Exam 16: Physical and Infrastructure Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The CHUID is a PIV card data object.

(True/False)
4.7/5
(35)

High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.

(True/False)
4.8/5
(51)

An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.

(Short Answer)
4.8/5
(44)

________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

(Multiple Choice)
4.8/5
(38)

Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.

(True/False)
4.9/5
(39)

An area of a facility that has no security interest is classified as _________.

(Multiple Choice)
4.8/5
(42)

______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.

(Short Answer)
4.8/5
(40)

Physical security must also prevent any type of physical access orintrusion that can compromise logical security.

(True/False)
4.7/5
(30)

_______ threats encompass threats related to electrical power and electromagnetic emission.

(Short Answer)
4.8/5
(41)

Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.

(True/False)
4.7/5
(33)

A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.

(Short Answer)
4.8/5
(46)

Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.

(Short Answer)
4.8/5
(40)

Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.

(Short Answer)
4.9/5
(27)

A restricted area within close proximity of a security interest has a classification of ______.

(Multiple Choice)
4.8/5
(40)

________ physical threats are more difficult to deal with than environmental and technical threats.

(Short Answer)
4.9/5
(35)

Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.

(Short Answer)
4.9/5
(40)

Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.

(Short Answer)
4.8/5
(36)

Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.

(True/False)
4.9/5
(40)

The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

(Multiple Choice)
4.9/5
(34)

The direct flame is the only threat from fire.

(True/False)
4.8/5
(43)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)