Exam 16: Physical and Infrastructure Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A restricted area within close proximity of a security interest has a classification of ______.
(Multiple Choice)
4.8/5
(41)
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
(True/False)
5.0/5
(30)
Noise along a power supply line,motors,fans,heavy equipment,microwave relay antennas,and other computers are all sources of _________.
(Essay)
4.9/5
(40)
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
(Essay)
4.8/5
(26)
High humidity does not pose a threat to electrical and electronic
equipment as long as the computer's temperature stays within the optimal range.
(True/False)
4.8/5
(32)
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
(True/False)
4.9/5
(37)
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
(True/False)
4.9/5
(41)
The security classification for a restricted area containing a security interest is _____.
(Multiple Choice)
4.8/5
(36)
A(n)________ is a battery backup unit that can maintain power to processors,monitors,and other equipment and can also function as a surge protector,power noise filter,and an automatic shutdown device.
(Essay)
4.8/5
(40)
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
(Essay)
4.8/5
(43)
An area of a facility that has no security interest is classified as _________.
(Multiple Choice)
4.8/5
(33)
Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.
(Essay)
4.8/5
(32)
To deal with the threat of smoke,the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
(Essay)
4.8/5
(37)
Physical security must prevent misuse of the physical infrastructure
that leads to the misuse or damage of the protected information.
(True/False)
4.8/5
(34)
Misuse of the physical infrastructure includes vandalism,theft of
equipment,theft by copying,theft of services,and unauthorized entry.
(True/False)
4.7/5
(42)
A person that becomes statically charged can damage electronic
equipment by an electric discharge.
(True/False)
4.9/5
(32)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)