• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/76

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

76 Cards in this Set

  • Front
  • Back
Lawrence, your lab manager, is preparing to buy all the equipment that has been budgeted for next year. While reviewing the specifications for several pieces of equipment, he notices that each device has a Mean Time To Repair (MTTR) rating. He asks you what this means. Which of the following is the best response?
A. The MTTR is used to determine the expected time before the repair can be completed. Higher numbers are better.
B. The MTTR is used to determine the expected time before the repair can be completed. Lower numbers are better.
C. The MTTR is used to determine the expected time between failures. Higher numbers are better.
D. The MTTR is used to determine the expected time between failures. Lower numbers are better.
Answer: B. Mean Time To Repair is a value used to calculate the average time to bring a device back up to operating standards. Lower numbers mean reduced downtime. Answers C and D describe Mean Time Before Failures (MTBF) and do not describe MTTR.
Which of the following would you be least likely to find in a data center?
A.Dry pipe fire control
B.Smoke detectors
C.Drop ceilings
D.Surge protection
Answer: C. Drop ceilings (plenum space) should not be used in data centers or areas that are adjacent to server rooms. Although these are convenient for hiding cables, the better location is under the raised floor. Drop ceilings offer the intruder a potential path over the wall and into the data center if the wall does not run all the way to the roof. This gives potential intruders easy access. All the other items are recommended for server rooms. Dry pipe fire control offers the potential for water but also provides adequate time to turn off or power down electronics. Smoke detectors are a must for all areas. Surge protection can be used to protect expensive equipment.
You have been asked to serve as a consultant on the design of a new facility. Which of the following is the best location for the server room?
A. Near the outside of the building
B. Near the center of the building
C. In an area that has plenty of traffic so that equipment can be observed by other employees and guests
D. In an area that offers easy access
Answer: B. The best location for a server room is near the center of the building. This location is more secure from natural disasters and helps protect against intruders. This type of configuration requires the intruder to pass multiple employees and possibly checkpoints before reaching the server room. If employees have been properly educated, they will ask what the unauthorized person is doing in the area. The theory of layered security applies to physical security just as much as it does to the other domains!
A closed-circuit TV (CCTV) system has been installed to monitor a bank’s ATM. The lighting has been adjusted to prevent dark areas, and the depth of field and degree of focus are appropriate for proper monitoring. However, the guard has asked if it would be possible to provide greater width to the area being monitored to permit a subject to be captured for a longer stretch of time. Which adjustment is needed?
A. Decrease the focal length
B. Increase the focal length
C. Decrease the iris
D. Increase the iris
Answer: A. The focal length adjusts the breadth of view. A shorter focal length permits a wide-angle view, and a long focal length provides a telephoto view. Therefore, answer B is incorrect. In real life the organization may opt for a zoom lens that permits the guard to redirect the field of view as necessary. Answers C and D are incorrect because the iris controls the amount of light the camera receives and needs to be larger as the amount of light available decreases.
When you’re choosing the physical location for a new facility, which of the following should you not avoid?
A. Airport flight paths
B. Chemical refineries
C. Railway freight lines
D. Hospitals
Answer: D. Any time you start building from scratch, you should consider the surroundings. Areas that are close to airline flight paths, freight lines, or chemical plants may be subject to explosions or crashes. Answer D is correct because having a hospital nearby can be considered an asset. This allows the company to quickly get help to anyone who gets injured.
Which one of the following is not one of the three main types of fire detection systems?
A. Heat-sensing
B. Flame-sensing
C. CO2-sensing
D. Smoke-sensing
Answer: C. CO2 sensing is not a valid type of fire detection. The three categories of fire detection systems are heat sensing, flame sensing, and smoke sensing. According to OSHA standard 1910.164, the employer is responsible for ensuring that the number, spacing, and location of fire detectors are based on design data obtained from field experience, tests, engineering surveys, the manufacturer’s recommendations, or a recognized testing laboratory listing.
Above what concentration is halon considered toxic when inhaled?
A. 5%
B. 6%
C. 10%
D. 15%
Answer: C. If halon is deployed in concentrations of greater than 10% and in temperatures of 900 degrees or more, it degrades into hydrogen fluoride, hydrogen bromide, and bromine. This toxic compound is not something that people should be breathing. Halon has also been discovered to be three to ten times more damaging to the ozone layer than CFCs.
What height of fence is required to deter determined intruders?
