Exam 16: Physical and Infrastructure Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
_______ includes destruction of equipment and data.
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
B
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
(True/False)
4.9/5
(35)
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
(Short Answer)
4.8/5
(38)
An area of a facility that has no security interest is classified as _________.
(Multiple Choice)
4.8/5
(30)
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
(Short Answer)
4.7/5
(35)
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
(Short Answer)
4.9/5
(31)
The optimal temperature for computer systems is between 10 and 32
degrees Fahrenheit.
(True/False)
4.9/5
(31)
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
(Short Answer)
4.8/5
(27)
A restricted area within close proximity of a security interest has a classification of ______.
(Multiple Choice)
4.9/5
(35)
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
(True/False)
4.9/5
(44)
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.
(Multiple Choice)
5.0/5
(37)
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.
(Multiple Choice)
4.7/5
(25)
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
(Short Answer)
4.8/5
(33)
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.
(Multiple Choice)
4.8/5
(38)
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
(Short Answer)
4.7/5
(24)
Human-caused threats are less predictable than other types of physical
threats.
(True/False)
4.8/5
(39)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)