Physical Environmental Security Flashcards
At what voltage level can static electricity cause destruction of data stored on hard drives? A) 4,000 B) 17,000 C) 40 D) 1,500
1,500
Destruction of data stored on hard drives can be caused by 1,500 volts of static electricity.
What type of physical security controls focus on facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures? A) Technical B) Physical C) Administrative D) Logical
Administrative
Administrative physical security controls include facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures.
Which of the following is typically not a culprit in causing damage to computer equipment in the event of a fire and a triggered suppression? A) Heat B) Suppression medium C) Smoke D) Light
Light
Light is usually not damaging to most computer equipment, but fire, smoke, and the suppression medium (typically water) are very destructive.
What is the ideal humidity range for a computer room? A) 20-40 percent B) 40-60 percent C) 60-75 percent D) 80-95 percent
40-60 percent
The humidity in a computer room should ideally be from 40 to 60 percent.
A Type B fire extinguisher may use all except which of the following suppression mediums?
A) Water
B) CO2
C) Halon or an acceptable halon substitute
D) Soda acid
Water
Water is never the suppression medium in Type B fire extinguishers because they are used on liquid fires.
Which of the following is not a disadvantage of using security guards?
A) Security guards are usually unaware of the scope of the operations within a facility.
B) Not all environments and facilities support security guards.
C) Not all security guards are themselves reliable.
D) Prescreening, bonding, and training does not guarantee effective and reliable security guards.
Security guards are usually unaware of the scope of the operations within a facility.
Security guards are usually unaware of the scope of the operations within a facility, which supports confidentiality of those operations and thus helps reduce the possibility that a security guard will be involved in the disclosure of confidential information.
If you want to restrict access into or out of a facility, which would you choose? A) Gate B) Turnstile C) Fence D) Mantrap
Turnstile
A turnstile is a form of gate that prevents more than one person from gaining entry at a time and often restricts movement to one direction. It is used to gain entry but not exit, or vice versa.
What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object? A) Wave B) Photoelectric C) Heat D) Capacitance
Capacitance
A capacitance motion detector senses changes in the electrical or magnetic field surrounding a monitored object.
Which of the following is a double set of doors that is often protected by a guard and is used to contain a subject until their identity and authentication is verified? A) Gate B) Turnstile C) Mantrap D) Proximity detector
Mantrap
A mantrap is a double set of doors that is often protected by a guard and used to contain a subject until their identity and authentication is verified.
What is the point of a secondary verification system?
A) To verify the identity of a user
B) To verify the activities of a user
C) To verify the completeness of a system
D) To verify the correctness of a system
To verify the correctness of a system
Secondary verification mechanisms are set in place to establish a means of verifying the correctness of detection systems and sensors. This often means combining several types of sensors or systems (CCTV, heat and motion sensors, and so on) to provide a more complete picture of detected events. For more information, please see Chapter 19
What is the most common form of perimeter security devices or mechanisms? A) Security guards B) Fences C) CCTV D) Lighting
Lighting
Lighting is the most common form of perimeter security devices or mechanisms. Your entire site should be clearly lit. This provides for easy identification of personnel and makes it easier to notice intrusions.
What is the most common and inexpensive form of physical access control device? A) Lighting B) Security guard C) Key locks D) Fences
Key locks
Key locks are the most common and inexpensive form of physical access control device. Lighting, security guards, and fences are all much more costly.
What is a perimeter-defining device used to deter casual trespassing? A) Gates B) Fencing C) Security guards D) Motion detectors
Fencing
Fencing is a perimeter-defining device used to deter casual trespassing. Gates, security guards, and motion detectors do not define a facility’s perimeter.
What is the most important goal of all security solutions? A) Prevention of disclosure B) Maintaining integrity C) Human safety D) Sustaining availability
Human safety
Human safety is the most important goal of all security solutions.
No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent all but which of the following? A) Piggybacking B) Espionage C) Masquerading D) Abuse
Espionage
No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent abuse, masquerading, and piggybacking. Espionage cannot be prevented by physical access controls.