A. 4 feet
B. 5 feet
C. 8 feet
D. 6 feet
Answer: C. Fences 3 to 4 feet high prevent only the casual intruder. Six-foot-high fences are difficult to climb. Critical assets should be physically protected with a fence that is 8 feet high. A three-strand barbed-wire topping is an added effective security measure. If you are trying to keep out the bad guys, you should point the razor wire topping out. If you are really concerned about who’s hanging around the perimeter of your facility, you may consider installing a perimeter intrusion and detection assessment system (PIDAS). This special fencing system has sensors so that it can detect intruders.
Superior Solutions, Inc. has acquired a contract for the upgrade of a local manufacturer’s fire suppression system. The client wants to find suitable replacements for its halon fire suppression system. Which of the following is not a suitable replacement?
A. Argon
B. Hydrogen bromide
C. Inergen
D. CEA-308
Answer: B. Argon, Inergen, low-pressure water mists, and CEA-308 are some of the acceptable replacements for halon. Halon has been phased out because it acts as an ozone-depleting substance when released into the atmosphere. Hydrogen bromide is a byproduct of halon and is considered toxic.
You have been asked to review the design of your organization’s new data center. The proposed data center will be unmanned and typically will not have anyone working inside. With this in mind, which of the following fire suppression methods works by removing the oxygen element?
A. Soda acid
B. CO2
C. Water
D. NO2
Answer: B. CO2 works by removing the oxygen from a fire. Soda acid works by removing the fuel element of a fire. Water works by reducing the temperature of a fire. Answer D, nitrous oxide, does not reduce a fire.
You have been asked to sit in on a meeting with the design team working on the new security data center. Because this facility will have extremely high security, you are concerned about having the appropriate type of fence in place. There will be limited access to this facility, and Class IV gates will be used. What is the correct specification for this perimeter barrier?
A. 2-inch mesh, 9 gauge
B. 3/8-inch mesh, 11 gauge
C. 1-inch mesh, 9 gauge
D. 2-inch mesh, 6 gauge
Answer: B. Fences are one of the first lines of defenses and as such should be of the right design to protect the physical facility. A 3/8-inch mesh, 11-gauge mesh is the specification for an extremely high-security fence. Answer A specifies a normal fence design. Answer C specifies a very high-security fence design, and answer D specifies a greater-than-normal fence design.
Which of the following is a major drawback of the decision to use security guards as a form of physical deterrent?
A. Schedule
B. Salary and benefits
C. Liability
D. Culpability
Answer: B. One major drawback of employing guards as a physical security deterrent is the cost of salaries. All other answers are incorrect. Liability is addressed by the fact that security guards typically are bonded and have had to pass state board licensing requirements. Culpability simply means that the guard is deserving of blame.
You have been asked to create the new company policy on emergency response and training. You want to make sure the policy defines how employees are trained to deal with fires. Which of the following is the best way to carry out emergency fire drills?
A. Fire drills should be timed to correspond with company breaks.
B. Fire drills should be a scheduled event that all employees have been told about.
C Fire drills should be a random event that the employees are unaware of before the event.
D. Fire drills are an unnecessary event that cuts into employee work time, thereby reducing productivity.
Answer: C. Fire drills should be a random event that the employees are unaware of before the drill. Fire drills should not be scheduled, because that defeats the purpose. Fires or natural disasters are not scheduled events. Finally, productivity is not the driving force; rather, it should be employee safety. Employees should have a designated area to go to that is outside the facility in a safe zone. Supervisors or others should be in charge of the safe zones, where there can be an employee count to ensure that everyone is present and accounted for. After the drill, there should be a single point of reentry, and employees should have their IDs checked before returning to work.
Which of the following replacements for halon has been recommended by the EPA?
A. Argon
B. FM-200
C. Inergen
D. FM-300
Answer: B. The EPA considers FM-200 the replacement of choice for halon systems. FM-200 has been adopted by the majority of the world’s fire protection companies and has been installed in tens of thousands of systems across the globe. It is similar to halon but does not affect the ozone layer. Argon and Inergen will work but are not as effective. FM-300 does not exist.
You have been put in charge of the new semiconductor facility, and your boss is concerned about ESD. To protect sensitive equipment from ESD damage, the humidity should be kept at what level?
