Udemy-Domain 3 Flashcards

1
Q

ABAC stands for ___, and attributes could belong to ___ (3)

A

Attribute-Based Access Control;
subject (user - role, clearance..);
object (resource - owner, creation date…);
Environment (time, location, threat level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RUBAC means ___, and is based on ___

A

Rule-Based Access Control; if, then statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RBAC means ___

A

Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the ___ security model is Mandatory Access Control, and only concerned with the Confidentiality part of the CIA triad

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ___ security model is Mandatory Access Control and mainly focused on the Integrity part of the CIA triad

A

Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in the Bell-LaPadula security model,
the Simple Security Property is signified by ___,
the * Security Property by ___ and
the Strong * Property by ___

A

“No Read Up”;
“No Write Down”;
“No Read or Write Up and Down”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in the Biba security model,
the Simple Integrity Property is signified by ___,
the * Integrity Property by ___ and
the Invocation Property by ___

A

“No Read Down”;
“No Write Up”;
“No Read or Write Up”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LBAC means ___

A

Lattice Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the ___ security model assigns permissions by security clearance and subject clearance

A

Lattice Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the 8 rules of the Graham-Denning security model are:

  1. ___
  2. ___
  3. ___
  4. Read Object
  5. Create Object
  6. Destroy Object
  7. Create Subject
  8. Destroy Subject
A
  1. Transfer Access
  2. Grant Access
  3. Delete Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the 8 rules of the Graham-Denning security model are:

  1. Transfer Access
  2. Grant Access
  3. Delete Access
  4. ___
  5. ___
  6. ___
  7. Create Subject
  8. Destroy Subject
A
  1. Read Object
  2. Create Object
  3. Destroy Object
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the 8 rules of the Graham-Denning security model are:

  1. Transfer Access
  2. Grant Access
  3. Delete Access
  4. Read Object
  5. Create Object
  6. Destroy Object
  7. ___
  8. ___
A
  1. Create Subject

8. Destroy Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The HRU security model is an extension of the ___ model, but differs in that it ___

A

Graham-Denning; considers Subjects to be Objects too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the 6 primitive operations in the HRU security model are:

A
  1. Create Object
  2. Create Subject
  3. Destroy Object
  4. Destroy Subject
  5. Enter into access matrix
  6. Delete from access matrix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the ___ security model separates end users from the backend data through “well-formed transactions” and “separation of duties”

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While most security models describe a Subject/Object dynamic, the ___ model uses Subject/Program/Object

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

in the Clark-Wilson security model, a ___ is a series of operations that transition a system from one consistent state to another consistent state

A

well-formed transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the ___ security model acknowledges that when a Subject accesses an Object, they are mediated by a Program which limits the interface

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the ___ security model is designed to mitigate conflict of interest in commercial organizations

A

Brewer-Nash (aka “Chinese Wall”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ___ security model creates an Information Barrier to ensure that actions at a higher security level are not noticed by a lower security level, to avoid interference

A

Brewer-Nash (aka “Chinese Wall”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the 4 rules of the Take-Grant Protection Model are:

A
  1. Take (one subject can take rights from another)
  2. Grant (a subject can grant their rights to another)
  3. Create (a subject can create new objects)
  4. Remove (a subject can remove its rights over an object)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

an Access Control Matrix is a table with columns for ___ and rows for ___. The cells indicate ___ for each subject toward each object

A

Objects; Subjects; Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The six columns/frameworks of the Zachman Framework are:

A
  1. What (data)
  2. How (function)
  3. Where (Network)
  4. Who (people)
  5. When (time)
  6. Why (motivation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The six rows/roles of the Zachman Framework are:

A
  1. Planner
  2. Owner
  3. Designer
  4. Builder
  5. Programmer
  6. User
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the Trusted Computer System Evaluation Criteria (TCSEC) was developed by the Department of Defense in the 1980’s and is commonly called ___ (no longer used for evaluating security systems)

A

the Orange Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

the currently used International Common Criteria for evaluating computer security products and systems is the ___

A

ISO/IEC 15408

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

in the ISO/IEC 15408 (International Common Criteria), the subject of the evaluation is called the ___,
the document identifying security criteria for a class of devices is called the ___,
and the properties of the thing being evaluated is called the ___

