Which of the following concepts is used to present a facility as unappealing or uninteresting to a potential attacker?
a) gated entrances
b) fencing
c) industrial camouflage
d) barricades
c) industrial camouflage
2
New cards
A(n) ______ contains a circuit or chip that provides authorization of a person’s identity to access certain resources or physical locations.
a) screen filter
b) identification badge
c) token
d) smart card
d) smart card
3
New cards
Which of the following systems provides transmitted signals in a centralized monitoring location through video cameras?
a) 802.11n
b) closed-circuit television (CCTV)
c) biometric authenticators
d) SNMPv3
b) closed-circuit television (CCTV)
4
New cards
______ are physical access control systems used to trap an individual between two sets of interlocking doors.
a) mantraps
b) air-gaps
c) tailgates
d) turnstiles
a) mantraps
5
New cards
When a computer network is designed to be completely isolated from other networks, including the Internet, the network is termed as a(n) _______.
a) mantrap
b) screen filtered network
c) air-gap network
d) protective distribution system
c) air-gap network
6
New cards
A(n) _____ blocks electromagnetic signals and distributes them from the exterior of a cage, and also utilizes temperature control to diminish damage to equipment such as fires.
a) hardwired cage
b) reflective cage
c) absorbent cage
d) Faraday cage
d) Faraday cage
7
New cards
Which of the following controls is typically employed in a server room or data center to ensure humidity and temperature stay relatively consistent?
a) fire control
b) moisture sensors
c) hot and cold aisles
d) none of the above
c) hot and cold aisles
8
New cards
Which of the following threats come from within the organization and can be costly to a business?
a) consumer
b) insider
c) stakeholder
d) shareholder
b) insider
9
New cards
Which of the following facility physical controls is a first layer of defense and is normally installed in the entrance of an organization’s parking lot?
a) security guards
b) screen filters
c) barricades
d) gated entrance
d) gated entrance
10
New cards
Which level of NATO SDIP-27 assumes a hacker is in an organization’s vicinity?
a) A
b) B
c) C
d) D
a) A
11
New cards
A(n) _______ is a facility specifically designed to store and manage large quantities of data.
a) data center
b) mantrap
c) air-gap network
d) segregated network
a) data center
12
New cards
______ is the practice of isolating a network so it is not accessible to unauthorized personnel.
a) physical network segregation
b) telnet
c) transport layer security
d) Faraday cage
a) physical network segregation
13
New cards
Which level of NATO SDIP-27 assumes a hacker is within a twenty-meter radius of an organization’s vicinity?
a) A
b) B
c) C
d) D
b) B
14
New cards
Which of the following refers to a barrier placed around wires to block electromagnetic interference (EMI) from interfering with the signals within the wires?
a) Faraday cage
b) EMI shielding
c) antistatic bag
d) Protected Distribution System (PDS)
b) EMI shielding
15
New cards
Which of the following facility physical control method is often not the most secure control but used as a barrier to prohibit physical entry into a building or its property?
a) alarm
b) gated entrance
c) barricade
d) fencing
d) fencing
16
New cards
Which of the following personnel policies could be utilized as a form of facility physical controls?
a) robot sentries
b) receptionists
c) two-person control
d) all of the above
d) all of the above
17
New cards
Which of the following is a physical barrier to a facility access?
a) bollard
b) data purge
c) screen filter
d) degauss
a) bollard
18
New cards
A(n) ______ uses bars and other forms of obstruction to block an entryway, and only allows one individual to enter at a time.
a) tailgate
b) turnstile
c) mantrap
d) access controller
b) turnstile
19
New cards
A(n) _______ contains an embedded circuit or chip that stores information used to authorize or authenticate a person’s identity and access to resources or physical locations.
a) identification badge
b) personal identity verification
c) smart card
d) token
c) smart card
20
New cards
________ is a National Security Agency (NSA) and North Atlantic Treaty Organization (NATO) certification that counters the act of data obtainment and spying through leaking electromagnetic emanations.
a) TEMPEST
b) TACACS
c) RADIUS
d) Kerberos
a) TEMPEST
21
New cards
_______ is emitted from printers, computers, monitors, microwaves, speakers, and other devices, and is capable of emitting strong enough signals to cause interference, and data loss, and other wireless signals.
a) EMT
b) EMR
c) EMP
d) EMI
b) EMR
22
New cards
Which of the following is *not* true about server rooms and data centers?
a) Hot and cold aisles help control the temperature in a data center or control room.
b) Data centers are considerably larger than server rooms and can be kept on- or off-site of a business.
c) Computing equipment relies on warm temperature, and heat generated by equipment in a server room keeps the equipment running smoothly.
d) Fire is a serious threat to a business’ data
c) Computing equipment relies on warm temperature, and heat generated by equipment in a server room keeps the equipment running smoothly.
23
New cards
Which of the following is *not* a good way to control water in server rooms and other sensitive areas?
a) Maintenance checks when someone notices a problem.
b) Sensors to monitor leaks inside cooling equipment.
c) Sensors underneath pipe junctions to monitor leaks.
d) Water sensors where water would likely puddle.
a) Maintenance checks when someone notices a problem.
24
New cards
Which of the following is the most secure way to destroy paper-based data?