A. 10 to 20%
B. 20 to 40%
C. 40 to 60%
D. 60 to 80%
Answer: C. In home environments, ESD (electrostatic discharge) may be an annoyance. In the workplace, its results can be much more severe. ESD can damage or destroy sensitive electronic components, attract contaminants, and cause products to stick together. American National Standards Institute (ANSI) specifications recommend a 40 to 60% humidity range for the prevention of ESD. Humidity above 60% is uncomfortable for people, and below 40% increases the risk of static generation. Individuals in charge of the environment should consider equipping their areas with active humidity monitoring equipment to ensure that values stay within the required range.
You have been asked to secure the operations of a South American electronics production plant. Due to rising energy prices, this small country has been plagued with power problems over the last several years. One major problem has been the fluctuation of power to greater-than-normal levels. Which of the following best describes this event?
A. Faults and blackouts
B. Spikes and surges
C. Sags and brownouts
D. Noise and EMI
Answer: B. A power excess can quickly damage sensitive electronic equipment. The best way to guard against this type of problem is through the use of surge protectors. Brownouts occur when power companies experience an increasingly high demand for power, and blackouts are associated with power loss. EMI is unwanted electrical signals that produce undesirable effects and otherwise disrupt the control system circuits. Electrical noise can cause interference.
You have been placed in charge of a small room full of servers. Which of the following is the best protection against brownouts and temporary power loss?
A. RAID
B. Surge protectors
C. UPS
D. Voltage regulators
Answer: C. A UPS (uninterruptible power supply) can be used to provide power to critical equipment during short power outages. Surge protectors and voltage regulators help condition the power to ensure that it is clean and smooth. RAID is used for disk drive fault tolerance.
Your manager wants to know which of the following you, as a CISSP, would rank as the item of highest priority. How should you answer?
A. Duty to the ISC2 code of ethics
B. Duty to protect company assets
C. Duty to company policy
D. Duty to public safety
Answer: D. Although the other items on the list are important, the protection of human life makes duty to public safety the number-one priority of the CISSP.
Which of the following is the specification for halon that can be used as a gas agent?
A. Halon 2800
B. Halon 1625
C. Halon 1311
D. Halon 1301
Answer: D. Halon can be found in two types. Halon 1211 is used in portable extinguishers. Halon 1301 is a gas agent used in fixed flooding systems.
What class of fire suppression should be used against chemical or grease fires?
A. Class A
B. Class B
C. Class C
D. Class D
Answer: D. Class D fire suppression should be used against grease or chemical fires. The other answers are wrong because Class A corresponds to common combustibles, Class B is for burnable fuels, and Class C is for electrical fires.
Which of the following is classified as a Class II gate?
A. Commercial
B. Industrial
C. Residential
D. Restricted access
Answer: A. A Class II gate is designed for commercial use. Answers B, C, and D are incorrect because residential gates are Class I, industrial gates are Class III, and restricted access are Class IV.
Which of the following heat-activated fire detection systems provides the fastest warning time?
A. Fixed temperature
B. Rate of rise
C. Photoelectric
D. Piezoelectric
Answer: B. The two valid types of heat-activated fire detection systems are fixed temperature and rate of rise. Rate of rise offers the best response time. However, remember that these systems result in more false-positive alarms.
What is the absolute first requirement of security?
A. Implementation of CPTED
B. Mitigation of damage
C. Protecting assets
D. Protecting people
Answer: D. The absolute first requirement of a CISSP is protecting people. Answers A, B, and C are important, but a CISSP’s first goal is always people’s safety and welfare.
Because of an upturn in business, your company has started running a second shift. Some of the line workers complain to your boss that it is very dark in the parking lot. He advises you to investigate the purchase and installation of new exterior lighting. What level of illumination does NIST recommend for lighting critical areas?
A. 2 feet of candlepower at a height of 8 feet
B. 2 feet of candlepower at a height of 10 feet
C. 4 feet of candlepower at a height of 8 feet
D. 4 feet of candlepower at a height of 6 feet
Answer: A. Although lighting does add to the security of a facility, it is best when applied with other types of deterrents. The National Institute of Standards and Technology (NIST) states that the standard for perimeter protection using lighting is an illumination of 2 feet of candlepower at a height of 8 feet.
Why is halon no longer being produced or sold?
A. It has been found to cause cancer in laboratory animals.
B. The base components in halon are considered rare. This has resulted in a massive price increase. Other options are now much cheaper.
