by 0x4b4d


keywords:
Bookmark and Share



Front Back
1. Which component of physical security addresses outer-level access control?
Perimeter security
Mantraps
Security zones
Locked doors
1. A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.
2. You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?
Type A
Type B
Type C
Type D
2. C. Type C fire extinguishers are intended for use in electrical fires.
3. Which of the following won't reduce EMI?
Physical shielding
Humidity control
Physical location
Overhauling worn motors
3. B. Electrical devices, such as motors, that generate magnetic fields cause EMI. Humidity control won't address EMI.
4. You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
Zone
Partition
Perimeter
Floor
4. A. A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones.
5. Which of the following is equivalent to building walls in an office building from a network perspective?
Perimeter security
Partitioning
Security zones
IDS systems
5. B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is analogous to building walls in an office building.
6. After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
Perimeter security
Access control
Security zones
IDS systems
6. B. Access control is the primary process of preventing access to physical systems.
7. Which of the following is an example of perimeter security?
Chain link fence
Video camera
Elevator
Locked computer room
7. A. Perimeter security involves creating a perimeter or outer boundary for a physical space. Video surveillance systems wouldn't be considered a part of perimeter security, but they can be used to enhance physical security monitoring.
8. You're the leader of the security committee at ACME. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
Perimeter security
Partitioning
Security zone
IDS system
8. C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.
9. Which technology uses a physical characteristic to establish identity?
Biometrics
Surveillance
Smart card
CHAP authenticator
9. A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.
10. The process of reducing or eliminating susceptibility to outside interference is called what?
Shielding
EMI
TEMPEST
Desensitization
10. A. Shielding keeps external electronic signals from disrupting operations.
11. You work for an electronics company that has just created a device that emits less RF than any competitor's product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
EMI
RFI
CC
EAL 4
TEMPEST
11. D. TEMPEST is the certification given to electronic devices that emit minimal RF. The TEMPEST certification is difficult to acquire, and it significantly increases the cost of systems.
12. Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
Gas based
Water based
Fixed system
Overhead sprinklers
12. A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire: oxygen.
13. Type K fire extinguishers are intended for use on cooking oil fires. This type is a subset of which other type of fire extinguisher?
Type A
Type B
Type C
Type D
13. B. Type K fire extinguishers are a subset of Type B fire extinguishers.
14. Proximity readers work with which of the following? (Choose all that apply.)
15.75 fob card
14.32 surveillance card
13.56 MHZ smart card
125 kHz proximity card
14. C, D. Proximity readers work with 13.56 MHz smart card and 125 kHz proximity cards.
15. In a hot and cold aisle system, what is the typical method of handling cold air?
It is pumped in from below raised floor tiles.
It is pumped in from above through the ceiling tiles.
Only hot air is extracted and cold air is the natural result.
Cold air exists in each aisle.
15. A. With hot and cold aisles, cold air is pumped in from below raised floor tiles.
16. If RF levels become too high, it can cause the receivers in wireless units to become deaf. This process is called:
Clipping
Desensitizing
Distorting
Crackling
16. B. If RF levels become too high, it can cause the receivers in wireless units to become deaf and is known as desensitizing. This occurs because of the volume of RF energy present.
17. RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the following?
Network medium
Electrical wiring
Radio spectrum
Portable media
17. C. RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across a radio spectrum. Motors with defective brushes can generate RFI, as can a number of other devices.
18. For physical security, what should you do with rack-mounted servers?
Run a cable from them to a desk.
Lock each of them into the cabinet.
Install them in safes.
Use only Type D, which incorporates its own security.
18. B. Server racks should lock the rack-mounted servers into the cabinets to prevent someone from simply pulling one and walking out the front door with it.
19. Which of the following is a method of cooling server racks in which hot air and cold are both handled in the server room?
Hot/cold vessels
Hot and cold passages
Hot/cold walkways
Hot and cold aisles
19. D. Hot and cold aisles is a method of cooling server racks in which hot air and cold are both handled in the server room.
20. Which of the following is a high-security installation that requires visual identification, as well as authentication, to gain access?
Mantrap
Fencing
Proximity reader
Hot aisle
20. A. High-security installations use a type of intermediate access control mechanism called a mantrap. Mantraps require visual identification, as well as authentication, to gain access. A mantrap makes it difficult for a facility to be accessed in number because it allows only one or two people into the facility at a time.
Access Control
Part of physical security. Machines and buildings must be safe from intrusion
Physical barriers
perimiter: fence, wall, external surveillance
Proximity reader
Card/reader system that operates on 13.56 MHZ smart card and 125 khz proximity cards
Physical token
Something a person must have to access network resources
ex. SecurID
Mantrap
Physical security method
Small area allowing only one or two people. Exit door will only open after the Entrance door has closed and the identity of the individual has been verified
Hardware security
Prevent unauthorized person from accessing machines or components.
Laptop cables, case locks, server cabinets
Security zone
Area in a building that is individually monitored
ex. each floor, lobby, etc
Partitioning
Dividing a physical area into smaller areas for better security management
Biometrics
Using physical features to verify identity
ex. fingerprint, retina, voice
Environmental Monitoring
Temperature and humidity control for reliable computer system performance.
Low humidity may lead to static discharge
High humidity may lead to condensation and short circuit
High temp may lead to overheat and failure
Surge protector
Powerline spikes are shunted to ground to prevent system damage
Power Conditioner
Filter and regulate power to reduce voltage variations
Backup power
Used in the event of main power failure.
Battery backup can provide temporary power
Generators for longer outages
Electromagnetic Interference (EMI)
Interference caused by other electronic devices that may cause deterioration of data signals
ex monitors, motors, wireless devices
Radio Frequency Interference (RFI)
Interference at radio frequency bands
TEMPEST
Government standard for reducing electronic noise
Hot and Cold Aisles
Server room cooling method
Cold air from vents below gets drawn into the front of row
Hot air from machine is vented out the back and up through the ceiling
Fire extinguisher types
A=wood/paper
B=liquid
C=electrical
D=metal
Fixed fire suppression types
Water - may cut power to equipment to prevent electrical fires
Gas - displaces oxygen
x of y cards