On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do? |
Direct him to the front entrance and instruct him to check in with the receptionist. |
Which of the following are solutions that address physical security? (Select two.) |
Require identification and name badges for all employees Escort visitors at all times. |
Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry? |
Deploy a mantrap |
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance thorough the exit portal? |
Turnstiles |
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose? |
PTZ |
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions? |
500 resolution, 50mm, .05 LUX |
Which of the following CCTV camera types lets you adjust the distance that the camera can see (i.e. zoom in or out)? |
Varifocal |
Which of the following CCTV types would you use in areas with little or no light? |
Infrared |
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two.) |
Double-entry door Turnstile |
Which of the following controls is an example of a physical access control method? |
Locks on doors |
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where cable locks would be most appropriate. |
At the lobby |
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where a mantrap would be most appropriate. |
At the lobby |
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where where access badge readers would be most appropriate. |
Building entrance in the lobby. Sensitive areas as server room. |
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where surveillance cameras would be most appropriate. |
Building entrance in the lobby. Sensitive areas as server room. |
Match each physical security control on the left with an appropriate example of the control on the right. |
Hardened carrier >> Protected cable distribution Biometric authentication >> Door locks Barricades >> Perimeter barrier Emergency escape plans >> Safety Alarmed carrier >> Protected cable distribution Anti-passback system >> Physical access control Emergency lighting >> Safety Exterior floodlights >> Perimeter barrier |
Which of the following is the most important thing to do to prevent console access to the router? |
Keep the router in a locked room. |
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns? |
Use cable locks to chain the laptops to the desks. |
You are an IT consultant and are visiting a ne client’s site to become familiar with their network. As you walk around their facility, you note the following: |
Relocate the switch to the locked server closet. Control access to the work area with locking doors and card readers. |
You are an IT consultant and are visiting a ne client’s site to become familiar with their network. As you walk around their facility, you note the following: Which security-related recommendations should you make to this client? (Select two) |
Implement a hardware checkout policy |
You walk by the server room and notice a fire has started. What should you do first? |
Make sure everyone has cleared the area |
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components? |
Class C |
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components? |
Carbon dioxide (CO2) |
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two.) |
CO2 Halon |
Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You notice that this only seems to happen when the elevator is running. What should you do? |
Install shielded cables near the elevator |
What is the recommended humidity level for server rooms? |
50% |
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems? |
Add a separate A/C unit in the server room |
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement? |
Positive pressure system |
Which of the following statements about ESD in "not correct"? |
ESD is much more likely to occur when the relative humidity is above 50%. |
Which of the following is the "least" effective power loss protection from computer system? |
Surge protector |
Besides protecting a computer from under voltages, a typical UPS also perform which two actions: |
Protects from over voltages Conditions the power signal |
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device? |
Remote wipe |
Which of the following are "not" reasons to remote wipe a mobile device? |
When the device is inactive for a period of time. |
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity? |
Screen lock |
Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate. |
Most accurate- GPS More accurate- WI-FI triangulation Less accurate- cell phone tower triangulation Least accurate- IP address resolution |
Your organization has recently purchases 20 tablets devices for the Human Resources department to use for training sessions. |
Implement storage implementation. Enable service device encryption. |
Over the last several years, the use of mobile devices within your organization has increased dramatically. |
Implement a mobile endpoint management (MEM) solution |
Match each bring your own device (BOYD) security issue on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all. |
Preventing malware infections- Implement a network acces control (NAC) solution. Supporting mobile device users-Specify who users can call for help with mobile devices apps in your acceptable use policy. Preventing loss of control of sensitive data- Enroll devices in a mobile device management. Preventing malicious insider attacks-Specify where and when mobile devices can be possessed in your acceptable use policy. Applying the latest anti-malware definitions- Implement a network access control (NAC) solution. |
Match each bring your own device (BOYD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, not at all. |
Users take pictures of proprietary processes and procedures- Specify where and when mobile devices can be possessed in your acceptable use policy. Devices with a data plan can e-mail stole data Specify where and when mobile devices can be possessed in your acceptable use policy. Devices have no PIN or password configured Enroll devices in a mobile device management system Anti-malware software is not installed Implement a network access control (NAC) solution. A device containing sensitive data may be lost. Enroll devices in a mobile device management system |
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (select two) -Link the Group Policy Object to the container where the tablets’ computer objects reside. |
Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system. |
Your organization recently purchase 18 iPad tablets for use by the organization’s management team. These devices have iOS pre-installed on them. To increase the security of these devices, you wan to apply a default set of security related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution) |
Enroll the devices in a mobile device management (MDM) system Configure and apply security policy settings in a mobile device management system |
Match each mobile device application control term on the right with the appropriate description on the left. |
Jailbreaking = allows apps to be installed from sources other than the app store Sideloading = Allows apps to be installed from sources other than the Windows Store. Sandboxing = prevents a running app from accessing data stored by other running apps Assigned Access = Defines a whitelist of Windows Store applications |
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connections using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice presidents home recorded someone rummaging through her garbage cans prior to the attack. The VP admitted to writing her VPN log in credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You’ve reviewed the VP’s social media pages and found pictures of her home posted, but you didn’t notice anything in he photos that would give away her home address. She assure you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach? |
Geo-tagging was enabled on her smart phone |
Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy? |
You can’t use domain-based group policies to enforce security settings on mobile devices. |
Your organization’s security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do? |
sign up for a Windows Intune account to manage the tablets. |
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left her tablet in an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe? |
Admin Portal |
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left his notebook at a customer’s site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which Intune portal should you use to remotely change the password? |
Admin Portal |
The presence of unapproved modes on desktop system gives rise to the LAN being vulnerable to which of the following? |
War dialing |
Which of the following phone attacks adds unauthorized charges to a telephone bill? |
Cramming |
Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines? |
VoIP |
A customer just received a phone bill on which there are charges for unauthorized services. This customer is a victim to which type of attack? |
Cramming |
Chapter 5 security Practice Exams
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price