B. Electrical devices, such as motors, that generate magnetic fields cause EMI. Humidity control won't address EMI.
B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is analogous to building walls in an office building.
B. Access control is the primary process of preventing access to physical systems.
A. Perimeter security involves creating a perimeter or outer boundary for a physical space. Video surveillance systems wouldn't be considered a part of perimeter security, but they can be used to enhance physical security monitoring.
C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.
A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.
A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.
A. Wireless cell systems are primarily line-of-site communication systems. These systems use the microwave band for communications.
A. Shielding keeps external electronic signals from disrupting operations.
D. TEMPEST is the certification given to electronic devices that emit minimal RF. The TEMPEST certification is difficult to acquire, and it significantly increases the cost of systems.
A. Receivers tend to become desensitized when they're exposed to strong RF signals. This makes the receiver in the WAP seemingly go deaf to normal-strength signals.
A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire: oxygen.
C. The critical business functions are those functions that must be established as soon as possible for a business to succeed after a catastrophic event.
C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards.
D. Limited distribution information can be released to select individuals and organizations, such as financial institutions, governmental agencies, and creditors.
A. The Bell La-Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and preventing them from writing below their security level.
3.142.212.196