Lesson 21: Explaining Physical Security Flashcards
The security team at an organization looks to protect highly confidential servers. Which method does the team propose when protecting the servers against explosives?
A. Air gap
B. Faraday cage
C. Colocation cage
D. Vault
D
An organization plans the destruction of old flash drives. In an attempt to erase the media, an employee uses an electromagnet, only to discover that it did not destroy the data. Which method has the employee tried?
A. Pulping
B. Degaussing
C. Pulverizing
D. Burning
B
A security team suspects that sensitive systems may have active wireless connections that are prone to eavesdropping. Which solution does the team secure the systems with to remedy the situation?
A. Vault
B. Colocation cage
C. Faraday cage
D. DMZ
C
A secure data center has multiple alarms installed for security. Compare the features of the types of alarms that may be installed, and determine which is an example of a circuit alarm.
A. Windows and emergency exits along the perimeter wall sound an alarm when opened.
B. An alarm alerts authorities if movement occurs within the building after hours.
C. Security has a panic button under the desk in case of attack.
D. Employees wear a pendant they can push to alert authorities if needed.
A
A project manager is developing a site layout for a new facility. Consider the principles of site layout design to recommend the best plan for the project.
A. Locate secure zones near the front of the building and next to the security desk, for monitoring entry and exit.
B. Do not make the building a target by placing signs and warnings of the security within the building.
C. Minimize traffic passing between zones so that the flow of people are in and out, instead of across and between.
D. Place windows in rooms within secure zones to deter unauthorized people or actions due to the higher visibility.
C
An organization plans the destruction of old HDDs. In an effort to save money, the organization damages the media by impact, but they did not destroy all of the data. Which method has the organization tried?
A. Degaussing
B. Pulping
C. Shredding
D. Pulverizing
D
A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unauthorized access. Compare the following types of locks that the project manager may use to determine which example the facility is utilizing.
A. A lock that requires an employee to use a smart card and pin to enter
B. A lock that requires an employee to use a magnetic swipe card to enter
C. A cipher lock on a door
D. A bolt on the door frame
A
Compare physical access controls with network security to identify the statements that accurately connect the similarities between them. (Select all that apply.)
A. Authentication provides users access through the barriers, while authorization determines the barriers around a resource.
B. An example of authentication in networking is a user logging into the network with a smart card. Similarly, authentication in physical security is demonstrated by an employee using a badge to enter a building.
C. Authorization provides users access through barriers, while authentication creates barriers around a resource.
D. An example of authorization in networking is a user logging into the network with a smart card. Similarly, authorization in physical security is demonstrated by an employee using a badge to enter a building.
A,B
An engineer receives an alert from a mobile system equipped with an RFID tag. Upon investigating, the mobile system is missing from its assigned station. Which alarm type prompted the engineer to investigate?
A. Duress
B. Proximity
C. Motion
D. Circuit
B
Which of the following are appropriate methods of media sanitization? (Select all that apply.)
A. Use random data to overwrite data on each location of a hard drive.
B. Reset a disk to its factory condition utilizing tools provided by the vendor.
C. Degauss a hard drive using a machine with a powerful electromagnet.
D. Degauss Compact Disks (CDs) using a machine with a powerful electromagnet.
A,B,C