CIST1130: Operating Systems Concepts
While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future? Cable locks Door locks with card readers Access control vestibule Lo-jack recovery service
Access control vestibule Explanation: You could implement an access control vestibule (ACV) at each entrance to the facility. An ACV is a specialized entrance with two doors that creates a security buffer zone between two areas. Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided. If authentication is not provided, the intruder is kept in the access control vestibule until authorities arrive. Cable locks are used to secure computer hardware. In this scenario, door locks with card readers were already circumvented with the piggybacking technique. Lo-jack recovery services are used to locate stolen or misplaced computer hardware.
A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops? Cable locks A multi-factor password policy An external encryption device Biometric authentication
Cable locks Explanation: Cable locks can be used to physically secure laptops in order to deter theft. Biometric authentication, a multi-factor password policy, or external encryption devices do not physically secure laptops.
You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Security cameras are installed on all buildings. The parking lot has light poles installed in all areas. Vehicles are able to drive straight to the building entrance itself. Which of the following would you MOST likely recommend that your client do to increase security based on this information? -Upgrade the light poles to LED lights. -Upgrade the security cameras to a better quality option. -Install barbed wire on the fence. -Install bollards.
Install bollards. Explanation: Bollards should be installed to prevent vehicles from driving straight to the building entrance. Bollards are metal poles that are secured into the ground to prevent vehicle access. Bollards should be placed near the front of any building to prevent vehicles from getting too close. Installing barbed wire on top of the fence is not necessary in most cases. Upgrading the security cameras would most likely not be necessary. The light poles do not need to be LED lights, as this would be an unnecessary expense.
You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: All pieces of equipment have cable locks installed. Server racks are locked and have alarms. The WAP for the guest Wi-Fi is located on the receptionist's desk. Biometric locks are installed on high security rooms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? -Install biometric locks on the server racks. -Replace the biometric locks with standard locks. -Install the WAP on the ceiling or inside of a special locked box. -Upgrade the equipment cable locks.
Install the WAP on the ceiling or inside of a special locked box. Explanation: In this scenario, the WAP should be installed on the ceiling or in a special locked box to prevent unauthorized access. Upgrading cable locks is not necessary. Biometric locks on the server racks are not needed and would be an unnecessary cost. Replacing the biometric door locks with standard locks would downgrade the building's overall security.
Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? Biometric Standard lock Smart card Key fob
Key fob Explanation: A key fob provides a keyless authentication to a specific lock. The key fob may use a wireless radio signal, NFC, or Bluetooth to communicate with the lock. Smart cards also provide a keyless authentication to a specific lock. Smart cards typically use RFID or NFC to communicate with the lock and need to be scanned by a special reader to open the lock. Smart cards do not use Bluetooth. Biometric locks can provide authentication to a lock using a user's unique physical traits. Biometric locks do not use Bluetooth. A standard lock uses a key, not Bluetooth.
lightsWhich of the following can be paired with a motion sensor to improve security? Magnetometer Lights Cable lock Door lock
Lights ExplanationL Motion sensors can be implemented to trigger spotlights or alarms when motion is detected. The motion sensors can be used both inside and outside of a building. Cable locks, door locks, and magnetometers would not be paired with a motion sensor to improve security.
Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? Badge reader Access control vestibule Cable lock Magnetometer
Magnetometer Explanation: A magnetometer is a metal detector that users walk through to detect whether they are bringing any weapons or unauthorized equipment into the building. This should be installed just inside the entrance to the building. A badge reader is installed at the entrance to a building to help control access. A badge reader is not used to prevent weapons or unauthorized equipment from being brought inside. The access control vestibule is a specialized entrance with two doors that creates a security buffer zone between two areas. An access control vestibule is not used to prevent weapons or unauthorized equipment from being brought inside. Cable locks can be used to physically secure a device to a desk. They are not used to prevent weapons or unauthorized equipment from being brought inside.
You have been hired to evaluate your client's building security. In your walkthrough, you notice the following:A high fence is installed around the property.Visitors are able to enter the building and are checked in by a receptionist.Security cameras are installed on all buildings.Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Place a security guard at the entrance gate with an access list to control who comes on the property. Install barbed wire around the top of the fence. Install biometric locks on all server racks. Upgrade the security cameras.
Place a security guard at the entrance gate with an access list to control who comes on the property. Explanation: Security guards can provide a high level of security inside and outside the property. They should be stationed at the entrance(s). The guards should have an access list that states who is allowed onto the property. Biometric locks on the server racks are not needed and would be an unnecessary cost. Installing barbed wire on top of the fence is not necessary in most cases. Upgrading the security cameras would most likely not be necessary.
All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to a locked door in the reception area. They use an iPad application to log any security events that may occur. They also use their iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area so that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. (select two) Move the receptionist's desk to the secured area. Replace the biometric locks with smart cards. Require users to use screen saver passwords. Train the receptionist to keep their iPad in a locked drawer when not in use. Disable the network jacks in the reception area.
Train the receptionist to keep their iPad in a locked drawer when not in use. Disable the network jacks in the reception area. Explanation: You should recommend the following: Disable the network jacks in the reception area. Having these jacks in an unsecured area allows anyone who comes into the building to connect to the company's network. Train the receptionist to keep their iPad in a locked drawer when not in use. Tablet devices are small and easily stolen if left unattended. The receptionist's desk should remain where it is currently located because it allows them to visually verify each employee as they access the secured area. Biometric locks are generally considered more secure than smart cards because cards can be easily stolen. Training users to lock their workstations is more secure than using screen saver passwords, although this may be a good idea as a safeguard in case a user forgets.
You have five salespeople who work out of your office and who frequently leave their laptops lying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns? Encrypt all company data on the hard drives. Require strong passwords in the Local Security Policy. Use cable locks to chain the laptops to the desks. Implement screen saver passwords.
Use cable locks to chain the laptops to the desks. Explanation: Your main concern, in this case, is with the laptops being stolen. The best protection against physical theft is to secure the laptops in place using cable locks. Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but doing so does not prevent physical theft.