C. Its use was banned because it was an ozone-depleting agent.
D. Its use was banned because it is considered a dual-use technology that can be used to produce weapons.
Answer: C. Halon has been found to destroy the ozone layer. Because of this, it was banned, and an international agreement was signed in 1994. As long as exposure is low, halon is considered harmless to humans.
Which of the following fits in the category of power degradation?
A. Blackouts
B. Spikes
C. Brownouts
D. Surge
Answer: C. A power degradation such as a brownout occurs when power companies experience an increasingly high demand for power. Spikes are associated with power excesses. Blackouts are associated with power loss, and surges are associated with excessive power spikes.
What is a critical part of physical security?
A. Guard dogs
B. Layered access control
C. Fences
D. CCTV
Answer: B. Access control is the key to physical security, and it works best when deployed in layers. Each layer acts as a physical barrier. At a minimum, a system should have three physical barriers: entrance to the building, entrance to the computer center, and entrance to the computer room itself. These barriers can include guards, biometric access control, locked doors, CCTV, and alarm systems.
Which of the following statements about CCTV is not true?
A. CCTV is a good example of a deterrent system.
B. CCTV is a good example of an automated intrusion-detection system.
C. CCTV is effective at deterring security violations.
D. CCTV is a good example of a detection system.
Answer: B. Although CCTV (closed-circuit TV) systems are good deterrent and detection systems, they are not automatic. CCTV requires individuals to watch the captured video, detect the malicious activity, and respond accordingly.
Which of the following best describes piggybacking?
A. The act of stealing someone’s access card to gain access later
B. The act of watching over someone’s shoulder to steal a password for later use
C. The act of following someone through a secured door to gain unauthorized access
D. The act of spoofing someone’s identity to gain unauthorized access
Answer: C. Piggybacking is the act of following someone through a secured door without being identified to obtain unauthorized access. The act of watching over someone’s shoulder and stealing a password for later use is called shoulder surfing. To spoof someone’s identity is to pretend to be that person.
What class of fire suppression should be used against electrical fires, such as computers or electronic equipment?
A. Class E
B. Class D
C. Class C
D. Class B
Answer: C. Class C fire suppression should be used against electrical fires. CO2 and halon are recommended suppression methods. Class A corresponds to common combustibles, Class B is for burnable fuels, and Class D is for chemical and grease fires.
What is one of the largest drawbacks of using guard dogs as a physical security control?
A. Cost
B. Liability
C. Investment
D. Training
Answer: B. Perhaps you’ve heard the phrase “junkyard dog.” In that type of setting dogs are highly effective, because in that type of environment, no one should be in the facility during off-hours. However, dogs lack the skill to differentiate between authorized and unauthorized personnel, so they can be a legal liability that results in criminal charges or a civil lawsuit.
Controlled humidity is important in preventing ESD. What level of static discharge is the approximate amount required to destroy data on hard drives?
A. 100 static volts
B. 500 static volts
C. 1,000 static volts
D. 1,500 static volts
Answer: D. In low-humidity environments, it’s not impossible to create static charges in excess of 20,000 volts. It takes only about 1,500 static volts to damage a hard drive or cause destruction of data. Sensitive electronic components can be damaged by less than 100 static volts.
While you are consulting for TrayTec, Inc., an employee approaches you with a question. Which of the following would you say is not a reason to put a raised floor in the server room?
A. For increased airflow
B. To allow easy access to cables
C. To prevent damage to equipment in case of a flood or water leak
D. To isolate equipment from harmful vibrations
Answer: D. Using a raised floor provides many benefits, including increased airflow, easy access to cables, prevention of flooding damage to computers, and easier reconfiguration. Vibration is not a critical concern.
Which of the following water suppression systems contains compressed air?
A. Wet pipe

B. Dry pipe
C. Deluge system
D. Preaction system
Answer: B. Dry pipe systems contain compressed air instead of water. The pipes are hooked up to a storage tank or water main. The system uses a valve that is sensitive to pressure. When the system is activated, the sprinkler heads open and force the compressed air to rush forward. This results in a drop in pipe pressure, which signals the pressure-sensitive valve connecting to the water supply.
Doors with automatic locks can serve as a good form of physical protection. These doors can be configured to respond to power outages in either a fail-safe or fail-soft condition. Which of the following describes fail-safe?
