Security Pro Chapter 4
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components? A.)Carbon dioxide B.)Soda acid C.)Water-based D.)Dry powder
A
You want to use CCTV to increase your physical security. You want the ability to remotely control the camera position. Which type should you choose? A.)PTZ B.)Bullet C.)Dome D.)C-mount
A
An attacker is using an eavesdropping technique call Van Eck phreaking on a networking closet. Which of the following describes what the attacker is doing? A.)Collecting electronic emissions B.)Connecting to an open switch port C.)Capturing data transmissions D.)Connecting to an open Ethernet port
A
One of the ways attackers can access unencrypted data being transmitted on your network is by collecting electronic emissions that come from your networking closet or Ethernet cables. Which of the following solutions could bog down the infrastructure? A.)Configure all data transmissions to be encrypted B.)Employing a protective distribution system, or PDS C.)Place your network closet inside a Faraday cage D.)Use Ethernet port locking devices
A
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry? A.)Deploy a mantrap B.)Use weight scales C.)Use key locks rather than electronic looks D.)Install security cameras
A
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns? A.)Use cable locks to chain the laptops to the desks B.)Encrypt all company data on the drives C.)Require strong passwords in the local security policy D.)Implement screen save passwords
A
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two.) A.)Turnstile B.)Anti-passback system C.)Double-entry door D.)PTZ CCTV E.)Mantrap
A and C
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet and prevent anyone from reconfiguring the network to set up remote access or backdoor access. Which of the following measures are the best way to secure your networking equipment from unauthorized physical access? (Select two.) A.)Place your networking equipment in a locked cage. B.)Place your networking equipment in a Van Eck cage. C.)Place your networking equipment in a room that requires key card entry. D.)Place your networking equipment in a Faraday cage. E.)Place your networking equipment in a TEMPEST cage.
A and C
Which of the following are solutions that address physical security? (Select two.) A.)Require identification and name badges for all employees B.)Disable guest accounts on computers C.)Implement complex passwords D.)Scan all floppy disks before use E.)Escort visitors at all times
A and E
To keep your data center safe, you have done the following: *Restricted physical access to employees who strictly need to get in the data center. *Required employees to enter a password using a pin pas to enter the data center. *Deployed a Faraday cage to keep sensitive network devices safe from external electrical fields. Which of the following measures will NOT improve physical security in the data center? A.)Grant employee access to hardware on a need to know basis. B.)Implement a checkout policy C.)Set up video surveillance in the data center. D.)Place all servers in secured cabinets.
B
Which of the following is the most important thing to do to prevent console access to the router? A.)Set console and enable secret passwords B.)Keep the router in a locked room C.)Disconnect the console cable when not in use D.)Implement an access list to prevent console connections
B
Which of the following statements about ESD is not correct? A.)One of the greatest threats to computer equipment is ESD. B.)ESD is much more likely to occur when the relative humidity is above 50%. C.)ESD damage is more likely to occur in low humidity. D.)Measuring the moisture content in the air can be helpful in avoiding ESD.
B
Which option is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment while actively preventing re-entrance through the exit portal? A.)Egress mantraps B.)Turnstiles C.)Locked doors with interior unlock push bars D.)Electronic access control doors
B
You are about to enter your office building through a back entrance. A man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do? A.)Let him in. B.)Direct him to the front entrance and instruct him to check in with the receptionist. C.)Let him in and help find the restroom, then let him work. D.)Tell him no and quickly close the door.
B
You walk by the server room and notice that a fire has started. What should you do first? A.)Call the fire department. B.)Make sure everyone has cleared the area. C.)Turn on the overhead sprinklers. D.)Grab a fire extinguisher and try to put out the fire.
