|
|
1. | The component of physical security that addresses outer-level access control is called what?
|
|
2. | Which of the following categories of fire extinguisher are intended for electrical fires?
|
|
3. | Which of the following will not reduce EMI?
|
|
4. | Which access method breaks a large area into smaller areas that can be monitored individually?
|
|
5. | Which of the following is equivalent to building walls in an office building from a network perspective?
|
|
6. | The process of preventing access to computer systems in a building is called what?
|
|
7. | Which of the following is an example of perimeter security?
|
|
8. | Which of following best describes a motion detector mounted in the corner of a hallway?
|
|
9. | What is the technology that uses a physical characteristic to establish identity called?
|
|
10. | An attack that attempts to use human shortcomings, as opposed to technological methods, to gain access is called what?
|
|
11. | Wireless cells have which of the following characteristics?
|
|
12. | GSM is an example of which technology?
|
|
13. | The process of reducing or eliminating susceptibility to outside interference is called what?
|
|
14. | Which certification is used to indicate minimal electronic emissions?
|
|
15. | Which term defines the process of a WAP losing sensitivity due to RFI?
|
|
16. | Which fire suppression system works best when used in an enclosed area?
|
|
17. | The CBF identifies which aspects of a business?
|
|
18. | Which documents identify the methods used to accomplish a given task?
|
|
19. | Which classification of information designates that information can be released on a restricted basis to outside organizations?
|
|
20. | Which information access control prevents users from writing information down to the lower level of security and prevents users from reading above their level of security?
|
|
Answers
1. | A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility. |
2. | C. Type C fire extinguishers are intended for use in electrical fires. |
3. | B. EMI is caused by electrical devices, such as motors, that generate magnetic fields. Humidity control will not address EMI. |
4. | A. A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones. |
5. | B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is the same as building walls in an office building. |
6. | B. Access control is the primary process of preventing access to physical systems. Answers A and B are part of the access control process. |
7. | A. Perimeter security involves creating a perimeter or outer boundary for the physical space. Video surveillance systems would not be considered a part of perimeter security, but they can be used to enhance physical security monitoring. |
8. | C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building. |
9. | A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity. |
10. | A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment. |
11. | A. Wireless cell systems are primarily line-of-site communication systems. These systems use the microwave band for communications. |
12. | D. Global System for Mobile Communications (GSM) is the newest standard for cellular communications. GSM promises to provide encryption, as well as international usability. |
13. | A. Shielding keeps external electronic signals from disrupting operations. |
14. | D. TEMPEST is the certification given to electronic devices that emit minimal RF emissions. The TEMPEST certification is very difficult to acquire, and it significantly increases the cost of systems. |
15. | A. Receivers tend to desensitize when they are exposed to strong RF signals. This makes the receiver in the WAP seemingly go deaf to normal-strength signals. |
16. | A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire. |
17. | C. The critical business functions are those functions that must be established as soon as possible for the business to succeed. |
18. | C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards. |
19. | D. Limited distribution information can be released to select individuals and organizations, such as financial institutions, governmental agencies, and creditors. |
20. | A. The Bell La-Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and keeps them from writing below their security level. |
|
|