A. If a loss of power occurs, the door opens automatically.
B. If a loss of power occurs, the door remains locked.
C. In case of a power outage, the door has a BPS and continues to operate normally.
D. In case of a power outage, the door will lock but can be opened with a passkey.
Answer: B. If a door is considered fail-safe, it remains locked during a power outage. If this type of door is being used, people’s safety must take precedence. This means that the door should be equipped with a panic bar or other mechanism that allows individuals to safely exit the building during a power outage or emergency. All other answers are incorrect because they do not adequately describe the operation of fail-safe locks.
What is a special type of identification device that does not require action by users because they only need to pass close to it?
A. Biometric systems
B. Access control badges
C. Proximity badges
D. CCTV
Answer: C. Proximity identification can be used to activate doors or locks or to identify employees. These systems only require users to pass in proximity to the sensor or sensing system. All other answers are incorrect because they do not describe a proximity system.
What type of attack relies on the trusting nature of employees and the art of deception?
A. Hijacking
B. Social engineering
C. Spoofing
D. Deception
Answer: B. Social engineering is a type of attack in which intruders may attempt to gain physical access to your facility by exploiting people’s generally trusting nature. A social engineering attack may come from someone posing as a vendor or as someone coming to the facility to repair a problem. Regardless of how the person appears, social engineering can be hard to detect. Social engineering can also be used to gain logical access by means of tricking a user to giving out some type of sensitive information. Hijacking is a computer-based attack in which someone hijacks a legitimate session. Spoofing is a computer-based attack in which someone’s IP or MAC address is stolen. Spoofing can also entail spoofed e-mails and falsified network-level attacks such as spoofed SYN floods. Deception is part of social engineering but by itself does not adequately describe the attack.
Which of the following is not a valid fire suppression system?
A. Wet pipe
B. Dry pipe
C. Reaction system
D. Deluge system
Answer: C. The four primary fire suppression systems are wet pipe, dry pipe, deluge system, and preaction system.
You have been hired to consult for TrayTec, a small manufacturing firm. This firm is preparing to construct a data center. What is the recommended temperature for rooms containing computer equipment?
A. 50 to 65 degrees Fahrenheit

B. 60 to 75 degrees Fahrenheit
C. 65 to 85 degrees Fahrenheit
D. 70 to 85 degrees Fahrenheit
Answer: B. The recommended temperature for rooms containing computer equipment is 60 to 75 degrees Fahrenheit (15 to 23 degrees Celsius). Temperatures of 80 to 85 degrees Fahrenheit are not considered catastrophic; however, higher temperatures can result in lowering the life expectancy of equipment.
What class of fire suppression should be used against common fires such as paper and computer printouts?
A. Class A
B. Class B
C. Class C
D. Class D
Answer: A. Class A fire suppression should be used to fight common fires. The extinguishing method of choice is water or soda acid. Class B is for burnable fuels and oils, Class C is for electrical fires, and Class D is for chemical fires.
Which of the following statements about server rooms is incorrect?
A. Server rooms should have barriers on all six sides.
B. Server rooms should be kept at cold temperatures.
C. Server rooms should be accessible to system administrators.
D. Server rooms should not be shared with IT workers.
Answer: C. Server rooms should be inaccessible to system administrators, because all administrative functions can be done remotely. Even if your employees are fully authorized, they should not share space with the server room where critical equipment is located. Noise and cold temperatures are not conducive to the working environment. Access should be controlled for even authorized IT workers, except when they have specific reasons to access equipment.
Which of the following would be considered a gas-discharge fire extinguishing system?
A. Wet pipe
B. Dry pipe
C. Flame-activated sprinkler
D. Handheld CO2 fire extinguisher
Answer: D. A handheld CO2 fire extinguisher is considered a gas-discharge fire extinguishing system. Wet-pipe systems are filled with water. Dry-pipe systems contain compressed air until fire suppression systems are triggered, and then the pipe is filled with water. Flame-activated sprinklers trigger when a predefined temperature is reached.
What height of fence is required to deter casual intruders?
A. 8 feet
B. 6 feet
C. 4 feet
D. 12 feet
Answer: C. Fences 3 to 4 feet high prevent only casual intruders. Six-foot-high fences become difficult to climb. Critical assets should be physically protected with a fence that is 8 feet high with a three-strand topping of razor wire.
Which of the following is not a valid intrusion detection system?
A. Wave pattern
B. Proximity detection
C. Geometric system
D. Acoustical system
Answer: C. Some of the technologies that can be used to detect intruders are wave pattern, which bounces various frequency waves around a room while verifying that the pattern is undisturbed; proximity detection, which works by detecting changes in the magnetic field; and acoustical systems, which are sensitive to changes in sound and vibration.
