Review Questions

1. 

The component of physical security that addresses outer-level access control is called what?

  1. Perimeter security

  2. Mantraps

  3. Security zones

  4. Locked doors

a. the first layer of access control is perimeter security. perimetersecurity is intended to delay or deter entrance into a facility.

2. 

Which of the following categories of fire extinguisher are intended for electrical fires?

  1. Type A

  2. Type B

  3. Type C

  4. Type D

c. type c fire extinguishers are intended for use in electrical fires.

3. 

Which of the following will not reduce EMI?

  1. Physical shielding

  2. Humidity control

  3. Physical location

  4. Overhauling worn motors

b. emi is caused by electrical devices, such as motors, that generatemagnetic fields. humidity control will not address emi.

4. 

Which access method breaks a large area into smaller areas that can be monitored individually?

  1. Zone

  2. Partition

  3. Perimeter

  4. Floor

a. a security zone is a smaller part of a larger area. security zones canbe monitored individually if needed. answers b, c, and d are examplesof security zones.

5. 

Which of the following is equivalent to building walls in an office building from a network perspective?

  1. Perimeter security

  2. Partitioning

  3. Security zones

  4. IDS systems

b. partitioning is the process of breaking a network into smallercomponents that can each be individually protected. this is the sameas building walls in an office building.

6. 

The process of preventing access to computer systems in a building is called what?

  1. Perimeter security

  2. Access control

  3. Security zones

  4. IDS systems

b. access control is the primary process of preventing access tophysical systems. answers a and b are part of the access control process.

7. 

Which of the following is an example of perimeter security?

  1. Chain link fence

  2. Video camera

  3. Elevator

  4. Locked computer room

a. perimeter security involves creating a perimeter or outer boundaryfor the physical space. video surveillance systems would not beconsidered a part of perimeter security, but they can be used to enhancephysical security monitoring.

8. 

Which of following best describes a motion detector mounted in the corner of a hallway?

  1. Perimeter security

  2. Partitioning

  3. Security zones

  4. IDS system

c. a security zone is an area that is a smaller component of the entirefacility. security zones allow intrusions to be detected in specificparts of the building.

9. 

What is the technology that uses a physical characteristic to establish identity called?

  1. Biometrics

  2. Surveillance

  3. Smart card

  4. CHAP authenticator

a. biometrics is a technology that uses personal characteristics, such asa retinal pattern or fingerprint, to establish identity.

10. 

An attack that attempts to use human shortcomings, as opposed to technological methods, to gain access is called what?

  1. Social engineering

  2. IDS system

  3. Perimeter security

  4. Biometrics

a. social engineering uses the inherent trust in the human species, asopposed to technology, to gain access to your environment.

11. 

Wireless cells have which of the following characteristics?

  1. Line-of-site communications

  2. Automatic position location

  3. High-power portable devices

  4. High levels of security

a. wireless cell systems are primarily line-of-site communication systems. these systems use the microwave band for communications.

12. 

GSM is an example of which technology?

  1. Perimeter security

  2. Surveillance system

  3. Security zones

  4. Cell technology

d. global system for mobile communications (gsm) is the neweststandard for cellular communications. gsm promises to provideencryption, as well as international usability.

13. 

The process of reducing or eliminating susceptibility to outside interference is called what?

  1. Shielding

  2. EMI

  3. TEMPEST

  4. Desensitization

a. shielding keeps external electronic signals from disruptingoperations.

14. 

Which certification is used to indicate minimal electronic emissions?

  1. EMI

  2. RFI

  3. CC EAL 4

  4. TEMPEST

d. tempest is the certification given to electronic devices that emitminimal rf emissions. the tempest certification is very difficult toacquire, and it significantly increases the cost of systems.

15. 

Which term defines the process of a WAP losing sensitivity due to RFI?

  1. RFI desensitization

  2. EMI pickup

  3. Access control

  4. TEMPEST

a. receivers tend to desensitize when they are exposed to strongrf signals. this makes the receiver in the wap seemingly go deafto normal-strength signals.

16. 

Which fire suppression system works best when used in an enclosed area?

  1. Gas-based

  2. Water-based

  3. Fixed system

  4. Overhead sprinklers

a. gas-based systems work by displacing the air around a fire. thiseliminates one of the three necessary components of a fire.

17. 

The CBF identifies which aspects of a business?

  1. Access control

  2. Critical access points

  3. Essential business functions

  4. BIA

c. the critical business functions are those functions that must beestablished as soon as possible for the business to succeed.

18. 

Which documents identify the methods used to accomplish a given task?

  1. Policy

  2. Standard

  3. Guidelines

  4. BIA

c. guidelines help clarify processes to maintain standards. guidelinestend to be less formal than policies or standards.

19. 

Which classification of information designates that information can be released on a restricted basis to outside organizations?

  1. Private information

  2. Full distribution

  3. Restricted information

  4. Limited distribution

d. limited distribution information can be released to select individuals and organizations, such as financial institutions, governmentalagencies, and creditors.

20. 

Which information access control prevents users from writing information down to the lower level of security and prevents users from reading above their level of security?

  1. Bell La-Padula model

  2. Biba model

  3. Clark-Wilson model

  4. Noninterference model

a. the bell la-padula model is intended to protect confidentialityof information. this is accomplished by prohibiting users fromreading above their security level and keeps them from writing belowtheir security level.

Answers

1. 

A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.

2. 

C. Type C fire extinguishers are intended for use in electrical fires.

3. 

B. EMI is caused by electrical devices, such as motors, that generate magnetic fields. Humidity control will not address EMI.

4. 

A. A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones.

5. 

B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is the same as building walls in an office building.

6. 

B. Access control is the primary process of preventing access to physical systems. Answers A and B are part of the access control process.

7. 

A. Perimeter security involves creating a perimeter or outer boundary for the physical space. Video surveillance systems would not be considered a part of perimeter security, but they can be used to enhance physical security monitoring.

8. 

C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.

9. 

A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.

10. 

A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

11. 

A. Wireless cell systems are primarily line-of-site communication systems. These systems use the microwave band for communications.

12. 

D. Global System for Mobile Communications (GSM) is the newest standard for cellular communications. GSM promises to provide encryption, as well as international usability.

13. 

A. Shielding keeps external electronic signals from disrupting operations.

14. 

D. TEMPEST is the certification given to electronic devices that emit minimal RF emissions. The TEMPEST certification is very difficult to acquire, and it significantly increases the cost of systems.

15. 

A. Receivers tend to desensitize when they are exposed to strong RF signals. This makes the receiver in the WAP seemingly go deaf to normal-strength signals.

16. 

A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire.

17. 

C. The critical business functions are those functions that must be established as soon as possible for the business to succeed.

18. 

C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards.

19. 

D. Limited distribution information can be released to select individuals and organizations, such as financial institutions, governmental agencies, and creditors.

20. 

A. The Bell La-Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and keeps them from writing below their security level.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net