Deck 3: Operational-Organizational Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/43
Play
Full screen (f)
Deck 3: Operational-Organizational Security
1
(p.D)Recommendations as it relates to a policy is a function of
A)Standards
B)Guidelines
C)Laws and regulations
D)CIRT emails
A)Standards
B)Guidelines
C)Laws and regulations
D)CIRT emails
B
2
A fire suppression system that is safe for humans,but will destroy equipment is
A)Halon
B)Sprinkler-based systems
C)Argon
D)Carbon dioxide
A)Halon
B)Sprinkler-based systems
C)Argon
D)Carbon dioxide
B
3
Your boss needs instructions explaining the steps of how to send encrypted email properly for all employees.You will need to create the _________.
A)policy
B)procedure
C)standard
D)guideline
A)policy
B)procedure
C)standard
D)guideline
B
4
802.11 wireless networks in relation to wired networks are
A)Difficult to set up and less secure
B)Easy to set up and easy to secure
C)Difficult to set up but more secure
D)Easy to set up but less secure
A)Difficult to set up and less secure
B)Easy to set up and easy to secure
C)Difficult to set up but more secure
D)Easy to set up but less secure
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT one of the three basic ways to protect electromagnetic emanations?
A)Put the equipment beyond the point that the emanations can be picked up.
B)Provide shielding for the equipment itself.
C)Create a reverse magnetic field around the equipment to cancel out waves emanating from or going to the equipment.
D)Provide a shielded enclosure (such as a room)to put the equipment in.
A)Put the equipment beyond the point that the emanations can be picked up.
B)Provide shielding for the equipment itself.
C)Create a reverse magnetic field around the equipment to cancel out waves emanating from or going to the equipment.
D)Provide a shielded enclosure (such as a room)to put the equipment in.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
6
Locks,sign-in logs,and security guards are examples of
A)Access controls.
B)Intrusion detection mechanisms.
C)Authentication methods.
D)Auditing devices.
A)Access controls.
B)Intrusion detection mechanisms.
C)Authentication methods.
D)Auditing devices.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
7
Bluetooth is a wireless technology that is used for
A)Underwater communications
B)Long-range communications
C)Short-range communications
D)Space communications
A)Underwater communications
B)Long-range communications
C)Short-range communications
D)Space communications
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
8
Procedures are high-level,broad statements of what the organization wants to accomplish.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
9
The company CIO wants you and your team to check the security of the network by simulating an attack by malicious individuals.He is asking you to
A)Do something illegal
B)Conduct a vulnerability assessment
C)Conduct a penetration test
D)Analyze the risk the network faces
A)Do something illegal
B)Conduct a vulnerability assessment
C)Conduct a penetration test
D)Analyze the risk the network faces
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
10
A critical piece of equipment that provides power to systems even during a black out is called a(n)_______________.
A)power strip
B)surge protector
C)uninterruptible power supply
D)password generator
A)power strip
B)surge protector
C)uninterruptible power supply
D)password generator
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
11
What is the problem described by the van Eck phenomenon and studied under TEMPEST?
A)Electromagnetic pulses destroying sensitive computer equipment
B)Magnetic fields that interfere with signals crossing Local Area Network (LAN)cables
C)Electromagnetic eavesdropping
D)Piggybacking on electromagnetic communications
A)Electromagnetic pulses destroying sensitive computer equipment
B)Magnetic fields that interfere with signals crossing Local Area Network (LAN)cables
C)Electromagnetic eavesdropping
D)Piggybacking on electromagnetic communications
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
12
Statements made by management that lays out the organization's position on an issue are called ________.
A)policies
B)procedures
C)standards
D)guidelines
A)policies
B)procedures
C)standards
D)guidelines
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
13
IEEE 802.11 is a set of standards suited for
A)Wide area networks
B)Local area networks
C)Personal area networks
D)Cellular networks.
