Chapter 19
What is a drop ceiling? A. A false ceiling B. A tiled ceiling C. An insulated ceiling D. A weak ceiling
A. False ceiling
During an assessment you discovered that the target company was using a fax machine. Which of the following is the least important? A. The phone number is publicly available. B. The fax machine is in an open, unsecured area. C. Faxes frequently sit in the printer tray. D. The fax machine uses a ribbon.
A. The phone number is publically available
What is the first defense that a physical intruder typically encounters? A. Fences B. Walls C. Bollards D. Cameras
A. fences
Which of the following is a characteristic of USB flash drives that makes security a problem? A. Encrypted B. Easily hidden C. Portable D. Slow
B. easily hidden
What is another word for portals? A. Doors B. Mantraps C. GlaDOS D. Booths
B. mantraps
What is a type of combination lock? A. Key lock B. Card lock C. Cipher lock D. Trucker lock
C. cipher lock
What mechanism is intended to deter theft of hard drives? A. Locks B. Backups C. Encryption D. Size
C. encryption
Lock-pick sets typically contain which of the following at a minimum? A. Tension wrenches and screwdrivers B. A pick C. A pick and a driver D. A pick and a tension wrench
D. A pick and tension wrench
Which of the following could be considered required components of an alarm system? A. A visual alerting method B. An audio alerting method C. Automatic dialup D. Both A and B
D. Both A and B
Frequency of type 2 errors is also known as what? A. False rejection rate B. Failure rate C. Crossover error rate D. False acceptance rate
a. False rejection rate
While guards and dogs are both good for physical security, which of the following is a concern with dogs? A. Liability B. Discernment C. Dual role D. Multifunction
a. Liability
In the field of IT security, the concept of defense in depth is the layering of more than one control on another. Why is this? A. To provide better protection B. To build dependency among layers C. To increase logging ability D. To satisfy auditors
a. To provide better protection
Which of the following is a detective control when not used in real time? A. Fences B. Alarms C. CCTV D. Locks
b. Alarms
Which of the following is a wall that is less than full height? A. Drop wall B. False wall C. Short wall D. Plenum wall
b. False wall
Which type of biometric system is frequently found on laptops but can be used on entryways as well? A. Retina B. Fingerprint C. Iris D. Voice recognition
b. Fingerprint
Which intrusion prevention system can be used in conjunction with fences? A. Infrared wave patter B. Bollards C. Audio D. PIDAS
b. bollards
For a fence to deter a determined intruder, it should be at least how many feet tall? A. 4 B. 6 C. 8 D. 10
c. 8
A ____________ is used to prevent cars from ramming a building. A. Honeypot B. Gates C. Bollard D. Fences
c. Bollard
Physical security can prevent which of the following? A. DDoS B. FTP C. Tailgating D. Cracking
c. Tailgating
Which of the following is a good defense against tailgating and piggybacking? A. Cameras B. Guards C. Turnstiles D. Mantraps
d. Mantraps