Exam 16: Physical and Infrastructure Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.
(True/False)
4.8/5
(51)
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
(Short Answer)
4.8/5
(44)
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.
(Multiple Choice)
4.8/5
(38)
Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
(True/False)
4.9/5
(39)
An area of a facility that has no security interest is classified as _________.
(Multiple Choice)
4.8/5
(42)
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
(Short Answer)
4.8/5
(40)
Physical security must also prevent any type of physical access orintrusion that can compromise logical security.
(True/False)
4.7/5
(30)
_______ threats encompass threats related to electrical power and electromagnetic emission.
(Short Answer)
4.8/5
(41)
Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.
(True/False)
4.7/5
(33)
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
(Short Answer)
4.8/5
(46)
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
(Short Answer)
4.8/5
(40)
Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.
(Short Answer)
4.9/5
(27)
A restricted area within close proximity of a security interest has a classification of ______.
(Multiple Choice)
4.8/5
(40)
________ physical threats are more difficult to deal with than environmental and technical threats.
(Short Answer)
4.9/5
(35)
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
(Short Answer)
4.9/5
(40)
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
(Short Answer)
4.8/5
(36)
Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.
(True/False)
4.9/5
(40)
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)