Exam 16: Physical and Infrastructure Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .

Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
Verified

D

________ security protects computer-based data from software-based and communication-based threats.

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

D

Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.

Free
(Essay)
4.9/5
(35)
Correct Answer:
Verified

noise

_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.

(Essay)
4.9/5
(43)

_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

(Multiple Choice)
4.9/5
(35)

The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

(Multiple Choice)
4.8/5
(36)

________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

(Multiple Choice)
4.8/5
(32)

If a computer's temperature gets too cold the system can undergo thermal shock when it is turned on.

(True/False)
4.8/5
(32)

________ physical threats are more difficult to deal with than environmental and technical threats.

(Essay)
4.7/5
(36)

________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

(Multiple Choice)
4.8/5
(38)

Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

(Multiple Choice)
4.7/5
(37)

_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.

(Essay)
4.8/5
(34)

The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.

(Essay)
4.8/5
(35)

For information systems,the role of logical security is to protect the physical assets that support the storage and processing of information.

(True/False)
4.8/5
(36)

______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.

(Essay)
4.8/5
(37)

The most essential element of recovery from physical security breaches is ____.

(Essay)
4.8/5
(43)

Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.

(Essay)
4.9/5
(35)

The CHUID is a PIV card data object.

(True/False)
4.9/5
(34)

_______ threats encompass threats related to electrical power and electromagnetic emission.

(Essay)
4.8/5
(31)

_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)