Which of the following fire suppression systems works by removing the fuel element?
A. Soda acid
B. CO2
C. Water
D. Oxygen
Answer: A. Soda acid works by removing the fuel element of a fire. CO2 works by removing the oxygen from a fire. Water works by reducing the temperature of a fire. Oxygen would not reduce a fire, but would actually cause it to grow larger.
Which of the following is the best HVAC choice for an organization to use in case of fire and smoke?
A. Positive pressurization
B. Sealed windows
C. Negative pressurization
D. Neutral pressurization
Answer: A. Positive pressurization is an HVAC (heating, ventilation, and air-conditioning) design in which positive pressure is maintained in the system, so as a door or window is opened, air is forced out. This protects employees in case of a fire by forcing smoke outside, away from the employees. This positive pressurization also helps keep contaminants out of the building when doors are opened. The air rushes out, rather than in carrying pollen and other substances.
Which intrusion detection system can sense changes in vibration and noise level in an area?
A. Wave pattern
B. Proximity detection
C. Passive infrared system
D. Acoustical system
Answer: D. Acoustical systems are sensitive to changes, sound, and vibration. Proximity detection works by detecting changes to the magnetic field. Passive infrared systems look for the rise of heat waves. Wave pattern bounces various frequency waves around a room while verifying that the pattern is undisturbed.
Doors with automatic locks can serve as a good form of physical protection. These doors can be configured to respond to power outages in either a fail-safe or fail-soft condition. Which of the following describes fail-soft?
A. If a loss of power occurs, the door remains unlocked.

B. If a loss of power occurs, the door opens automatically.
C. In case of a power outage, the door has a BPS and continues to operate normally.
D. In case of a power outage, the door will unlock, but it can be secured with a special key.
Answer: A. If a door is considered fail-soft, it remains unlocked during a power outage. All other answers are incorrect because they do not adequately describe the operation of fail-soft locks.
Which intrusion detection system can sense changes in heat waves in an area?
A. Wave pattern
B. Proximity detection
C. Passive infrared system
D. Acoustical system
Answer: C. Passive infrared systems look for the rise of heat waves. Acoustical systems are sensitive to changes in sound and vibration. Proximity detection works by detecting changes in the magnetic field. Wave pattern bounces various frequency waves around a room while verifying that the pattern is undisturbed.
What class of fire suppression should be used against oil or gas fires?
A. Class A

B. Class B
C. Class C
D. Class D
Answer: B. Class B fire suppression should be used against any type of burnable fuel. The recommended suppressants include CO2, soda acid, and halon. The other answers are incorrect because Class A corresponds to common combustibles, Class C is for electrical fires, and Class D is for chemical and grease fires.
Robert, your lab manager, is preparing to buy all the equipment that has been budgeted for next year. While reviewing the specifications for several pieces of equipment, he notices that each device has an MTBF rating. He asks if you can explain what this means. Which of the following is the best response?
A. The MTBF is used to determine the expected average time between failures.

B. The MTBF is used to determine the expected time before a repair is needed.
C. The MTBF is just a ratio of MTTR used to evaluate product repair time.
D. The MTBF is used to determine how many backup devices are needed.
Answer: A. MTBF (Mean Time Between Failures) is the average amount of time between device breakdowns. Higher numbers mean that the devices last longer.
Which of the following fits into the category of a power loss?
A. Blackouts

B. Spikes and surges
C. Brownouts
D. Surges
Answer: A. A power outage, which can be called a blackout, is when power is lost for an extended time. The largest blackout ever to occur in the U.S. happened on August 14, 2003. It affected nearly 60 million people. A brownout occurs when power companies experience an increasingly high demand for power. Spikes are associated with power excesses.
Which of the following physical security practices is the best security solution implementation?
A. Placing a halon fire extinguisher system in the new cafeteria.

B. Erecting parking lot lighting on poles in the center of periodic islands, on which trees and bushes have been planted for beautification.
C. Installing emergency exit fire doors that fail close in the event of a power failure and that have push panic bars for emergency release.
