Deck 7: Physical and Environmental Security

Full screen (f)
exit full mode
Question
Which of the following does not destroy the data on a hard drive?

A) Disk wiping
B) Data destruction
C) Formatting
D) Degaussing
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following can permanently remove data from a drive?

A) Deleting and formatting
B) Deleting and disk wiping
C) Formatting and degaussing
D) Disk wiping and degaussing
Question
Which of the following statements best describes hidden files?

A) Temporary storage of web documents, such as HTML pages and downloads
B) Files that the operating system by design does not display
C) A temporary holding area for files being created
D) Files that authorized users can view and access
Question
Which of the following statements about formatting is not true?

A) System recovery software can be used to restore data from a formatted disk.
B) Formatting permanently deletes the files on a disk.
C) Formatting erases the operating system address tables.
D) All of the above
Question
Which of the following statements best describes metadata?

A) Information about websites visited
B) Files that the operating system by design does not display
C) Details about a file that describes or identifies it
D) Temporary storage area for web documents
Question
Which of the following statements best describes a cookie?

A) File with information about websites visited
B) File that the operating system by design does not display
C) Details about a file that describe or identify it
D) Temporary storage area for web documents
Question
Which of the following is a temporary storage for web documents such as HTML pages and downloads?

A) Data cache
B) Metadata
C) Web cache
D) Cookies
Question
Which of the following is an example of a browser-based data?

A) Cookies
B) Form history
C) Search bar history
D) All of the above
Question
Layered defense for securing facilities is both physical and __________.

A) alarmed
B) psychological
C) monitored
D) structural
Question
Class C fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
Question
Class A fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
Question
The design of a secure site starts with the __________ of the site.

A) scope
B) dimensions
C) storage needs
D) location
Question
Which of the following is the first line of defense for fires?

A) Fire detection controls
B) Fire prevention controls
C) Fire containment controls
D) Fire suppression controls
Question
Which of the following is an example of a fire prevention control?

A) Fire containment equipment
B) Fire extinguishers
C) Fire suppressors
D) Adhering to building and construction codes
Question
Fences used in perimeter security should be at least how many feet in height?

A) 6
B) 7
C) 8
D) 9
Question
Which of the following refers to a prolonged increase in voltage (minutes or hours)?

A) Power surge
B) Power spike
C) Sag
D) Fault
Question
Which of the following refers to a prolonged period of power loss (hours or days)?

A) Fault
B) Brownout
C) Sag
D) Blackout
Question
Which of the following is defined by NIST as "the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive."

A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody
Question
Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data's encryption key?

A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Physical and Environmental Security
1
Which of the following does not destroy the data on a hard drive?

A) Disk wiping
B) Data destruction
C) Formatting
D) Degaussing
Formatting
2
Which of the following can permanently remove data from a drive?

A) Deleting and formatting
B) Deleting and disk wiping
C) Formatting and degaussing
D) Disk wiping and degaussing
Disk wiping and degaussing
3
Which of the following statements best describes hidden files?

A) Temporary storage of web documents, such as HTML pages and downloads
B) Files that the operating system by design does not display
C) A temporary holding area for files being created
D) Files that authorized users can view and access
Files that the operating system by design does not display
4
Which of the following statements about formatting is not true?

A) System recovery software can be used to restore data from a formatted disk.
B) Formatting permanently deletes the files on a disk.
C) Formatting erases the operating system address tables.
D) All of the above
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements best describes metadata?

A) Information about websites visited
B) Files that the operating system by design does not display
C) Details about a file that describes or identifies it
D) Temporary storage area for web documents
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following statements best describes a cookie?

A) File with information about websites visited
B) File that the operating system by design does not display
C) Details about a file that describe or identify it
D) Temporary storage area for web documents
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a temporary storage for web documents such as HTML pages and downloads?

A) Data cache
B) Metadata
C) Web cache
D) Cookies
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is an example of a browser-based data?

A) Cookies
B) Form history
C) Search bar history
D) All of the above
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Layered defense for securing facilities is both physical and __________.

A) alarmed
B) psychological
C) monitored
D) structural
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
Class C fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
Class A fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
The design of a secure site starts with the __________ of the site.

A) scope
B) dimensions
C) storage needs
D) location
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is the first line of defense for fires?

A) Fire detection controls
B) Fire prevention controls
C) Fire containment controls
D) Fire suppression controls
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is an example of a fire prevention control?

A) Fire containment equipment
B) Fire extinguishers
C) Fire suppressors
D) Adhering to building and construction codes
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
Fences used in perimeter security should be at least how many feet in height?

A) 6
B) 7
C) 8
D) 9
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following refers to a prolonged increase in voltage (minutes or hours)?

A) Power surge
B) Power spike
C) Sag
D) Fault
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following refers to a prolonged period of power loss (hours or days)?

A) Fault
B) Brownout
C) Sag
D) Blackout
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is defined by NIST as "the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive."

A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data's encryption key?

A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.