A

TOE (Target Of Evaluation)
PP (Protected Profile)
ST (Security Target)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

in the ISO/IEC 15408 (International Common Criteria), the 7 levels a system or product could score is called it’s ___

A

Evaluation Assurance Level (EAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

the 3 main Secure Systems Design Concepts are:

A
  1. Layering (separating hardware and software functionality)
  2. Abstraction (hiding unnecessary details from the user)
  3. Security Domains (groups of objects and subjects with similar security requirements)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

the 3 main Security Domain concepts in Secure Systems Design are:

A
  1. Kernel/Supervisor mode vs User mode
  2. Open Standards vs Closed Standards (proprietary)
  3. The Ring Model that separates Users from the Kernel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

the layers of the Ring Model in Secure Systems Design are:

A
[Ring (-1) - Hypervisor]
Ring 0 - the Kernel
Ring 1 - other OS components
Ring 2 - device drivers
Ring 3 - user applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Newer computer hardware segments the bus into a ___, which contains the core components and slower ___ containing the peripherals and hard disk

A

Northbridge (or Host Bridge); Southbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

modern CPU’s are divided into a ___ and ___ which fetches instructions from memory and delivers them

A

ALU (Arithmetic Logic Unit); CU (Control Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

the 4 basic functions of a CPU are:

A
  1. Fetch (get instruction from memory)
  2. Store (store the result into another register)
  3. Execute (adds or subtracts values in a register)
  4. Decode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

an ___ can be sent to the CPU by either hardware or software when another process needs to take priority

A

interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

a ___ carried out by a CPU is called a Task

A

Heavy Weight Process (HWP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

as a CPU carries out processes, a parent process can spawn child processes called ___, which in contrast to Tasks are considered ___ and often share memory in an operation called ___

A

threads; Light Weight Processes (LWP); multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

a computer process can exist in 5 states:

A
  1. New
  2. Ready (waiting to be executed)
  3. Running
  4. Blocked (waiting for I/O
  5. Terminate (completed)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

___ is a system using more than one CPU at a time

A

multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

___ is when tasks share a common resource (like a CPU)

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

___ is when more than one program is running at the same time

A

multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

___ in a CPU prevents one process from affecting the confidentiality, integrity or availability of another, particularly in multi-use and multi-taking environments

A

memory protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

___ in a CPU is a logical control that tries to prevent one process from interfering with another

A

process isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

___maps processes in a CPU to specific memory locations in order to protect the integrity, confidentiality and availability of each process

A

hardware segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

___ provides virtual address mapping between applications and hardware memory

A

virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

___ moves entire processes from primary memory (RAM) to/from secondary memory (Disk)

A

swapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

___ copies a block from primary memory (RAM) to/from secondary memory (Disk)

A

paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

the ___ is the low level OS (boot sector), which runs a basic ___ on startup to verify the integrity of the system prior to loading and executing the ___ and then the rest of the OS

A

BIOS (Basic Input Output System); POST (Power On Self Test); kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

a ___ can be used to ensure the integrity of the boot sector, storing cryptographic keys, hashes and algorithms, but also used in random number generation

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

___ prevents viruses from using memory locations reserved for Windows and other authorized programs

A

DEP (Data Execution Prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

___ guards against buffer overflow attacks by randomizing the memory locations where system executables are loaded

A

ASLR (Address Space Layout Randomization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

a kernel can be either ___ (one static executable) or ___ (modular - which may run in user mode/ring 3)

A

monolithic; microkernels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

one advantage of microkernels is ___

A

they can load and execute modules to run non pre-compiled hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

the ___ is a core function of the kernel which handles all access between subjects and objects and cannot be bypassed

A

reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
Windows NTFS (New Technology File System) has 4 basic file permissions:
and one called \_\_\_ which includes the ability to change permissions
A

Read, Write, Read & Execute, Modify;

Full Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

in UNIX/Linux, the 3 file permissions are ___ and can be set at the 3 levels for the ___

A

read(r), write(w) and execute(x);

owner, group and world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

when multiple OS kernels run on the same hardware, this is called ___, and when multiple machines/locations are used for a single process, this is called ___

A

virtualization; distributed computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

clients on a virtualized network should always be on the same ___ but ___ separated if they belong to different groups

