Comparing Physical Security Controls Flashcards

1
Q

List the 6 different boundaries you would implement physical security controls at

A

1) Perimeter
2) Building entrances
3) Secure work areas
4) Server and network rooms
5) Hardware itself
6) Airgap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is a sign an example of a physical security control?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cypher lock codes can be given out by uneducated users to unauthorized people. What other way might the code be obtained?
What can reduce these weaknesses?

A

Shoulder surfing

User security training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the different between a proximity card and a smart card?

A

Smart cards you have to insert into the read, proximity cards can be held near the receiving device. Some smart cards also have proximity capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Door access include cipher locks, proximity cards and..

A

biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can proximity cards identify and also authenticate?

A

Yes, when combined with a PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deploying security guards to increase security can have the following benefits:
Checking xxx prior to entry
checking people’s identity against a xxxx
reducing tailgaiting by xxx

A

1) checking badges
2) checking identity against a pre-approved ACL
3) by observing when they use their proximity cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What physical security method provides the most reliable proof of a person’s location?

A

video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 security implications to do with cameras are…

1) only record in xxx places
2) xxxx employees of the surveillance
3) do not record xxxx

A

1) only record in public places
2) notify employees of the surveillance
3) do not record audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How might you stop unauthorized personel from escaping after providing false credentials at a perimeter?

A

install dual gates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What process can reduce the below vulnerabilities:

1) architecture and design weaknesses
2) system sprawl

A

Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does asset management reduce architecture and design weakness?

A

because purchases go through an approval process it ensures they fit in the overall network architecture. Unapproved assets weaken security because they’re not managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the cooling capacity of HVAC systems are measured in…

A

tonnage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1 ton of cooling equals

A

12,000 British Thermal Units/per hour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two ways HVAC systems control oxygen in the event of fire.

A

1) through the use of dampers that control airflow to specific areas
2) automatically turning off
both are triggered by the fire alarm system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how would you protect cable runs from interference from attackers?

A

1) using metal cable troughs or wiring ducts

17
Q

The term EMI Sheilding covers both protecting against EMI and also RFI - true or false?

A

True