Exam 16: Physical and Infrastructure Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A

_______ includes destruction of equipment and data.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

To implement a physical security program an organization must conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

Physical security must also prevent any type of physical access or intrusion that can compromise logical security.

(True/False)
4.9/5
(35)

Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.

(Short Answer)
4.8/5
(38)

An area of a facility that has no security interest is classified as _________.

(Multiple Choice)
4.8/5
(30)

Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.

(Short Answer)
4.7/5
(35)

An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.

(Short Answer)
4.9/5
(31)

The optimal temperature for computer systems is between 10 and 32 degrees Fahrenheit.

(True/False)
4.9/5
(31)

A prevalent concern that is often overlooked is ________.

(Multiple Choice)
4.9/5
(40)

_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.

(Short Answer)
4.8/5
(27)

A restricted area within close proximity of a security interest has a classification of ______.

(Multiple Choice)
4.9/5
(35)

Physical access control should address not just computers and other IS equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.

(True/False)
4.9/5
(44)

The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

(Multiple Choice)
5.0/5
(37)

_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

(Multiple Choice)
4.7/5
(25)

The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.

(Short Answer)
4.8/5
(33)

_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

(Multiple Choice)
4.8/5
(38)

Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.

(Short Answer)
4.7/5
(24)

The CHUID is a PIV card data object.

(True/False)
4.9/5
(37)

Human-caused threats are less predictable than other types of physical threats.

(True/False)
4.8/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)