Lesson 21 - Explain the Importance of Physical Site Security Controls Flashcards

1
Q

Controls that restrict, detect, and monitor access to specific physical areas or assets through measures such as physical barriers, physical tokens, or biometric access controls.

A

Physical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

create access lists and identification mechanisms to allow approved persons through the barriers.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

create barriers around a resource so that access can be controlled through defined entry and exit points.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

keep a record of when entry/exit points are used and detect security breaches.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scanner that reads data from an RFID or NFC tag when in range.

A

proximity reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of gateway that only allows one person through at a time.

A

turnstile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secure entry system with two gateways, only one of which is open at any one time.

A

mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Devices can be physically secured against theft using cable ties and padlocks. Some systems also feature lockable faceplates, preventing access to the power switch and removable drives.

A

Cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Duplicating a smart card by reading (skimming) the confidential data stored on it.

A

Card cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Duplicating a smart card by reading (skimming) the confidential data stored on it.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware plug to prevent malicious data transfer when a device is plugged into a USB charging point.

A

USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A device that transforms one type of energy into another (typically light into an electrical signal).

A

sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Installation of video cameras to supply security monitoring data to a centralized management station.

A

CCTV (closed circuit television)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A remote-controlled or autonomous robot capable of patrolling site premises or monitoring gateways.

A

Robot sentries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of network isolation that physically separates a network from all other networks.

A

air gapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wire mesh container that blocks external electromagnetic fields from entering into the container.

A

Faraday Cage

17
Q

Building control systems maintain an optimum heating, cooling, and humidity level working environment for different parts of the building.

A

HVAC (Heating, Ventilation, Air Conditioning)

18
Q

Arrangement of server racks to maximize the efficiency of cooling systems.

A

hot aisle/cold aisle

19
Q

A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.

A

(Electromagnetic Interference [EMI])

20
Q

Arrangement of server racks to maximize the efficiency of cooling systems.

A

hot aisle/cold aisle

21
Q

A disruption of electrical current that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on an adjacent circuit.

A

(Electromagnetic Interference [EMI])
To reduce interference, data/network cabling should not be run parallel to power cabling. If EMI is a problem, shielded cabling can be installed. Alternatively, the copper cabling could be replaced with fiber optic cabling, which is not susceptible to EMI.

22
Q

Fire detection and suppression systems are mandatory in most public and private commercial premises. Water-based fire suppression is a risk to computer systems, both in the event of fire and through the risk of flood. Alternatives include dry pipe and gas-based systems.

A

Fire suppression

23
Q

The process of thorough and completely removing data from a storage medium so that file remanants cannot be recovered.

A

Media sanitization

24
Q

Leftover information on a storage medium even after basic attempts have been made to remove that data.

A

Data remnants

25
Q

The process of rendering a storage drive inoperable and its data unrecoverable by eliminating the drive’s magnetic charge.

A

Degaussing
exposing a hard disk to a powerful electromagnet disrupts the magnetic pattern that stores the data on the disk surface.
Note that SSDs, flash media, and optical media cannot be degaussed, only hard disk drives.

26
Q

hitting a hard drive with a hammer can leave a surprising amount of recoverable data, so this type of destruction should be performed with industrial machinery.

A

Pulverizing

27
Q

The standard method of sanitizing an HDD

A

overwriting
The most basic type of overwriting is called zero filling, which just sets each bit to zero.
A more secure method is to overwrite the content with one pass of all zeros, then a pass of all ones, and then a third pass in a pseudorandom pattern.

28
Q

A method of sanitizing a drive using the ATA command set.

A

Secure Erase (SE)
Since 2001, the SATA and Serial Attached SCSI (SAS) specifications have included a Secure Erase (SE) command.
This command can be invoked using a drive/array utility or the hdparm Linux utility. On HDDs, this performs a single pass of zero-filling.

29
Q

A method of sanitizing a drive by setting all bits to zero.

A

zero-filling