral wires of a power source opearing electrical equipment

40
Q

Describe radio frequency interference (RFI)

A

source of interference that is generated by electrical appliances, light sources, electrical cables, circuits and so on

41
Q

What are the different lock types?
Describe each

A
  • electronic combination lock
    • something known
  • key card systems
    • something possessed
  • biometric systems
    • something that is
  • conventional locks
    • easily picked / bumped and keys are easily duplicated
  • pick-and-bump resistant locks
    • expensive, harder to pick and keys are not easily duplicated
42
Q

What’s the most world’s popular locks?

A

pin-tumbler

43
Q

Does bumping require skill?

A
  • no
  • leaves no traces
  • there’s no standard for bump resistance
44
Q

What are the site design elements that impact physical security?

A
  • site selection
    • should be based on the security needs of the organization
    • security requirements take precedence over cost and location
  • location
    • what is the proximity to other buildings and businesses?
    • what kind of traffic do they draw?
    • is it on a hill or in a valley? is there a sufficient drainage?
    • what types of natural disasters are there?
  • visibility
    • what is the surrounding terrain?
    • is it easy to approach it by vehicle or foot without being seen?
    • be vary of elements that obscure visibility
45
Q

What are the types of locks that can be picked/bumped?

A
  • Pin Tumbler Locks
  • Wafer Locks
  • Tubular Locks
  • Disc Detainer Locks
46
Q

Do centralized server or computer rooms need to be human compatible?

A

no, the server rooms should be optimized for computers while maitaining certain level for human safety

47
Q

No matter which physical access control is used, a security guard or other monitoring system must be deployed to prevent what?

A
  • abuses
    • propping open secured doors and bypassing locks and controls
  • masquerading
    • using someone else’s security ID to gain entry to a facility
  • piggyback
    • following someone through a secured gate or doorway without being identified or authorized personally
48
Q

Media storage facility protections include what?

A
  • locked cabinets or safes
  • using a librarian/custodian
  • implementing a check-in/check-out process
  • using media sanitization
49
Q

What are the protections of evidence storage?

A
  • locked cabinets or safes
  • dedicated/isolated storage facilities
  • offline storage
  • access restrictions and activity tracking
  • hash management and encryption
50
Q

What is important for a successful reconstruction of a physical intrusion, breach or attack?

A
  • audit trails and access logs
  • logs can be created manually by security guards or they may be generated automatically with the right equipment (smartcards and only certain proximity readers)
  • entry points should be monitored with CCTV so audit trails and access logs could be compared with a visually recorded histroy of the events
51
Q

When designing physical security of a facility, what is the functional order in which controls should be used?

A
  1. Deter
  2. Deny
  3. Detect
  4. Delay
  5. Determine
  6. Decide
52
Q

Describe the Determine phase

A

security staff or legal authorities should determine the cause of the incident or assess the situation to understand what’s happening

53
Q

Describe the Decide phase

A

based on the assessment in ithe Determine phase, security staff should decide on the response to implement - apprehending the intruder or collecting evidence for further investigation

54
Q

What’s the goal of an Occupant Emergency Plan?

A

guide and assist with sustaining personnel safety in the wake of disaster

55
Q

What are robot sentries?

A
  • used to automatically patrol area to look for anything extraordinary
  • use facial recognition to indetify authorized personnel and detect intruders
  • can be on wheels or be used as drones
56
Q

What’s the primary purpose of lighting?

A

deterrence of potential intruders

57
Q

What’s white noise?

A

active control that generates emanations that effectively jam the true emanations from el. mag. equipment

58
Q

What type of motion detector senses changes in the el. mag. fields in monitored areas?

A

capacitance

59
Q

What motion detectors transmit ultrasonic or microwave signals into the monitor area, watching for changes in the returned signals bouncing off objects?

A

wave pattern

60
Q

Use of an electromagnetic coil inside the card indicates that this is what card?

A

proximity card

61
Q

Describe hand geometry scanners

A
  • assess the physical dimensions of an individual’s hand but do not verify other unique factors about the individual, or even verify if they are alive
  • geometry scanners should not be implemented as the sole authentication factor for secure environments
  • do not stand out as a particular issue from an accessibility standpoint compared to other biometric systems
62
Q

What does CPTED framework stand for?

A

Crime Prevention Through Environmental Design (CPTED)

63
Q

What are the 3 strategies implemented by CPTED?

A
  1. natural access control
  2. natural surveillance
  3. natural territorial reinforcement
64
Q

Which one of the fire suppression systems poses the greatest risk of accidental discharge that damages equipment in a data center?

A

wet pipe - use pipes filled with water all times that may damage equipment if there is damage to a pipe

65
Q

What fire suppression systems all use pipes that remain empty until the system detects signs of a fire?

A

Dry pipe, deluge, and preaction systems

66
Q

What’s Critical path analysis?

A

systematic effort to identify relationships between mission-critical applications, processes, and operations and all the necessary supporting elements when evaluating the security of a facility or designing a new facility

67
Q

What is the most common and inexpensive form of physical access control device for both interior and exterior use?

A

lighting

68
Q

What is the ideal humidity range for a server room?

A

20 to 80 percent

69
Q

What is the most common cause of a false positive for a water-based fire suppression system?

A

people

70
Q

What is the best type of water-based fire suppression system for a computer facility?

A

preaction system is the best type of water-based fire suppression system for a computer facility because it provides the opportunity to prevent the release of water in the event of a false alarm or false initial trigger

71
Q

Where are photoelectric motion detectors usually deployed?

A

in internal rooms that have no windows and are kept dark

72
Q

What does infrared PIR (passive infrared) detector monitor?

A

significant or meaningful changes in the heat levels and patterns in a monitored area

73
Q

How does wave pattern motion detector work?

A

transmits a consistent low ultrasonic or high microwave frequency signal into a monitored area and monitors for significant or meaningful changes or disturbances in the reflected pattern

74
Q

What changes in the environment does photoelectric motion detector detect?

A

senses changes in visible light levels for the monitored area

75
Q

What is the most common form of perimeter security devices or mechanisms?

A

Lighting

76
Q

How should be cameras positioned?

A
  • to watch exit and entry points allowing any change in authorization or access level
  • to have clear sight lines of all exterior walls, entrance and exit points, and interior hallways
77
Q

What are the additional capabilities of cameras that include a SoC?

A

may be able to perform various specialty functions, such as time-lapse recording, tracking, facial recognition, object detection, or infrared or color-filtered recording

78
Q

Biometric systems using a one-to-many search provide provide what?

A

Identification

79
Q

Biometric systems using a one-to-one search provide what?

A

authentication

80
Q

Do biometric systems provide authorization or accountability?

A

no

81
Q

Which disaster type is not usually covered by standard business insurance?

A

most general business insurance and homeowner’s insurance policies do not provide any protection against the risk of flooding or flash floods

82
Q

RFID (radio-frequency identification) is effectively what type of device?

A

field-powered proximity device

83
Q

What are fail-secure doors?

A

stay closed and locked during adverse conditions

84
Q

What are fail-safe doors?

A

allow for easy egress in the event of adverse conditions as they prioritize personnel safety