• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
1 CH10
Which component of physical security addresses outer-level access control?
1
A) Perimeter security
B) Mantraps
C) Security zones
D) Locked doors
1 A
The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.
2 CH10
You’ve been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?
2
A) Type A
B) Type B
C) Type C
D) Type D
2 B
Type C fire extinguishers are intended for use in electrical fires.
3 CH10
Which of the following won’t reduce EMI?
3
A) Physical shielding
B) Humidity control
C) Physical location
D) Overhauling worn motors
3 B
Electrical devices, such as motors, that generate magnetic fields cause EMI. Humidity control won’t address EMI.
4 CH10
You’re the administrator for MTS. You’re creating a team that will report to you, and you’re attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
4
A) Zone
B) Partition
C) Perimeter
D) Floor
4 A
A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones.
5 CH10
Which of the following is equivalent to building walls in an office building from a network perspective?
5
A) Perimeter security
B) Partitioning
C) Security zones
D) IDS systems
5 B
Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is analogous to building walls in an office building.
6 CH10
After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
6
A) Perimeter security
B) Access control
C) Security zones
D) IDS systems
6 B
Access control is the primary process of preventing access to physical systems.
7 CH10
Which of the following is an example of perimeter security?
7
A) Chain link fence
B) Video camera
C) Elevator
D) Locked computer room
7 A
Perimeter security involves creating a perimeter or outer boundary for a physical space. Video surveillance systems wouldn’t be considered a part of perimeter security, but they can be used to enhance physical security monitoring.
8 CH10
You’re the leader of the security committee at ACME. After a move to a new facility, you’re installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
8
A) Perimeter security
B) Partitioning
C) Security zone
D) IDS system
8 C
A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.
9 CH10
Which technology uses a physical characteristic to establish identity?
9
A) Biometrics
B) Surveillance
C) Smart card
D) CHAP authenticator
9 A
Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.
10 CH10
The process of reducing or eliminating susceptibility to outside interference is called what?
10
A) Shielding
B) EMI
C) TEMPEST
D) Desensitization
10 A
Shielding keeps external electronic signals from disrupting operations.
11 CH10
You work for an electronics company that has just created a device that emits less RF than any competitor’s product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
11
A) EMI
B) RFI
C) CC EAL 4
D) TEMPEST
11 D
TEMPEST is the certification given to electronic devices that emit minimal RF. The TEMPEST certification is difficult to acquire, and it significantly increases the cost of systems.
12 CH10
Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it’s finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
12
A) Gas based
B) Water based
C) Fixed system
D) Overhead sprinklers
12 A
Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire: oxygen
13 CH10
Type K fire extinguishers are intended for use on cooking oil fires. This type is a subset of which other type of fire extinguisher?
13
A) Type A
B) Type B
C) Type C
D) Type D
13 B
Type K fire extinguishers are a subset of Type B fire extinguishers.
14 CH10
Proximity readers work with which of the following? (Choose all that apply.)
14
A) 15.75 fob card
B) 14.32 surveillance card
C) 13.56 MHZ smart card
D) 125 kHz proximity card
14 C/D
Proximity readers work with 13.56 MHz smart card and 125 kHz proximity cards.
15 CH10
In a hot and cold aisle system, what is the typical method of handling cold air?
15
A) It is pumped in from below raised floor tiles.
B) It is pumped in from above through the ceiling tiles.
C) Only hot air is extracted and cold air is the natural result.
D) Cold air exists in each aisle.
15 A
With hot and cold aisles, cold air is pumped in from below raised floor tiles.
16 CH10
If RF levels become too high, it can cause the receivers in wireless units to become deaf. This process is called:
16
A) Clipping
B) Desensitizing
C) Distorting
D) Crackling
16 B
If RF levels become too high, it can cause the receivers in wireless units to become deaf and is known as desensitizing. This occurs because of the volume of RF energy present.
17 CH10
RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the following?
17
A) Network medium
B) Electrical wiring
C) Radio spectrum
D) Portable media
17 C
RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across a radio spectrum. Motors with defective brushes can generate RFI, as can a number of other devices.
18 CH10
For physical security, what should you do with rack-mounted servers?
18
A) Run a cable from them to a desk.
B) Lock each of them into the cabinet.
C) Install them in safes.
D) Use only Type D, which incorporates its own security.
18 B
Server racks should lock the rack-mounted servers into the cabinets to prevent someone from simply pulling one and walking out the front door with it.
19 CH10
Which of the following is a method of cooling server racks in which hot air and cold are both handled in the server room?
19
A) Hot/cold vessels
B) Hot and cold passages
C) Hot/cold walkways
D) Hot and cold aisles
19 D
Hot and cold aisles is a method of cooling server racks in which hot air and cold are both handled in the server room.
20 CH10
Which of the following is a high-security installation that requires visual identification, as well as authentication, to gain access?
20
A) Mantrap
B) Fencing
C) Proximity reader
D) Hot aisle
20 A
High-security installations use a type of intermediate access control mechanism called a mantrap. Mantraps require visual identification, as well as authentication, to gain access. A mantrap makes it difficult for a facility to be accessed in number because it allows only one or two people into the facility at a time.