1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
security training
provides users with the knowledge they need to protect the organization’s security
security awareness
keeps the lessons learned during security training top of mind for employees
security training methods
instruction in on site classes
integration with orientations
education through online computer based training providers
participation in vendor-provided classroom training
compliance programs
ensure that an organization’s information security controls are consistent with the laws, regulations, and standards that govern the organization’s activities
3 types of compliance obligations
laws
regulations
standards
social engineering
manipulating people into divulging information or performing an action that undermines security
social engineering reasons
authority
intimidation
consensus
scarcity
urgency
familiarity
expanded envelope
reccomended temp for data centers. Between 64.4 F and 80.6 F
Dew Point Range
humidity must also be controlled in data centers. Dew point between 41.9 F and 50 F
the _______ aisle approach makes cooling data centers more efficient
hot aisle/cold aisle. involves lining up server racks in alternating rows with cold air intakes facing one way and hot air exhausts facing the other. The rows composed of rack fronts are called cold aisles. Typically, cold aisles face air conditioner output ducts. The rows the heated exhausts pour into are called hot aisles. Typically, hot aisles face air conditioner return ducts.
fire extinguisher class A
common combustibles (wood, clothes, trash)
fire extinguisher class B
flammable liquids (gasoline, oil)
fire extinguisher class C
electrical fires
fire extinguisher class D
heavy metal fires (industrial applications)
fire extinguisher class K
kitchen fires (fats and oils)
wet pipe suprresion system
contain water in the pipes ready to deploy when a fire strikes
dry pipe
do not contain water until a valve opens during a fire alarm
chemical supresent
deprives fire of oxygen
electromagnetic interference (EMI)
is generated by all electronic equipment
interferees with normal operation of other equipment
enables eavesdropping attacks
faraday cages protect against emi, rarely used outside highly sensitive gov
two person rules (integrity and control)
integrity- two people must enter sensitive areas together
control- two people must jointly approve sensitive actions