D. Placing outside windows in a data center looking at the parking lot so that employees can see their vehicles.
Answer: C. When possible, you want emergency doors to fail open in the case of a power failure. However, when fail-open is not appropriate, it is critical that the doors have a push panic bar that permits people to exit in the event of an emergency. Not only are halon fire systems no longer available for deployment, but they would be inappropriate for a cafeteria. On the customer side of a cafeteria, water should be deployed as the suppression agent. On the kitchen side of a cafeteria, wet chemicals are used. Trees should not be planted under the poles that provide safety lighting, because their foliage will block the light. Data centers should be located in the center of an organization’s building, where outside windows are unavailable and inappropriate.
Permitting your data center to be too warm can cause what problem?
A. The equipment turns off.
B. The equipment works slower.
C. The computer parts get corroded.
D. Static electricity is introduced.
Answer: A. Too hot of an environment can cause the equipment to overheat and turn off. Too cold a temperature can cause the performance speed to drop. Corrosion is introduced when there is too much moisture in the air, and static electricity is introduced when the humidity is too low.
Halon extinguishers contained a gas that interrupted the chemical reaction of a fire. They were useful and popular for fighting electrical fires that required a nonconductive and noncorrosive control agent. However, halon was found to be damaging to our environment and was removed from the list of acceptable agents. What document first limited the use of halon?
A. Clean Air Act

B. Halon Emissions Reduction Rule
C. Environmental Protection Act of 1990
D. Montreal Protocol
Answer: C. The Montreal Protocol of 1987 was an international agreement to phase out all substances that damaged the ozone layer as soon as possible. Therefore, the Montreal Protocol initiated the effort to reduce the use of halon, and it led to the ban of halon. The UK’s Environmental Protection Act of 1990 declared that it was illegal to “treat, keep or dispose of controlled waste in a manner likely to cause pollution to the environment.” The Halon Emission Reduction Rule banned the manufacturing of halon and specified methods for proper disposal. The Clean Air Act of 1990, incorporated in U.S. Code, provides legislation to curb the use of materials that are harmful to the environment.
Which of the following lock types would you rate as most secure when installed properly?
A. Wafer lock
B. Combination lock
C. Pin lock
D. Cipher lock
Answer: D. Of these locks, a cipher lock is considered the most secure. A wafer lock is the least secure; it is the type found on filing cabinets. Pin locks or tumbler locks can be defeated with bump keys, and combination locks can be defeated with a cut aluminum can that is wrapped around the locking bolt. Electronic combination locks are more secure, but without further qualification, “combination locks” refers to the style used on lockers.
What is the benefit of a contingency plan?
A. Perimeter defense
B. Diversity of controls
C. Defense in layers
D. Facility access controls
Answer: C. A contingency plan protects you when a primary control fails; it represents the concept of multiple layers in your defense. Perimeter defense identifies your first line of defense and is a primary control, not a contingency plan. Diversity of controls refers to having a mixture of a type of control (primary or contingency) so that understanding one instance of a control doesn’t guarantee knowledge of the next instance. Facility access controls are your physical perimeter’s defense.
Your company is about to begin the parallel test of its latest application, which will then be deployed in house. The company has set up temporary space in a secure room that backs up to the data center. When the equipment in the new lab is powered up, what power anomaly might computers in the data center experience?
A. Surge
B. Brownout
C. Noise
D. Sag
Answer: D. Devices that draw a large amount of current can cause an “in-rush current” that causes a sag in surrounding equipment. A surge is a prolonged period of increased voltage, a brownout is a prolonged period of decreased voltage, and noise is interference—a disruption often caused by RFI or EMI.
Which of the following describes best practices for a company’s evacuation and emergency response plans?
A. Once a year, surprise emergency drills should be held to see if managers understand corporate policy. Employees’ demonstrated knowledge of procedures should be discussed in their yearly performance evaluations.
B. Employees should be provided with written descriptions of emergency actions as part of their corporate indoctrination and should be required to keep the documents in a ready state at their workstations.
C. Periodic refresher training should be provided to all employees. Planned exercises with realistic predetermined scenarios should be executed, where managers account for personnel as part of any evacuations.
D. Emergency plans should be posted in all work spaces and lounge areas throughout a corporation. All employees should have a way to submit suggestions for improving the plan.
Answer: C. People need to be focused on the emergency they are practicing a response to in order for that response to become an automatic function in case of a real emergency. The practice should be carried out to completion, including the requirement that managers account for the proper evacuation of all personnel by accounting for those personnel after the rehearsed evacuation. It is also important to look out for any piggybackers going into the facility after the exercise.