A
network segment (internal, DMZ, etc.); 
logically (different VLANS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

on a virtualized network, clients with different trust levels should be on separate hosts, to minimize the damage caused by ___ leading to privilege escalation

A

VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

the main security concerns for virtualized networks are:

A

VM Escape, Hypervisor Security, Resource Exhaustion

61
Q

Resource Exhaustion on a virtualized network can lead to ___

A

server crashes and/or slowed performance

62
Q

___ is a specific form of distributed computing which uses the down time of a large number of computers for very complex tasks

A

grid computing

63
Q

in a ___ arrangement, any system can be a client and a server - and for security each system also carries the index, removing a single point of failure

A

P2P (Peer to Peer)

64
Q

___ clients contain the boot sector but not the complete OS

A

Thin

65
Q

a ___ workstation/node downloads the kernel and higher level OS

A

diskless

66
Q

a ___ application uses a web browser to connect to the application rather than on the PC

A

thin client

67
Q

if a hacker is using the timing difference between the system returning an error due to invalid username or invalid password, the hacker is using ___

A

Covert Timing Channels

68
Q

if a hacker is adding a payload to an ICMP packet he is using a ___

A

Covert Storage Channel

69
Q

___ viruses spread themselves across multiple vectors

A

multipart

70
Q

___ are used to compress .exe files, but can also contain viruses

A

Packers

71
Q

___ attacks include all attacks that “come to you”

A

Server Side

72
Q

___ attacks include all attacks that you pick up online

A

Client Side

73
Q

___ are small applications often embedded into other software (mostly browsers). The most common are written in ___, which run in a sandbox environment and are OS agnostic; or ___ which run with certificates and are specific to MS

A

Applets; Java; ActiveX

74
Q

___ lists the Top 10 web security issues

A

OWASP (Open Web Application Security Project) 2017

75
Q

___ is a markup language primarily used for webpages, but has many other applications as well

A

XML

76
Q

___ is a software design intended to provide services to multiple different application components over a network

A

SOA (Service-Oriented Architecture)

77
Q

___ attacks are malware embedded in data that has been prepared for storage or transport, and the malicious code executes as the data is reconstructed

A

insecure deserialisation

78
Q

___ refers to 2 or more instances of a file open at the same time. What can be done with that file in each case depends upon the permissions of the user

A

polyinstantiation

79
Q

___ is the gathering of data for statistical analysis

A

aggregation

80
Q

___ is looking for patterns in large data

A

data mining

81
Q

___ is using a baseline of normal operations to identify abuse or compromised accounts

A

data analytics

82
Q

___ is deducing from indirect evidence rather than explicit statements

A

inference

83
Q

one good security practice is to disable ___ on CD’s and DVD’s

A

autorun

84
Q

___ is the general term for several types of control systems used in industrial production

A

ICS (Industrial Control System)

85
Q

The common types of ICS are:

A
  • SCADA (Supervisory Control And Data Acquisition) - for monitoring devices over distance, controlled by network nodes
  • DCS (Distributed Control Systems) - has autonomous controllers are distributed throughout a system/plant (especially when over 1000 devices are involved)
  • PLC (Programmable Logic Controllers) - an industrial computer, ruggedized for use on assembly lines
86
Q

SCADA systems are most likely to utilize the ___ (protocol) to connect Master Stations (Control Centers), Remote Terminal Units (RTU’s) and Intelligent Electronic Devices (IED’s)

A

DNP3 (Distributed Network Protocol)

87
Q
  • the science of securing communications is ___
  • creating messages with hidden content is ___
  • the science of breaking encryption (either the algorithm or the implementation is ___
  • a cryptographic algorithm is a ___
A

Cryptology;
Cryptography;
Cryptanalysis;
Cipher

88
Q
  • an unencrypted message is ___
  • an encrypted message is ___
  • the use of a well-known text/book as the key (referencing page#, sentence#, word#.. is a ___
  • adding the characters of a known text in sequence is a ___
A

plaintext/cleartext;
ciphertext;
book cipher;
running-key cipher

89
Q
  • simple character substitutions which can be easily broken with letter frequency analysis are___
  • character substitutions which rotate to a different starting point with each round are ___
A

Monoalphabetic Ciphers;

