Deck 16: Physical and Infrastructure Security

Full screen (f)
exit full mode
Question
The optimal temperature for computer systems is between 10 and 32degrees Fahrenheit.
Use Space or
up arrow
down arrow
to flip the card.
Question
Human-caused threats are less predictable than other types of physicalthreats.
Question
________ security protects computer-based data from software-based and communication-based threats.

A) Infrastructure
B) Premises
C) Physical
D) Logical
Question
For information systems, the role of logical security is to protect thephysical assets that support the storage and processing of information.
Question
To implement a physical security program an organization mustconduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
Question
If a computer's temperature gets too cold the system can undergothermal shock when it is turned on.
Question
Unauthorized physical access can lead to other threats.
Question
The direct flame is the only threat from fire.
Question
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A) 20% and 80%
B) 40% and 60%
C) 50% and 50%
D) 30% and 70%
Question
_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

A) Supporting
B) Information
C) Physical
D) All of the above
Question
A person that becomes statically charged can damage electronicequipment by an electric discharge.
Question
High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.
Question
Misuse of the physical infrastructure includes vandalism, theft ofequipment, theft by copying, theft of services, and unauthorized entry.
Question
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

A) Premises
B) Infrastructure
C) Logical
D) Physical
Question
________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

A) Supporting facilities
B) Physical facilities
C) Information system hardware
D) Infrastructure facilities
Question
Physical security must also prevent any type of physical access orintrusion that can compromise logical security.
Question
Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
Question
Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.
Question
Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.
Question
The CHUID is a PIV card data object.
Question
A prevalent concern that is often overlooked is ________.

A) overvoltage
B) undervoltage
C) dust
D) noise
Question
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
Question
_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.

A) Smoke detectors
B) UPS
C) Water sensors
D) Equipment power off switches
Question
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
Question
An area of a facility that has no security interest is classified as _________.

A) unrestricted
B) controlled
C) limited
D) exclusion
Question
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
Question
Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.
Question
The role of physical security is affected by the operating location of the information system, which can be characterized as ______ .

A) static
B) portable
C) mobile
D) all of the above
Question
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

A) VIS
B) BIO
C) CHUID
D) CAK
Question
A restricted area within close proximity of a security interest has a classification of ______.

A) exclusion
B) controlled
C) limited
D) unrestricted
Question
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A) Human-caused
B) Technical
C) EMI
D) Environmental
Question
The security classification for a restricted area containing a security interest is _____.

A) controlled
B) exclusion
C) unrestricted
D) limited
Question
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
Question
________ physical threats are more difficult to deal with than environmental and technical threats.
Question
Eavesdropping and wiretapping fall into the ________ category.

A) theft
B) vandalism
C) misuse
D) unauthorized physical access
Question
_______ threats encompass threats related to electrical power and electromagnetic emission.
Question
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
Question
_______ includes destruction of equipment and data.

A) Misuse
B) Vandalism
C) Theft
D) Unauthorized physical access
Question
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
Question
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
Question
To deal with the threat of smoke, the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
Question
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
Question
The most essential element of recovery from physical security breaches is ____.
Question
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
Question
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Physical and Infrastructure Security
1
The optimal temperature for computer systems is between 10 and 32degrees Fahrenheit.
False
2
Human-caused threats are less predictable than other types of physicalthreats.
True
3
________ security protects computer-based data from software-based and communication-based threats.

A) Infrastructure
B) Premises
C) Physical
D) Logical
D
4
For information systems, the role of logical security is to protect thephysical assets that support the storage and processing of information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
To implement a physical security program an organization mustconduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
If a computer's temperature gets too cold the system can undergothermal shock when it is turned on.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Unauthorized physical access can lead to other threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The direct flame is the only threat from fire.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A) 20% and 80%
B) 40% and 60%
C) 50% and 50%
D) 30% and 70%
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

A) Supporting
B) Information
C) Physical
D) All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A person that becomes statically charged can damage electronicequipment by an electric discharge.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Misuse of the physical infrastructure includes vandalism, theft ofequipment, theft by copying, theft of services, and unauthorized entry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

A) Premises
B) Infrastructure
C) Logical
D) Physical
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

A) Supporting facilities
B) Physical facilities
C) Information system hardware
D) Infrastructure facilities
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Physical security must also prevent any type of physical access orintrusion that can compromise logical security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The CHUID is a PIV card data object.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A prevalent concern that is often overlooked is ________.

A) overvoltage
B) undervoltage
C) dust
D) noise
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.

A) Smoke detectors
B) UPS
C) Water sensors
D) Equipment power off switches
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
An area of a facility that has no security interest is classified as _________.

A) unrestricted
B) controlled
C) limited
D) exclusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The role of physical security is affected by the operating location of the information system, which can be characterized as ______ .

A) static
B) portable
C) mobile
D) all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

A) VIS
B) BIO
C) CHUID
D) CAK
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A restricted area within close proximity of a security interest has a classification of ______.

A) exclusion
B) controlled
C) limited
D) unrestricted
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A) Human-caused
B) Technical
C) EMI
D) Environmental
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The security classification for a restricted area containing a security interest is _____.

A) controlled
B) exclusion
C) unrestricted
D) limited
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
________ physical threats are more difficult to deal with than environmental and technical threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Eavesdropping and wiretapping fall into the ________ category.

A) theft
B) vandalism
C) misuse
D) unauthorized physical access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_______ threats encompass threats related to electrical power and electromagnetic emission.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
_______ includes destruction of equipment and data.

A) Misuse
B) Vandalism
C) Theft
D) Unauthorized physical access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
To deal with the threat of smoke, the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The most essential element of recovery from physical security breaches is ____.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.