CISSP - Domain 10: Physical (Environmental) Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many meters high should a fence be to deter a determined intruder? A. 2 to 4 meters B. 1 to 2 meters C. 6 to 8 meters D. 4 to 6 meters

A (2 to 4 meters)

Which of the following is an example of a smart card? A. ATM Card B. Drivers License C. Employee photo ID D. Library card

A (ATM Card)

Which of the following is the determination of the functions or activities that an individual is permitted to perform? A. Authorization B. Authentication C. Identification D. Accounting

A (Authorization)

Which of the following is NOT considered an acceptable replacement for Halon discharge systems? A. Halon 1301 B. Argon (IG55) C. Inergen (IG541 D. FA200

A (Halon 1301)

Which of the following is the association of a unique identity with an individual presenting himself unknowing or knowingly to an access control system? A. Identification B. Authentication C. Authorization D. Integrity

A (Identification)

Which of the following is considered a Class B fire A. Liquid such as coolants B. Electrical such as wires C. Common combustibles such as wood products D. Paper Products

A (Liquids such as coolants)

What security control is most often overlooked? A. Physical security B. Technical security C. Administrative security D. Personnel Security

A (Physical security)

Which of the following choices is NOT an access control type? A. Reactive B. Corrective C. Preventive D. Deterrent

A (Reactive)

When designing emergency procedure signage that you plan on posting throughout your organization, what color is recommended? A. Red B. Yellow C. Brown D. Blue

A (Red)

What CANNOT be used to suppress a Class C fire? A. Soda Acid B. Gas C. CO2

A (Soda Acid)

Which is not an element of two-factor authentication A. Something you ate B. Something you know C. Something you have D. Something you are

A (Something you ate)

Your company has very sensitive, critical information. If it was ever leaked to the public domain, it would impact the ability of your company to continue operating and its profitability. In order to protect your enterprise, if there is a fire alarm that goes off; Should the doors to your building fail open or fail closed? A. They should fail open. B. They should fail closed. C. You should use a deterministic algorithm to find the best option. D. You should do both

A (They should fail open - On exam, always choose Safety 1st)

What is the appropriate temperature range for system reliability and operator comfort? A. 40-45 C B. 21-23 C C. 12-15 C D. 10-40 C

B (21-23 C)

Which of the following is meant to simply deter casual trespassers? A. 6-7 foot fences B. 3-4 foot fences C. 8 foot fences D 1-2 foot fences

B (3-4 foot fences)

Information security has been aligned toward the accomplishment of three objectives: Confidentiality, Integrity, and: A. Assurance B. Availability C. Accomplishment D. Measurability

B (Availability)

Which of the following is considered a detective physical control? A. Mantrap B. Closed Circuit Television (CCTV) C. Fences D. Locks

B (Closed Circuit Television - CCTV)

Which of the following principles below is the need to ensure that information is disclosed only to those who are authorized to view the information? A. Integrity B. Confidentiality C. Availability D. Safety

B (Confidentiality)

There are several drawbacks when using security guards. Given the choice below, which is NOT a drawback? A. Cost B. Deterrent C. Training D. Reliability

B (Deterrent)

Which is considered a preventive security device? A. Fences B. Locks C. Guards D. CCTV

B (Locks)

Who is responsible for beginning the process of accounting for all employees in the case of evacuation? A. Safety Warden B. Meeting Point Leader C. Technical Manager D. Employee

B (Meeting Point Leader)

When implementing evacuation procedures, which of the following should be included? A. Servers to shut down B. Meeting points C. Backup tapes to acquire D. Locking file cabinets

B (Meeting points)

Who is responsible for checking that each individual in his or her area has begun evacuation? A. Meeting Point Leader B. Safety Warden C. Employee D. Technical Manager

B (Safety Warden)

What is the top priority when physical security measures are implemented? A. Confidentiality B. Safety C. Availability D. Integrity

B (Safety)

Which of the following objectives does the physical security realm include besides the Confidentiality, Integrity, and Availability (CIA) model? A. Security B. Safety C. Assurance D. Logistics

B (Safety)

Which of the following is the confirmation that an individual is who she claims to be? A. Authorization B. Identification C. Authentication D. Integrity

C (Authentication)

Which of the following classes of fires is the most common? A. Class D B. Class C C. Class A D. Class B

C (Class A)

Which of the following is considered a deterring physical control? A. Locks B. Lights C. Guards D. Mantraps

C (Guards)

Which of the following is a drawback in using dogs to maintain physical security? A. Easy to maintain B. Low in cost C. Liability issues D. Reliable

C (Liability issues)

Which of the following biometric access control techniques has the quickest response time and lowest crossover error rate? A. Voice pattern B. Iris scan C. Palm scan D. Hand geometry

C (Palm scan)

What is the top priority when working with physical security? A. Confidentiality B. Integrity C. Safety D. Availability

C (Safety)

Which of the following is considered a detective physical control? A. Fences B. Guards C. Security lights D. Mantraps

C (Security lights)

What is the most common means of putting out a class A fire? A. Halon B. Gas C. Water D. Soda Acid

C (Water)

The theft of a PDA poses a threat to which tenet of the CIA triad? A. Confidentiality B. Integrity C. Availability D. All of the above

D (All of the above)

All of the following are considered physical security access control EXCEPT? A. Retinal scanner B. Key pad C. Guard Dog D. Audit Trail

D (Audit Trail)

Which of the following information security objectives refers to the need to ensure that the business purpose of the system can be met? A. Safety B. Integrity C. Confidentiality D. Availability

D (Availability)

Which of the following information security objectives refers to the need to ensure that the information is not disclosed to unauthorized parties? A. Safety B. Integrity C. Availability D. Confidentiality

D (Confidentiality)

Which of the following is considered a preventative physical control? A. Guards B. Motion detector C. Security lights D. Locks

D (Locks)

Which of the following is considered a preventive physical control? A. Fences B. Guards C. Security Lights D. Mantrap

D (Mantrap)

Threats such as smoke and fire, toxins, and water/flood fall under which of the following categories of security? A. Corporate Security B. Equipment security C. Access security D. Physical security

D (Physical security)

Which type of controls are designed to ensure that unauthorized personnel do not have the capability to enter restricted areas? A. Deterrent B. Detective C. Corrective D. Preventive

D (Preventive)

What CANNOT be used to suppress a Class B fire? A. Halon B. CO2 C. Soda Acid D. Water

D (Water)


Set pelajaran terkait

The Biomedical Therapies and Preventing Psychological Disorders

View Set

english- Discoveries-First -Discoveries ABOUT ME

View Set

MGMT124 - Human Resources Management

View Set

C++ Ch. 1 Introduction to Computers and Programming

View Set

15. Cell metabolism: regulation and integration of glucose metabolism

View Set