You have been asked to examine the placement of lighting to be used for perimeter security. The organization is worried about how lighting can be used to detect individuals who are at the fence line of a high-security facility, attempting to gain access to the facility. Which of the following would be the best approach?
A. Place the lighting on the outside of the fence, away from the facility, evenly spaced on poles 5 feet high.
B. Place the lighting on the inside of the fence, toward the facility, evenly spaced on poles 8 feet high.
C. Place the lighting evenly spaced above the fence 5 feet high.
D. Place the lighting evenly spaced above the fence 8 feet high.
Answer: D. Answers A, B, and C are incorrect because lighting should be placed over the fence so that trespassers can be easily spotted and their field of view is reduced during an attack. Lighting should not illuminate security guard posts or other similar security elements. Guards should clearly be able to see the attacking individuals.
Warded locks are more secure than pin-and-tumbler locks.
True
False
Answer: False. The two basic types of locks are warded and pin-and-tumbler. Pin-and-tumbler is considered higher security.
A cipher lock is programmable.
True
False
Answer: True. A cipher lock typically are found in the configuration of a keypad. These locks are programmable and do not use keys.
Bump keys are used to bypass cipher locks.
True
False
Answer: False. A bump key is a special key that has been cut to a number nine position and has a small amount of extra material shaved from the front and the shank of the key. When slight pressure is applied and the key is bumped or tapped, the pins are driven upward, giving the attacker access. Bump keys are easy to make and easy to obtain on the Internet.
The facility and the data center should not share a common HVAC system.
True
False
Answer: True. The organization and the data center should have separate HVAC systems that are not interconnected. The HVAC used in the data center should be dedicated, controlled, and monitored.
Data center doors typically are hinged to the outside.
True
False
Answer: False. Data center doors should be hinged to the inside to harden the facility and make removing the doors more difficult.
Control types such as lights are a type of physical deterrent.
True
False
Answer: True. Lights are a good example of a physical deterrent. Well-lighted areas make an attacker worry that he will be seen or detected.
Control types such as an annunciation system are a type of intrusion detection.
True
False
Answer: True. The purpose of annunciation is to give the guard or other individuals early warning of a problem or security breach to allow action to be taken before a situation degrades or further damage occurs.
Wire mesh embedded between two sheets of glass typically is used for a fire break.
True
False
Answer: True. Wire mesh secures the glass and prevents it from losing its integrity. As such, a solid barrier is maintained, and a fire break is provided.
Bollards are used to control the egress and ingress of people.
True
False
Answer: False. Bollards can be concrete or steel. They are used to block vehicular traffic, particularly at entrances and lobbies, or to protect areas from being rammed by speeding cars, trucks, or vans.
CPTED is designed to deny access by means of physical and man-made barriers such as locks and fences.
True
False
Answer: False. Crime Prevention Through Environmental Design (CPTED) is designed to deter criminal behavior. An example is placing the parking lot near an area in which employees sit so that they can see and monitor their cars. Lighting the area at night is another example.
A mantrap is a turnstile and a badge reader.
True
False
Answer: False. A mantrap is a set of two doors and a small room that is designed to hold someone until he or she is fully cleared for access to prevent piggybacking.
Plenum cable is used for environmental reasons.
True
False
Answer: False. Plenum-grade cable is used because it is designed to release less toxic gas in case of a fire so that employees’ health and welfare are maintained.
A magnesium fire is best suppressed with a Class D extinguisher.
True
False
Answer: True. A magnesium fire is considered a Class D fire and would be fought by applying a special dry powder only.
Placing your headlights on low beam when approaching a security checkpoint is an example of glare protection.
True
False
Answer: False. Glare protection requires a properly designed guardhouse with lights facing away from the guards and toward potential attackers. Approaching vehicles turn off their headlights so that the guards at a security checkpoint can clearly see them and their occupants.
Areas of fixed lighting should be observed with a CCTV camera that supports an auto iris lens.
True
False
Answer: False. A CCTV camera that monitors an area of fixed lighting should have a fixed iris lens. An auto iris lens would not be needed, because the lighting is maintained at a constant level.
Match the following power conditions with the proper solution:
A. Blackout: _____
B. Brownout: _____
C. Surge: _____
D. Spike: _____
E. Noise: _____
A. Blackout: 3. Generator
B. Brownout: 4. (UPS) Uninterruptible Power Supply
C. Surge: 5. Surge protector
D. Spike: 5. Surge protector
E. Noise: 2. Power conditioner
F. Clean power: 1. No solution is needed