Physical Security Flashcards
What can be done to protect switches and routers from physical security vulnerabilities? (Choose two.)
Use a cable lock.
Use SSH instead of Telnet.
Set a strong console port password.
Disable unused ports.
Set a strong console port password.
Disable unused ports.
A console port enables a local user to plug a cable into the router or switch to administer the device locally, so a strong password is recommended. Disabling unused switch ports and router interfaces prevents unauthorized people from plugging devices into those ports and gaining access to the device or the network
What can limit the data emanation from electromagnetic radio frequencies?
Faraday cage
Antistatic wrist strap
ESD mat
Faraday cage
Data emanation results from the electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data. Faraday cages are used to enclose electronic equipment to prevent data emanation and to protect components from external static charges
What methods are most commonly used by physical security teams to verify whether somebody is authorized to access a facility? (Choose two.)
Employee ID badge
Username and password
Access list
Smartcard
Employee ID badge
Access list
An employee ID badge enables physical verification that somebody is allowed to access a building. An access list defines who is allowed to access a facility or office space and should be consulted by reception when anyone arrives
While reviewing facility entry points, you decide to replace existing doors with ones that will stay locked during power outages. Which term best describes this feature?
Fail-secure
Fault-tolerant
Fail-safe
Fail-secure
Fail-secure systems ensure that a component failure (such as a power source) will not compromise security; in this case, the doors will stay locked
A data center IT director requires the ability to analyze facility physical security breaches after they have occurred. Which of the following present the best solutions? (Choose two.)
Motion sensor logs
Laser security system
Access control vestibule
Software video surveillance system
Motion sensor logs
Software video surveillance system
A and D. Motion sensor logs can track a perpetrator’s position more accurately than most video surveillance camera systems; however, closed-circuit television (CCTV) software video surveillance system footage can be played back and used to physically identify unauthorized people. To conserve disk space, most solutions record only when there is motion
Which of the following physical access control methods do not normally identify who has entered a secure area? (Choose two.)
Access control vestibule
Hardware lock
Fingerprint scan
Smartcard with PIN
Access control vestibule
Hardware lock
Access control vestibule are designed to prevent tailgating and gaining access to a restricted area. Some access control vestibule variations use two sets of doors, one of which must close before the second one opens. Traditional access control vestibule do not require access cards. Hardware locks simply require possession of a key, although proper physical key management is necessary to track key issuance and return. Neither reveals a person’s identity
Your company has moved to a new location where a server room is being built. The server room currently has a water sprinkler system in case of fire. Regarding fire suppression, what should you suggest?
Keep the existing water sprinkler system.
Purchase a smoke-detection, waterless fire suppression system.
Keep the existing water sprinkler system and install a raised floor.
Purchase a smoke-detection, waterless fire suppression system.
Assuming local building codes allow waterless fire suppression systems, you should suggest these be used, because they will not damage or corrode computer systems or components like water will
A data center administrator uses thermal imaging to identify hot spots in a large data center. She then arranges rows of rack-mounted servers such that cool air is directed to server fan inlets and hot air is exhausted out of the building. Which of the following terms best defines this scenario?
HVAC
Form factoring
Hot and cold aisles
Hot and cold aisles
In a data center, cold aisles optimize cold airflow to equipment intake fans, while hot aisles optimize hot air equipment exhaust flow by directing it away from equipment to the outside. Cool air is often fed under raised floors with perforated vents to feed equipment. Panels are installed between equipment racks to keep the cool and warm air from mixing, resulting in greater cooling efficiency
Which access control method electronically logs entry into a facility?
Picture ID card
Security guard and log book
Proximity card
Proximity card
Proximity cards must be positioned within a few centimeters of the reader to register the card and either allow or deny access to a facility. All access is logged electronically without the need of a physical log book or security guard
You are consulting with a client regarding a new facility. Access to the building must be restricted only to those who know an access code. What might you suggest?
Cipher lock
Deadbolt lock
Store the code in a safe
Cipher lock
Cipher locks are electronic keypads that enable authorized people to enter an access code to gain access to a room or a building. All the user needs to know is the access code; no physical card is required
Over the last month, you have added new rack-mount servers in your server room, and servers have begun mysteriously shutting down for no apparent reason. Servers restart normally only to shut down again eventually. Servers are fully patched, and virus scanners are up to date. Which of the following is the most likely reason for these failures?
The server room temperature is too hot.
The server room temperature is too cool.
The servers are infected with a virus.
The server room temperature is too hot.
A hot server room is most likely the problem since new equipment has been added, which adds to the room temperature. An HVAC technician should be consulted, which could result in the implementation of hot and cold aisles if necessary
What should be done in facility parking lots to ensure employee safety?
Install a barricade.
Install proper lighting.
Install an exit sign.
Install proper lighting.
Proper lighting in parking lots reduces the likelihood of attacks or muggings perpetrated against employees
Which type of threat is mitigated by shredding paper documents?
Rootkit
Spyware
Physical
Physical
Shredding documents prevents physical threats such as theft of those documents or acquiring information from them
You are writing code for a custom mobile device app, and for security reasons, you want to prevent tampering and the ability of others to read the code. Which technique will accomplish the requirement?
Obfuscation
Encryption
Hashing
Obfuscation
Obfuscating programming code, often called code camouflaging, is done using a software development plug-in. The result is an unreadable variation of the original readable text
Which of the following represent valid storage media destruction techniques? (Choose two.)
Air gapping
Shredding
Burning
Pulping
Shredding
Burning
Shredding is used to cut paper documents into tiny pieces to ensure that the data included on the documents cannot be retrieved. Burning is also effective in destroying electrical equipment, where allowed by law, and reduces paper documents, thus making data retrieval impossible