6.10. Answers to Review Questions

  1. A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.

  2. C. Type C fire extinguishers are intended for use in electrical fires.

  3. B. Electrical devices, such as motors, that generate magnetic fields cause EMI. Humidity control won't address EMI.

  4. A. A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones.

  5. B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is analogous to building walls in an office building.

  6. B. Access control is the primary process of preventing access to physical systems.

  7. A. Perimeter security involves creating a perimeter or outer boundary for a physical space. Video surveillance systems wouldn't be considered a part of perimeter security, but they can be used to enhance physical security monitoring.

  8. C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.

  9. A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.

  10. A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

  11. A. Wireless cell systems are primarily line-of-site communication systems. These systems use the microwave band for communications.

  12. D. Global System for Mobile Communications (GSM) is the newest standard for cellular communications. GSM promises to provide encryption as well as international usability.

  13. A. Shielding keeps external electronic signals from disrupting operations.

  14. D. TEMPEST is the certification given to electronic devices that emit minimal RF. The TEMPEST certification is difficult to acquire, and it significantly increases the cost of systems.

  15. A. Receivers tend to become desensitized when they're exposed to strong RF signals. This makes the receiver in the WAP seemingly go deaf to normal-strength signals.

  16. A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire: oxygen.

  17. C. The critical business functions are those functions that must be established as soon as possible for a business to succeed after a catastrophic event.

  18. C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards.

  19. D. Limited distribution information can be released to select individuals and organizations, such as financial institutions, governmental agencies, and creditors.

  20. A. The Bell La-Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and preventing them from writing below their security level.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.212.196