Polyalphabetic Ciphers

90
Q
  • a message written lengthwise on a long thin piece of parchment wrapped around a stick of a certain size is called a ___
  • an alphabetical substitution based on moving forward or backward a certain number of spaces is called a ___
A

Spartan Scytale;

Caesar Cipher

91
Q

the ___ is a early cipher which uses a polyalphabetic matrix (26x26) combined with a repeating key

A

Vigenere Cipher

92
Q

a ___ is an early cipher using two concentric disks with alphabets (like decoder rings) but rotated a certain number of positions after a certain number of letters

A

Cipher Disk

93
Q

the ___ was a cipher disk system used during WWII using 3, then later 4 disks

A

Enigma

94
Q

___ was a Japanese cipher used during WWII very similar to Enigma

A

Purple

95
Q

the only truly unbreakable encryption is a ___

A

one-time pad

96
Q

the first known use of a one-time pad for encryption was the ___

A

Vernam Cipher

97
Q

a ___, aka ___ was a cipher system using a stacked set of disks with the alphabet written on the edges so they could be rotated in specific ways to scramble text

A

Jefferson Disk; Bazeries Cylinder

98
Q

___ was a multiple rotor-based cryptographic machine used by the US throughout the ’40s and ’50s

A

SIGABA

99
Q

___ was an export control policy during the Cold War which prevented critical technologies, including encryption, from being sold to “iron curtain” countries

A

COCOM (Coordinating Committee of Multilateral Export Controls)

100
Q

the number of keys required for n users using asymmetric encryption is ___, but for symmetric encryption it is ___

A

2xn; n(n-1)/2

101
Q

a ___ is an arbitrary number than may only be used once

A

Nonce

102
Q

___ helps security by adding to the time it takes for password verification

A

key stretching

103
Q

a ___ attack looks for common pairs of letters in passwords

A

Digraph

104
Q
an a MITM attack, the attacker \_\_\_
in a (TCP) Session Hijacking attack, the attacker \_\_\_
A
  • passes communication through between 2 people so they think they are communicating directly;
  • masquerades as the authorized user (if the SessionID is predictable)
105
Q

in a ___attack, you know the plaintext and the ciphertext, and use those to try to determine the key

A

Known Plaintext

106
Q

in a ___ attack, you choose the plaintext and try to determine the key

A

Chosen Plaintext

107
Q

in a ___ attack, you choose the plaintext and adapt your rounds depending on the previous results to determine the key

A

Adaptive Chosen Plaintext

108
Q

in a ___ attack, you know some parts of the plaintext and ciphertext, and determine multiple secret keys (i.e. for 3DES)

A

Meet-in-the-Middle

109
Q

in a ___ attack, you know some things about the key

A

Known Key

110
Q

in a ___ attack, you look for patterns and differences between related plaintexts

A

Differential Cryptanalysis

111
Q

in a ___ attack, you have a great deal of plaintext and cyphertext created with the same key to analyze

A

Linear Cryptanalysis

112
Q

in a ___ attack, you combine the techniques of Linear and Differential Cryptanalysis

A

Differential Linear Cryptanalysis

113
Q

in a ___ attack, you use physical data to break a crypto system, like CPU cycles or power consumption

A

Side Channel

114
Q

in a ___ attack, some vulnerability is found in the application, system or service, like the key stored in plaintext somewhere, or something left in memory

A

Implementation

115
Q

in a ___ attack, two different symmetrical keys used on the same plaintext produce the same ciphertext

A

Key Clustering

116
Q

a public key signed with a digital signature is a ___

A

digital certificate

117
Q

digital certificates can be either ___ based or ___ based

A

server (stored on the server);

client (assigned to a person and stored on a PC)

118
Q

digital certificates can be authenticated by a ___ or ___ (within an organization)

A

CA (Certificate Authority);

ORA (Organizational Registration Authority)

119
Q

the ___ was a chipset that was developed and promoted by the NSA to secure “voice and data messages” but with a built-in backdoor

A

Clipper Chip

120
Q

in IPSEC the ___ acts like a digital signature, providing authentication and integrity but not confidentiality,
the ___ provides confidentiality, and can also provide authentication and integrity

A

AH (Authentication Header);

ESP (Encapsulation Security Payload)

