Physical Security Controls Flashcards

1
Q

Why is physical security important to protecting data?

Physical access to data will negate the security advantages of the cloud.

Information resides on physical assets, linking physical and information security.

Social engineering can negate any information security controls.

A

Information resides on physical assets, linking physical and information security.

Information resides on physical assets, linking physical security with the security of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Proper interior and exterior lighting is important because:

It can detect people who are where they don’t belong.

It shows who is in a restricted space.

It allows more people and activities to be observed.

A

It allows more people and activities to be observed.

Proper lighting allows more people and activities to be observed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization has experienced multiple incidents of graffiti tagging and people loitering in the parking lot despite the chain-link fence surrounding it. What is the best solution to the issue?

No Trespassing signage

Additional external lighting

Change the chain-link fencing to anti-scale fencing

A

Change the chain-link fencing to anti-scale fencing

A change from chain-link fencing to anti-scale fencing to prevent intruders from climbing the fence is the best solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

After a physical security incident, what critical data can security guards commonly provide?

Employee ID information

Access logs of who has entered and exited the building

Alarm codes

A

Access logs of who has entered and exited the building

Guards commonly have logs of who has entered and exited a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alarms are effective only if which of the following is true?

Every entrance is monitored with a sensor.

They are not tied to the information systems.

They are tuned to provide accurate and useful alerts.

A

They are tuned to provide accurate and useful alerts.

Alarms are effective only if they are tuned to provide accurate and useful alerting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are implementing a test lab at your organization for early alpha software development. To prevent any of the development code from inadvertently getting put on production computers, what should you implement?

Airgap

Strict firewalls

Protected distribution

A

Airgap

A lab environment can be airgapped from the rest of the network to prevent software from being accidentally copied to production machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the security benefit of a Faraday cage?

Prevents attack by EMP

Prevents illicit monitoring of Van Eck emissions

Works better than anti-scale fencing

A

Prevents illicit monitoring of Van Eck emissions

A Faraday cage can prevent illicit monitoring of computer systems through Van Eck emissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometrics are based upon which of the following?

The original fingerprint studies of the 1880s

Parts of the human body that are unique

The ability to rapidly scan biological markers

A

Parts of the human body that are unique

Biometrics are based upon parts of the body that are unique, such as fingerprints, iris, retina, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a primary problem with biometrics?

Technically biometrics are difficult to implement

The human body changing over time

The ease with which biometrics are faked

A

The human body changing over time

Some biometric features can change over time, or with medical conditions making them less reliable and forcing a re-identification phase to resync a user and their biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A fire involving which of the following is not covered by the traditional ABC handheld fire extinguisher?

Flammable liquids

Flammable metals

Cloth soaked in accelerant

A

Flammable metals

A fire involving flammable metals is not covered by a typical ABC fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should you do to protect your IP-based CCTV system from a DDoS attack?

Reconfigure your firewalls

Connect it to an intrusion detection system

Place all CCTV components on a separate network

A

Place all CCTV components on a separate network

The CCTV system should be on a completely separate network, airgapped if possible, with only security personnel having access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly