Exam 16: Physical and Infrastructure Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .
Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
D
________ security protects computer-based data from software-based and communication-based threats.
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
D
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
Free
(Essay)
4.9/5
(35)
Correct Answer:
noise
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
(Essay)
4.9/5
(43)
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.
(Multiple Choice)
4.9/5
(35)
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.
(Multiple Choice)
4.8/5
(36)
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.
(Multiple Choice)
4.8/5
(32)
If a computer's temperature gets too cold the system can undergo
thermal shock when it is turned on.
(True/False)
4.8/5
(32)
________ physical threats are more difficult to deal with than environmental and technical threats.
(Essay)
4.7/5
(36)
________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.
(Multiple Choice)
4.8/5
(38)
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.
(Multiple Choice)
4.7/5
(37)
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
(Essay)
4.8/5
(34)
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
(Essay)
4.8/5
(35)
For information systems,the role of logical security is to protect the
physical assets that support the storage and processing of information.
(True/False)
4.8/5
(36)
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
(Essay)
4.8/5
(37)
The most essential element of recovery from physical security breaches is ____.
(Essay)
4.8/5
(43)
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
(Essay)
4.9/5
(35)
_______ threats encompass threats related to electrical power and electromagnetic emission.
(Essay)
4.8/5
(31)
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.
(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)