121
Q

___ provides a standard way to format email, and ___ uses PKI to encrypt and authenticate email

A

MIME (Multipurpose Internet Mail Extensions); S/MIME

122
Q

___ combines a shared key with hashing to provide integrity and authenticity

A

HMAC

123
Q

ATSM Standards for fencing covers:

Class I: ___
Class II: ___
Class III: ___
Class IV: ___

A

Class I: Residential
Class II: Commercial/General Access (parking garage)
Class III: Industrial/Limited Access (trucking loading dock)
Class IV: Restricted Access (airport or prison)

124
Q

lighting is usually measured in ___ per square meter

A

lumens

125
Q

modern cameras use either a ___ or ___ for storing video

A

DVR; NVR (Network Video Recorder)

126
Q

modern cameras are digital and use ___ for imaging

A

CCD (Charged Couple Discharge)

127
Q

the cuts on a physical key is determined by the ___, a set of 5 numbers

A

Key Bitting Code

128
Q

a ___ lock mechanism uses pins of varying lengths to prevent a lock from opening without the correct key

A

pin tumbler

129
Q

locks can usually be opened without the proper key by picking or ___

A

bumping

130
Q

in a ___ lock, the entire lock mechanism (which has a figure 8 shape) is removed using a ___ key

A

core; control

131
Q

smart cards that require contact use an ___, or chip

A

ICC (Integrated Circuit Card)

132
Q

smart cards that do not require contact but only proximity use an ___ tag, also called a ___

A

RFID (Radio Frequency ID); transponder

133
Q

RFID tags can be picked up from ___ away unless they are stored in an ___

A

1 or 2 feet; RFID wallet/purse

134
Q

usually outside vendors doing work in a data center should be ___

A

accompanied by an employee

135
Q

undeveloped land being where a site might be built is called a ___

A

greenfield

136
Q

walls that are shared with a neighbor can be a serious security concern, especially around wiring closets or ___, where the ISP meets your network

A

demarc, or POD (Point Of Demarcation)

137
Q

Power Fluctuation Terms:

\_\_\_ - long loss of power
Fault - short loss of power
\_\_\_ - long low voltage
Sag - short low voltage
\_\_\_ -long high voltage
Spike - short high voltage
A

Blackout - long loss of power
Brownout - long low voltage
Surge -long high voltage

138
Q

Power Fluctuation Terms:

Blackout - long loss of power
\_\_\_ - short loss of power
Brownout - long low voltage
\_\_\_ - short low voltage
Surge -long high voltage
\_\_\_ - short high voltage
A

Fault - short loss of power
Sag - short low voltage
Spike - short high voltage

139
Q

a ___ will protect the quality of electrical power in a data center, and a ___ will ensure that there is time to shut down properly or engage a generator in the event of a power outage

A

PDU (Power Distribution Unit);

UPS (Uninterruptible Power Supply)

140
Q

if cables (data and/or power) are run too close to each other it can result in ___, so always manage cables and use ___ cables for data, or even better use ___

A

crosstalk; STP (Shielded Twisted Pair); fiber optic

141
Q

optimal temperatures for data centers are __ degrees, there should always be ___ air pressure and humidity should be at ___

A

68 - 77; positive; 40-60%

142
Q

in addition to cold air moving from cold aisles to hot aisles (back of servers), it should also move ___

A

from floor to ceiling

143
Q

smoke detectors can be either ___ or ___

A

Ionization; photoelectric

144
Q

flame detectors detect ___ emitted by fire, so they require ___ to work properly

A

infrared or ultraviolet light; line of sight

145
Q

if sprinklers are used for fire suppression in a data center, they should be ___ so no water is released until there is a fire alarm AND the sprinkler head is open

A

double interlock

146
Q

CO2 might be used for fire suppression in a data center if the center is ___

A

unmanned

147
Q

possible gases that could be used for fire suppression in a data center are:

  1. ___
  2. ___
  3. ___
  4. ___
A
  1. Argon (50% Nitrogen)
  2. FE-13 (flouroform)
  3. FM-200
  4. Inergen (Nitrogen, Argon and 8% CO2)
148
Q

Fire Extinguishers can be:

  1. ___
  2. ___
  3. ___
A
  1. Soda-Acid (no longer used)
  2. Dry Powder (primarily for metal fires)
  3. Wet Chemical (foam blanket, common)