6.9. Review Questions

  1. Which component of physical security addresses outer-level access control?

    1. Perimeter security

    2. Mantraps

    3. Security zones

    4. Locked doors

  2. You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?

    1. Type A

    2. Type B

    3. Type C

    4. Type D

  3. Which of the following won't reduce EMI?

    1. Physical shielding

    2. Humidity control

    3. Physical location

    4. Overhauling worn motors

  4. You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?

    1. Zone

    2. Partition

    3. Perimeter

    4. Floor

  5. Which of the following is equivalent to building walls in an office building from a network perspective?

    1. Perimeter security

    2. Partitioning

    3. Security zones

    4. IDS systems

  6. After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?

    1. Perimeter security

    2. Access control

    3. Security zones

    4. IDS systems

  7. Which of the following is an example of perimeter security?

    1. Chain link fence

    2. Video camera

    3. Elevator

    4. Locked computer room

  8. You're the leader of the security committee at ACME. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?

    1. Perimeter security

    2. Partitioning

    3. Security zone

    4. IDS system

  9. Which technology uses a physical characteristic to establish identity?

    1. Biometrics

    2. Surveillance

    3. Smart card

    4. CHAP authenticator

  10. As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type?

    1. Social engineering

    2. IDS system

    3. Perimeter security

    4. Biometrics

  11. Wireless cells have which of the following characteristics?

    1. Line-of-site communications

    2. Automatic position location

    3. High-power portable devices

    4. High levels of security

  12. You're attempting to sell upper management on the concept of adopting GSM technology. It promises to provide encryption as well as international usability, and it's an example of which technology?

    1. Perimeter security

    2. Surveillance system

    3. Security zones

    4. Cell technology

  13. The process of reducing or eliminating susceptibility to outside interference is called what?

    1. Shielding

    2. EMI

    3. TEMPEST

    4. Desensitization

  14. You work for an electronics company that has just created a device that emits less RF than any competitor's product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?

    1. EMI

    2. RFI

    3. CC EAL 4

    4. TEMPEST

  15. Which term defines the process of a WAP losing sensitivity due to RFI?

    1. RFI desensitization

    2. EMI pickup

    3. Access control

    4. TEMPEST

  16. Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?

    1. Gas based

    2. Water based

    3. Fixed system

    4. Overhead sprinklers

  17. The CBF identifies which aspects of a business?

    1. Access control

    2. Critical access points

    3. Essential business functions

    4. BIA

  18. You're the chief security contact for MTS. One of your primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task?

    1. Policies

    2. Standards

    3. Guidelines

    4. BIA

  19. Which classification of information designates that information can be released on a restricted basis to outside organizations?

    1. Private information

    2. Full distribution

    3. Restricted information

    4. Limited distribution

  20. You've recently been hired by ACME to do a security audit. The managers of this company feel that their current security measures are inadequate. Which information access control prevents users from writing information down to a lower level of security and prevents users from reading above their level of security?

    1. Bell La-Padula model

    2. Biba model

    3. Clark-Wilson model

    4. Noninterference model

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.76.227