Chapter 4

9 September 2022
4.7 (114 reviews)
39 test answers

Unlock all answers in this set

Unlock answers (35)
question
You are about to enter your office building through a back entrance. A man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist
question
Which of the following are solutions that address physical security?
answer
Escort visitors at all times Require identification and name badges for all employees
question
Which of the following is not an example of a physical barrier access control mechanism?
answer
One-time passwords
question
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?
answer
Deploy a mantrap
question
Which option is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment while actively preventing re-entrance through the exit portal?
answer
Turnstiles
question
What is the primary benefit of CCTV?
answer
Expand the area visible by security guards
question
You want to use CCTV to increase your physical security. You want the ablity to remotely control the camera position. Which camera type should you choose?
answer
PTZ
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see (in other words, zoom in or out)?
answer
Varifocal
question
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry?
answer
Turnstile Double-entry door
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
Hardened carrier
answer
protected cable distribution
question
biometric authentication
answer
door locks
question
Barricades
answer
Perimeter Barrier
question
Emergency escape plans
answer
safety
question
Alarmed carriers
answer
protected cable distribution
question
anti-passback system
answer
Physical Access Control
question
Emergency lighting
answer
safety
question
Exterior floodlights
answer
Perimeter Barrier
question
Which of the following is the most important thing to do to prevent console access to the router?
answer
Keep the router in a locked room
question
Your company has five salesman who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptop to the desks
question
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice that the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client?
answer
Relocate the switch to the locked server closet Control access to the work area with locking doors and card readers
question
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: β€’ When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area, where the office manager sits. β€’ The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet. β€’ She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media. β€’ You notice the organization's network switch is kept in the server closet. β€’ You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You take the workstation back to your office to work on it. Which security-related recommendations should you make to this client?
answer
Implement a hardware checkout policy
question
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's computer in the finance department. The user was able to copy data containing bank account information and social security numbers. The user then destroyed data be resetting the computer. The department manager was at lunch at the time and had enabled the lock screen to require a password to gain access to the computer. Which additional measure should the manager have taken to prevent data theft?
answer
The computer should have been kept in a physically secure location
question
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet and prevent anyone from reconfiguring the network to set up remote access or backdoor access. Which of the following measures are the best way to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)
answer
Place your networking equipment in a locked cage Place your networking equipment in a room that requires key card entry
question
An attacker is using an eavesdropping technique called Van Eck phreaking on a networking closet. Which of the following describes what the attacker is doing?
answer
Collecting electronic emissions
question
One of the ways attackers can access unencrypted data being transmitted on your network is by collecting electronic emissions that come from your networking closet or Ethernet cables. Which of the following is NOT a good solution to this problem?
answer
Configure all data transmissions to be encrypted
question
Physical security is an obvious requirement for network security, but it is often easy to overlook or forget to plan for it. Which of the following is NOT a benefit of physical security?
answer
Employee passwords are stronger
question
To keep your data center safe, you have done the following: Restricted physical access to employees who strictly need to get in the data center Required employees to enter a password using a pin pad to enter the data center Deployed a Faraday cage to keep sensitive network devices safe from external electrical fields Which of the following measures will NOT improve physical security in the data center?
answer
Implement a checkout policy
question
You walk by the server room and notice that a fire started. What should you do first?
answer
Make sure everyone has cleared the area
question
Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components?
answer
Class C
question
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?
answer
Carbon dioxide (CO2)
question
Which of the following fire extinguisher types poses a safety risk to users in the area?
answer
CO2 Halon
question
What is the recommended humidity level for server rooms?
answer
50%
question
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do?
answer
Add a separate A/C unit in the server room
question
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into the server components and affecting the ability of the network. Which of the following should you implement?
answer
Positive pressure system
question
Which of the following statements about ESD is not correct?
answer
ESD is much more likely to occur when the relative humidity is above 50%
question
Which of the following is the least effective power loss protection for computer systems?
answer
Surge protector
question
Beside protecting a computer from under voltages, a typical UPS also performs which two actions?
answer
Protects from over voltages Conditions the power signal