You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?
Type A
Type B
Type C
Type D
Which of the following won't reduce EMI?
Physical shielding
Humidity control
Physical location
Overhauling worn motors
You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
Zone
Partition
Perimeter
Floor
Which of the following is equivalent to building walls in an office building from a network perspective?
Perimeter security
Partitioning
Security zones
IDS systems
After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
Perimeter security
Access control
Security zones
IDS systems
Which of the following is an example of perimeter security?
Chain link fence
Video camera
Elevator
Locked computer room
You're the leader of the security committee at ACME. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
Perimeter security
Partitioning
Security zone
IDS system
Which technology uses a physical characteristic to establish identity?
Biometrics
Surveillance
Smart card
CHAP authenticator
As part of your training program, you're trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type?
Social engineering
IDS system
Perimeter security
Biometrics
Wireless cells have which of the following characteristics?
Line-of-site communications
Automatic position location
High-power portable devices
High levels of security
You're attempting to sell upper management on the concept of adopting GSM technology. It promises to provide encryption as well as international usability, and it's an example of which technology?
Perimeter security
Surveillance system
Security zones
Cell technology
The process of reducing or eliminating susceptibility to outside interference is called what?
Shielding
EMI
TEMPEST
Desensitization
You work for an electronics company that has just created a device that emits less RF than any competitor's product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
EMI
RFI
CC EAL 4
TEMPEST
Which term defines the process of a WAP losing sensitivity due to RFI?
RFI desensitization
EMI pickup
Access control
TEMPEST
Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
Gas based
Water based
Fixed system
Overhead sprinklers
The CBF identifies which aspects of a business?
Access control
Critical access points
Essential business functions
BIA
You're the chief security contact for MTS. One of your primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task?
Policies
Standards
Guidelines
BIA
Which classification of information designates that information can be released on a restricted basis to outside organizations?
Private information
Full distribution
Restricted information
Limited distribution
You've recently been hired by ACME to do a security audit. The managers of this company feel that their current security measures are inadequate. Which information access control prevents users from writing information down to a lower level of security and prevents users from reading above their level of security?
Bell La-Padula model
Biba model
Clark-Wilson model
Noninterference model
3.16.76.227