Chapter 8: Physical Security Review Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A single post method of preventing vehicle access is to use a jersey wall. -True -False

Answer - False bollards are single posts of concrete used for preventing a vehicle from damaging a building

Which range is the optimal temperature for a data center? -60-68 F -65-70 F -70-74 F -55-60 F

Answer = 70-74 F

A threat to data could be that someone inserted a _______ in a system to capture what a user has been entering into their system. -A skimmer -A keylogger -A sniffer -A text identifier

Answer = A keylogger

A network that is not physically connected to a network is referred to as this term: -Faraday cage -Airgap -VLAN -Mantrap

Answer = Airgap

Why is physical security so important to good network security? -Because encryption is not involved -Because physical access defeats nearly all network security measures -Because an attacker can steal biometric identities -Authentication

Answer = Because physical access defeats nearly all network security measures

One of the concerns about physical access to a server is the use of a: -IPS -Bootdisk -Firewall -Packet sniffer

Answer = Bootdisk

Which is a good physical security step to prevent the theft of laptops? -Key management -Cable locks -Safes -Logs

Answer = Cable locks

A fire broke out in a trash receptacle containing mostly paper products. Which fire extinguisher class is best suited for this type of fire? -Class A -Class B -Class C -Class D

Answer = Class A

Which common setting should you use to prevent malware from installing automatically from a portable flash drive? -Set BIOS passwords -Set BIOS and UEFI passwords -Disable autoplay for USB disks -Require biometric login

Answer = Disable autoplay for USB disks

What is used in data centers for fire extinguishers? -CO2 fire extinguishers -Water sprinklers -Dry agent extinguishers -Special non-conductive foam agents

Answer = Dry agent extinguishers

Which is the best choice of fire suppression (budget not withstanding) -Halon -Water -Dry heat -FM-200

Answer = FM-200

Emergency exit doors for manned security sensitive spaces should be what type of door? -Fail-secure -Fail-safe -Unlocked at all times -Locked unless monitored

Answer = Fail-safe

Since there are great many technical physical security strategies that could be incorporated, security guards are no longer relevant in a business. -True -False

Answer = False security guards are the number one deterrent and 1st line of defense.

Where should a report about server backup policies be stored? -On the CIO's desk -In a safe -In a secure cabinet -Attached to the rack in the server room for reference

Answer = In a secure cabinet

Which is a true statement about physical security? -It applies to access servers and server rooms only -It combines a firewall and physical security -It applies to access to the facility and rooms and resources contained in the facility -It is physical barriers and preventing remote access

Answer = It applies to access to the facility and rooms and resources contained in the facility

In terms of physical security, which term refers to protecting important assets by using multiple perimeter measures? -Layered access -Multifactor access control -Dual authentication -Intrusion detection system

Answer = Layered access

What is a common threat to token-based access controls? -The key -Demagnetization of the strip -A system crash -Loss or theft of the token

Answer = Loss or theft of the token

You have a user that is writing computer code for a special and important project. In the event of a power failure you want to ensure the user can save their work quickly. Which should you implement? -Generator -Power strip -Online UPS -Standby UPS

Answer = Online UPS

In a datacenter the use of a hot/cold aisle means that cold air is: -Pushed to the hot aisle to cool it -Pushed from the floor to the cold aisle -Pushed from the ceiling to the cold aisle -Is evenly split between both aisles to balance temperature swings

Answer = Pushed from the floor to the cold aisle

Why is HVAC important to computer security? -Sabotage of the AC unit would make the computers overheat and shutdown -Sabotage of the AC unit could take out the electrical power -The AS units could be connected to the network -HVAC is not important to security

Answer = Sabotage of the AC unit would make the computers overheat and shutdown

How high should a fence be to deter casual climbing? -Five feet if the fence is monitored visually -Ten feet -Seven feet -Eight feet or higher with Barbed wire

Answer = Seven feet

What is the most common example of an access token? -Smart card -Handwriting sample -PDA -Key

Answer = Smart card

Which is a security strategy that will prevent a user of stealing an encryption key? -TPM -Access cards -Faraday cage -Tempest

Answer = TPM

Your customer is a defense contractor working on top-secret military equipment. In addition to the usual physical safeguards, you need to ensure that a user cannot eavesdrop from accessing the electrical emanations. which of these is the BEST option? -CCTV -Contactless access cards -Tempest -STP cable

Answer = Tempest

Why should security guards get cross-training in network security? -They are the eyes and ears of the corporation when it comes to security -They are the only people in the building at night -They are more qualified to know what a security threat is -They have the authority to detain violators

Answer = They are the eyes and ears of the corporation when it comes to security

Why can USB flash drives be a threat? -They use too much power -They can bring malicious code past other security mechanisms -They can be stolen -They can be encrypted

Answer = They can bring malicious code past other security mechanisms

A mantrap is used to combat tailgating. -True -False

Answer = True

You dont want to invest in the storage to continually store camera data so you choose a motion detector since it only alerts when there is some form of activity. -True -False

Answer = True

You want to prevent someone with physical access to your server from restarting the device and configuring the system for boot to USB as the first option. This should be done with a BIOS password. -True -False

Answer = True

Probably the simplest physical attack on the computer system is which of the following? -Accessing an ethernet jack to attack the network -Using an imitation to fool a biometric authenticator -Installing a virus on a CCTV system -Outright theft of a computer

Answer = outright theft of a computer


Ensembles d'études connexes

CH 60 Spinal Cord and Peripheral Nerve Problems

View Set

test bank ch 14, 15, 20, 21, 29, 30, 57

View Set

Life insurance wrong answers third attempt.

View Set

PSYCHOSOCIAL THEORIES: Older Adult

View Set