Deck 16: Physical and Infrastructure Security

Full screen (f)
exit full mode
Question
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
Use Space or
up arrow
down arrow
to flip the card.
Question
High humidity does not pose a threat to electrical and electronic
equipment as long as the computer's temperature stays within the optimal range.
Question
The CHUID is a PIV card data object.
Question
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
Question
For information systems,the role of logical security is to protect the
physical assets that support the storage and processing of information.
Question
A person that becomes statically charged can damage electronic
equipment by an electric discharge.
Question
The direct flame is the only threat from fire.
Question
Low-intensity devices such as cellular telephones do not interfere with
electronic equipment.
Question
Physical security must prevent misuse of the physical infrastructure
that leads to the misuse or damage of the protected information.
Question
________ security protects computer-based data from software-based and communication-based threats.

A)Infrastructure
B)Premises
C)Physical
D)Logical
Question
________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

A)Supporting facilities
B)Physical facilities
C)Information system hardware
D)Infrastructure facilities
Question
Unauthorized physical access can lead to other threats.
Question
If a computer's temperature gets too cold the system can undergo
thermal shock when it is turned on.
Question
Misuse of the physical infrastructure includes vandalism,theft of
equipment,theft by copying,theft of services,and unauthorized entry.
Question
Human-caused threats are less predictable than other types of physical
threats.
Question
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

A)Premises
B)Infrastructure
C)Logical
D)Physical
Question
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

A)Supporting
B)Information
C)Physical
D)All of the above
Question
The optimal temperature for computer systems is between 10 and 32
degrees Fahrenheit.
Question
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A)20% and 80%
B)40% and 60%
C)50% and 50%
D)30% and 70%
Question
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
Question
The security classification for a restricted area containing a security interest is _____.

A)controlled
B)exclusion
C)unrestricted
D)limited
Question
Eavesdropping and wiretapping fall into the ________ category.

A)theft
B)vandalism
C)misuse
D)unauthorized physical access
Question
The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .

A)static
B)portable
C)mobile
D)all of the above
Question
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

A)Smoke detectors
B)UPS
C)Water sensors
D)Equipment power off switches
Question
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A)Human-caused
B)Technical
C)EMI
D)Environmental
Question
_______ includes destruction of equipment and data.

A)Misuse
B)Vandalism
C)Theft
D)Unauthorized physical access
Question
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
Question
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
Question
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
Question
Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.
Question
Noise along a power supply line,motors,fans,heavy equipment,microwave relay antennas,and other computers are all sources of _________.
Question
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
Question
A restricted area within close proximity of a security interest has a classification of ______.

A)exclusion
B)controlled
C)limited
D)unrestricted
Question
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
Question
_______ threats encompass threats related to electrical power and electromagnetic emission.
Question
A prevalent concern that is often overlooked is ________.

A)overvoltage
B)undervoltage
C)dust
D)noise
Question
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

A)VIS
B)BIO
C)CHUID
D)CAK
Question
________ physical threats are more difficult to deal with than environmental and technical threats.
Question
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
Question
An area of a facility that has no security interest is classified as _________.

A)unrestricted
B)controlled
C)limited
D)exclusion
Question
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
Question
To deal with the threat of smoke,the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
Question
The most essential element of recovery from physical security breaches is ____.
Question
A(n)________ is a battery backup unit that can maintain power to processors,monitors,and other equipment and can also function as a surge protector,power noise filter,and an automatic shutdown device.
Question
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Physical and Infrastructure Security
1
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
True
2
High humidity does not pose a threat to electrical and electronic
equipment as long as the computer's temperature stays within the optimal range.
False
3
The CHUID is a PIV card data object.
True
4
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
For information systems,the role of logical security is to protect the
physical assets that support the storage and processing of information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A person that becomes statically charged can damage electronic
equipment by an electric discharge.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The direct flame is the only threat from fire.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Low-intensity devices such as cellular telephones do not interfere with
electronic equipment.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Physical security must prevent misuse of the physical infrastructure
that leads to the misuse or damage of the protected information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
________ security protects computer-based data from software-based and communication-based threats.

A)Infrastructure
B)Premises
C)Physical
D)Logical
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

A)Supporting facilities
B)Physical facilities
C)Information system hardware
D)Infrastructure facilities
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Unauthorized physical access can lead to other threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
If a computer's temperature gets too cold the system can undergo
thermal shock when it is turned on.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Misuse of the physical infrastructure includes vandalism,theft of
equipment,theft by copying,theft of services,and unauthorized entry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Human-caused threats are less predictable than other types of physical
threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

A)Premises
B)Infrastructure
C)Logical
D)Physical
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

A)Supporting
B)Information
C)Physical
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The optimal temperature for computer systems is between 10 and 32
degrees Fahrenheit.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A)20% and 80%
B)40% and 60%
C)50% and 50%
D)30% and 70%
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The security classification for a restricted area containing a security interest is _____.

A)controlled
B)exclusion
C)unrestricted
D)limited
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Eavesdropping and wiretapping fall into the ________ category.

A)theft
B)vandalism
C)misuse
D)unauthorized physical access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .

A)static
B)portable
C)mobile
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

A)Smoke detectors
B)UPS
C)Water sensors
D)Equipment power off switches
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A)Human-caused
B)Technical
C)EMI
D)Environmental
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_______ includes destruction of equipment and data.

A)Misuse
B)Vandalism
C)Theft
D)Unauthorized physical access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Noise along a power supply line,motors,fans,heavy equipment,microwave relay antennas,and other computers are all sources of _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A restricted area within close proximity of a security interest has a classification of ______.

A)exclusion
B)controlled
C)limited
D)unrestricted
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_______ threats encompass threats related to electrical power and electromagnetic emission.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A prevalent concern that is often overlooked is ________.

A)overvoltage
B)undervoltage
C)dust
D)noise
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

A)VIS
B)BIO
C)CHUID
D)CAK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
________ physical threats are more difficult to deal with than environmental and technical threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
An area of a facility that has no security interest is classified as _________.

A)unrestricted
B)controlled
C)limited
D)exclusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
To deal with the threat of smoke,the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The most essential element of recovery from physical security breaches is ____.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A(n)________ is a battery backup unit that can maintain power to processors,monitors,and other equipment and can also function as a surge protector,power noise filter,and an automatic shutdown device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.