Physical Security Controls Flashcards
Why is physical security important to protecting data?
Physical access to data will negate the security advantages of the cloud.
Information resides on physical assets, linking physical and information security.
Social engineering can negate any information security controls.
Information resides on physical assets, linking physical and information security.
Information resides on physical assets, linking physical security with the security of information
Proper interior and exterior lighting is important because:
It can detect people who are where they don’t belong.
It shows who is in a restricted space.
It allows more people and activities to be observed.
It allows more people and activities to be observed.
Proper lighting allows more people and activities to be observed
Your organization has experienced multiple incidents of graffiti tagging and people loitering in the parking lot despite the chain-link fence surrounding it. What is the best solution to the issue?
No Trespassing signage
Additional external lighting
Change the chain-link fencing to anti-scale fencing
Change the chain-link fencing to anti-scale fencing
A change from chain-link fencing to anti-scale fencing to prevent intruders from climbing the fence is the best solution
After a physical security incident, what critical data can security guards commonly provide?
Employee ID information
Access logs of who has entered and exited the building
Alarm codes
Access logs of who has entered and exited the building
Guards commonly have logs of who has entered and exited a building
Alarms are effective only if which of the following is true?
Every entrance is monitored with a sensor.
They are not tied to the information systems.
They are tuned to provide accurate and useful alerts.
They are tuned to provide accurate and useful alerts.
Alarms are effective only if they are tuned to provide accurate and useful alerting information
You are implementing a test lab at your organization for early alpha software development. To prevent any of the development code from inadvertently getting put on production computers, what should you implement?
Airgap
Strict firewalls
Protected distribution
Airgap
A lab environment can be airgapped from the rest of the network to prevent software from being accidentally copied to production machines
What is the security benefit of a Faraday cage?
Prevents attack by EMP
Prevents illicit monitoring of Van Eck emissions
Works better than anti-scale fencing
Prevents illicit monitoring of Van Eck emissions
A Faraday cage can prevent illicit monitoring of computer systems through Van Eck emissions
Biometrics are based upon which of the following?
The original fingerprint studies of the 1880s
Parts of the human body that are unique
The ability to rapidly scan biological markers
Parts of the human body that are unique
Biometrics are based upon parts of the body that are unique, such as fingerprints, iris, retina, and others
What is a primary problem with biometrics?
Technically biometrics are difficult to implement
The human body changing over time
The ease with which biometrics are faked
The human body changing over time
Some biometric features can change over time, or with medical conditions making them less reliable and forcing a re-identification phase to resync a user and their biometric
A fire involving which of the following is not covered by the traditional ABC handheld fire extinguisher?
Flammable liquids
Flammable metals
Cloth soaked in accelerant
Flammable metals
A fire involving flammable metals is not covered by a typical ABC fire extinguisher
What should you do to protect your IP-based CCTV system from a DDoS attack?
Reconfigure your firewalls
Connect it to an intrusion detection system
Place all CCTV components on a separate network
Place all CCTV components on a separate network
The CCTV system should be on a completely separate network, airgapped if possible, with only security personnel having access