You are about to enter your office building through a back entrance. A man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do? O Let him in. |
Direct him to the front entrance and instruct him to check in with the receptionist. |
Which of the following are solutions that address physical security? (Select two.) ☐ Implement complex passwords |
☐ Escort visitors at all times ☐ Require identification and name badges for all employees |
Which of the following is not an example of a physical barrier access control mechanism? O Fences |
One-time passwords |
Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry? O Use weight scales |
Deploy a mantrap |
Which option is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment while actively preventing re-entrance through the exit portal? O Electronic access control doors |
Turnstiles |
What is the primary benefit of CCTV? O Expand the area visible by security guards |
Expand the area visible by security guards |
You want to use CCTV to increase your physical security. You want the ability to remotely control the camera position. Which camera type should you choose? O Dome |
PTZ |
You want to use CCTV to increase the physical security of your building. Which of the following camera types would O 500 resolution, 50mm, .05 LUX |
500 resolution, 50mm, .05 LUX |
Which of the following CCTV camera types lets you adjust the distance that the camera can see ( in other words, zoom in or out)? O Varifocal |
Varifocal |
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry'? (Select two.) ☐ Double-entry door |
☐ Double-entry door ☐ Turnstile |
Which of the following controls is an example of a physical access control method? O Passwords |
Locks on doors |
You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. Click on the office location where a mantrap would be most appropriate. |
Click on lobby entrance |
You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. Click on the office locations where access badge readers would be most appropriate. |
Click on lobby entrance & networking closet |
You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. Click on the office locations where surveillance cameras would be most appropriate. |
Click on lobby entrance & networking closet |
Match each physical security control on the left with an appropriate example of that control on the right. O Perimeter barrier |
Hardened carrier O Protected cable distribution Biometric authentication O Door locks Barricades O Perimeter barrier Emergency escape plans O Safety Alarmed carrier O Protected cable distribution Anti-passback system O Physical access control Emergency lighting O Safety Exterior floodlights O Perimeter barrier |
Which of the following is the most important thing to do to prevent console access to the router? O Keep the router in a locked room |
Keep the router in a locked room |
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns? O Encrypt all company data on the hard drives |
Use cable locks to chain the laptops to the desks |
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: Which security-related recommendations should you make to this client? (Select two.) ☐ Use separate dedicated network perimeter security devices instead of an all-in-one device |
☐ Control access to the work area with locking doors and card readers ☐ Relocate the switch to the locked server closet |
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: What security-related recommendations should you make to this client? O Replace the tape drive used for backups with external USB hard disks. |
Implement a hardware checkout policy. |
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's computer in the finance department. The user was able to copy data containing bank account information and social security numbers. The user then destroyed the data by resetting the computer. Which additional measure should the manager have taken to prevent data theft? O The data should have been backed up so it could be restored after it was destroyed. |
The computer should have been kept in a physically secure location. |
One of the ways attackers can access unencrypted data being transmitted on your network is by collecting electronic emissions that come from your networking closet or Ethernet cables. O Configure all data transmissions to be encrypted |
Configure all data transmissions to be encrypted |
To keep your data center safe, pu have done the following: Which of the following measures will NOT improve physical security in the data center? O Implement a checkout policy. |
Implement a checkout policy. |
Physical security is an obvious requirement for network security, but it is often easy to overlook or forget to plan for it. O Network resources are safer from natural disasters. |
Employee passwords are stronger. |
An attacker is using an eavesdropping technique called Van Eck phreaking on a networking closet. O Connecting to an open switch port |
Collecting electronic emissions |
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet and prevent anyone from reconfiguring the network to set up remote access or backdoor access. ☐ Place your networking equipment in a Faraday cage. |
☐ Place your networking equipment in a locked cage. ☐ Place your networking equipment in a room that requires key card entry. |
You walk by the server room and notice that a fire has started. What should you do first? O Grab a fire extinguisher and try to put out the fire. |
Make sure everyone has cleared the area. |
Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components? O Class A |
Class C |
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components? O Soda acid |
Carbon dioxide (C02) |
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two.) |
☐ CO2 ☐ Halon |
What is the recommended humidity level for server rooms? |
50% |
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems? O Add a de-humidifier to the server room |
Add a separate A/C unit in the server room |
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting network availability. O Negative pressure system |
Positive pressure system |
Which of the following statements about ESD is NOT correct? O ESD is much more likely to occur when the relative humidity is above 50%. |
ESD is much more likely to occur when the relative humidity is above 50%. |
Which of the following is the LEAST effective power loss protection for computer systems? O Backup power generator |
Surge protector |
Beside protecting a computer from under voltages, a typical UPS also performs which two actions? ☐ Prevents electric shock |
☐ Protects from over voltages ☐ Conditions the power signal |