A)Wide area networks
B)Local area networks
C)Personal area networks
D)Cellular networks.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
14
The outermost layer of physical security should
A)Be where the most specific controls are
B)Have the strongest authentication controls
C)Contain the most private activities
D)Contain the most publicly visible activities
A)Be where the most specific controls are
B)Have the strongest authentication controls
C)Contain the most private activities
D)Contain the most publicly visible activities
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
15
What fire-suppression system is the best for areas with expensive computer equipment?
A)Water (sprinklers)
B)Handheld fire extinguishers
C)Halon-based
D)Sand buckets
A)Water (sprinklers)
B)Handheld fire extinguishers
C)Halon-based
D)Sand buckets
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
16
The greatest danger to networks comes from
A)Foreign hackers
B)Attacks coming across the public switched telephone network
C)Natural disasters
D)Insiders
A)Foreign hackers
B)Attacks coming across the public switched telephone network
C)Natural disasters
D)Insiders
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
17
The three types of authentication used for access control are
A)Passwords,tokens,and key cards
B)Something you have,something you know,something you are
C)Encryption,deception,retention
D)Encryption,hashes,signatures.
A)Passwords,tokens,and key cards
B)Something you have,something you know,something you are
C)Encryption,deception,retention
D)Encryption,hashes,signatures.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
18
A fire suppression system that is safe for equipment,but dangerous for humans is
A)Halon
B)Sprinkler-based systems
C)Class A fire extinguisher
D)Water-based systems.
A)Halon
B)Sprinkler-based systems
C)Class A fire extinguisher
D)Water-based systems.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
19
The most sensitive equipment should be located
A)At the outer perimeter of the building
B)In a publicly accessible area
C)Deep inside the organization
D)Wherever it is easiest for employees to access it
A)At the outer perimeter of the building
B)In a publicly accessible area
C)Deep inside the organization
D)Wherever it is easiest for employees to access it
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
20
The location where wireless access points are placed can
A)Interfere with other wired network communications
B)Make it easier or harder for and attacker to access the network
C)Cause electromagnetic interference
D)Cause illness from prolonged exposure
A)Interfere with other wired network communications
B)Make it easier or harder for and attacker to access the network
C)Cause electromagnetic interference
D)Cause illness from prolonged exposure
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
21
Open spaces can serve as a barrier to protect a facility.
It is difficult to cross open spaces without being detected.
It is difficult to cross open spaces without being detected.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
22
_______________ are the step-by-step instructions on how to implement policies in the organization.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
23
Explain what is meant by the statement "Consider access from all six sides."
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
24
_______________ are high-level,broad statements of what the organization wants to accomplish.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
25
_______________ are recommendations relating to a policy.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
26
Plan,implement,monitor,and evaluate are the four steps of the _____________
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
27
Access controls that utilize "something you are," such as finger prints,irises,or hand geometry,is called _______________.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
28
The biggest danger to any organization comes from external attacks according to most experts.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
29
Standards are recommendations relating to a policy.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
30
_______________ are devices that have batteries that are used to keep equipment running in the event of a power outage.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
31
UPS is short for keeping UP Services.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
32
_______________ are systems used to maintain the comfort level of an office environment.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
33
_______________ consists of a small space that is large enough for only one person at a time,with two locking doors.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
34
_______________ are mandatory elements regarding the implementation of a policy.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
35
TEMPEST is a program developed by the US department of defense to protect equipment from the ill effects of weather and other natural disasters.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
36
Bluetooth is an wireless networking technology that is good for ranges up to 1000 meters.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
37
Voice recognition,iris scans,and facial geometry can be used for biometric access controls.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
38
HVAC keeps equipment temperatures within reasonable ranges.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
39
_______________ is designed as a short-range (approximately ten meters)personal area network (PAN).
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
40
Halon is effective at putting out fires and safe for humans but can damage equipment.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
41
What are physical access controls? Give examples.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
42
Choosing the location of equipment can have an impact on your security.Explain the security issues you would consider when placing various types of equipment.
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck
43
What are the types of fire suppression equipment and what are the important characteristics of each?
Unlock Deck
Unlock for access to all 43 flashcards in this deck.
Unlock Deck
k this deck