Section 2.7 Physical Security Controls Flashcards

1
Q

What is put into place to prevent unauthorized users form getting access to an environment of system physically?

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your first line of defense is the security of what in your organization?

A

Security of the perimeter of the facility or the boundaries of it’s property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lighting on the perimeter should be set to come on at what hours?

A

From dusk till dawn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What involves using one or more different types of sensors to detect the presence of a person in a restricted area?

A

Motion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The main drawback of most intrusion systems is what?

A

Large number of false alarms due to weather, animals, and improper calibrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An electronic lock often uses a pin code, and thus may be known as a what?

A

Cipher lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Laptop computers should be fitted with what to securely attach them to a current work area?

A

Cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call a two-tier, physical access control method with two physical barriers, such as doors, between the person and the resource that the person is trying to access, such as a secure building?

A

Access Control Vestibule/Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do you call the special containers that keep mobile devices from communicating with the outside world?

A

Faraday Container/Cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call a device that looks similar to a USB thumb drive that prevents any data transfer through it?

A

USB Data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call a secure area that is typically reserved for the most extreme scenarios by providing the most restrictive type of segmentation?

A

Air gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call a secure area that hold people, systems, and very sensitive materials and generally require at least a 2 person mechanism to enter?

A

Safes and Vaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call a secure area that acts as a buffer between a public area and an internal, private area? Can be both physical and logical in nature.

A

Screened Subnet/Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call a device that plugs directly into the power supply outlet and ensures that the power that reaches the computer equipment is free of voltage fluctuations and interference?

A

Line Conditioner/Power Conditioner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call a short post used to divert vehicle traffic from an area or road?

A

Bollard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call a turnstile device that only allow one person in at a time?

A

Access control vestibule/Mantrap

17
Q

Through __________, you can compare the audit trails and access logs with a visually recorded history of the events.

A

CCTV

18
Q

What do you call a device that blocks the data pins on the USB device, which prevents attacks in unsecure scenarios?

A

USB Data Blocker

19
Q

What is the ideal humidity level?

A

40-60%

20
Q

What is the ideal temperature level for computers?

A

60-75F

21
Q

At what temperature do computer systems become damaged?

A

175F

22
Q

What do you call an enclosure used to block electromagnetic fields? Prevents wireless or cellular phones from working inside the enclosure.

A

Faraday Cages

23
Q

What do you call a boundary layer between the LAN and the WAN that holds information that companies may want people from the internet to access?

A

Screened Subnet

24
Q

What kind of system encases network cabling within a carrier? It enables data to be securely transferred between two high-security areas through an area of lower security.

A

Protected Distribution System (PDS)

25
Q

In what kind of PDS is network cabling run within metal conduit and all conduit connections are permanently welded or glued to prevent external access?

A

Hardened Carrier

26
Q

In what kind of PDS is there an electronic alarm system that can detect attempts to compromise the carrier and access the protected cable within it?

A

Alarmed Carrier

27
Q

In what kind of PDS are security guards continuously monitoring the carrier to detect any intrusion attempt by attackers?

A

Continuously Viewed Carrier

28
Q

Where can data be encrypted and stored in the cloud, giving you an extra-secure storage area?

A

Vaults

29
Q

What are used for the storage of laptops and tablets?

A

Safes