B
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two.) A.)Foam B.)Halon C.)Water D.)CO2
B and D
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems? A.)Add a humidifier to the server room B.)Add a de-humidifier to the server room C.)Add a separate A/C unit in the server room D.)Add line conditioners in the server room
C
What is the recommended humidity level for server rooms? A.)10% or lower B.)30% C.)50% D.)70% or higher
C
Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components? A.)Class A B.)Class B C.)Class C D.)Class D
C
Which of the following is not an example of a physical barrier access control mechanism? A.)Biometric locks B.)Mantrap C.)One-time passwords D.)Fences
C
You are IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: *When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area, where the office manager sits. *The office manager informs you that the organization's servers are kept in locked closet. An access card is required to enter the server closet. *She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media. *You notice the organization's network switch is kept in the server closet. *You notice that a route/firewall/content filter all-in-one device has been implement in the server closet to protect the internal network from external attacks. *The office manager informs you her desktop system will no longer boot and asks you to repair or replace it, recovering as much as possible in the process. You take the workstation back your office to work on it. What security-related recommendations should you make to this client? A.)Keep the network infrastructure devices (switch and all-in-one deice) in a locket room separate form network servers. B.)Replace the tape drive used for backup with external USB hard disks. C.)Implement a hardware checkout policy. D.)Upgrade the server closet lock to a biometric authentication system.
C
You want to use CCTV to increase the physical security of your building. Which of the following types would offer the sharpest image at the greatest distance under the lowest lighting conditions? A.)500 resolution, 50mm, 2 LUX B.)400 resolution, 10mm, .05 LUX C.)500 resolution, 50mm, .05 LUX D.)400 resolution, 10mm, 2 LUX
C
Beside protecting a computer from under voltages, a typical UPS also performs which two actions? A.)Prevents electric shock B.)Prevents ESD C.)Protects from over voltages D.)Conditions the power signal
C and D
A malicious user in your organization was able the Trinity Rescue Kit to change the password on a department manager's computer in the finance department. The user was able to copy data containing bank account information and social security numbers. The user then destroyed the data by resetting the computer. The department information and social security numbers. The user then destroyed the data by resetting the computer. The department manager was at lunch at the time and had enabled the lock screen to require a password to gain access to the computer. Which additional measure should the manager have taken to prevent data theft? A.)The sensitive data on the computer should have been encrypted. B.)The data should have been backed up so it could be restored after it was destroyed. C.)The computer should have been bolted to the desk. D.)The computer should have been kept in a physically secure location.
D
Physical security is an obvious requirement for network security, but it is often easy to overlook or forget to plan for it. Which of the following is NOT a benefit of physical security? A.)Untrained employees cannot misuse equipment. B.)Terrorists cannot walk in off the street and change the network configuration. C.)Sensitive data is protected form unauthorized access. D.)Employee passwords are stronger. E.)Network resources are safer from natural disasters.
D
What is the primary benefit of CCTV? A.)Reduce the need for locks and sensors on doors B.)Increase security protection throughout an environment C.)Provide a corrective control D.)Expand the area visible by security guards.
D
Which of the following CCTV camera types lets you adjust the distance that the camera can see (in other words, zoom in or out)? A.)C-mount B.)Fixed C.)Infrared D.)Varifocal
D
Which of the following is the least effective power loss protection for computer systems? A.)Backup power generator B.)Secondary power source C.)Uninterruptible power supply D.)Surge protector
D
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting network availability. Which of the following should you implement? A.)UPS B.)Line conditioner C.)Backup generator D.)Positive pressure system E.)Negative pressure system
D
You are It consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: *When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. *The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. *She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. *You notice that the organization's network switch is connected in an empty cubicle adjacent to the office manager's workspace. *You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two.) A.)Use separate dedicated network perimeter security devices instead of an all-in-one-time device B.)Replace the USB hard disks used for server backups with a tape drive C.)Replace the key look on the server closet with a card reader D.)Control access to the work area with locking doors and card readers E.)Relocate the switch to the locked server closet
D and E
Which of the following controls is an example of a physical access control method? A.)Access control lists with permission B.)Passwords C.)Smart cards D.)Hiring background checks E.)Locks on doors
E