A. Physical security
B. Intrusion detection
C. Logical security
D. Awareness training
Answer: A
Physical security is the most important aspect of overall security. Without physical security, none of the other aspects of security are sufficient.
A. Log file audit
B. Critical path analysis
C. Risk analysis
D. Inventory
Answer: B
Critical path analysis can be used to map out the needs of an organization for a new facility. A critical path analysis is the process of identifying relationships between mission-critical applications, processes, and operations and all of the supporting elements.
A. Server room
B. Wiring closet
C. Datacenter
D. Media cabinets
Answer: B
A wiring closet is the infrastructure component is often located in the same position across multiple floors in order to provide a convenient means of linking floor-based networks together.
A. Separation of work and visitor areas
B. Restricted access to areas with higher value or importance
C. Confidential assets located in the heart or center of a facility
D. Equal access to all locations within a facility
Answer: D
Equal access to all locations within a facility is not a security-focused design element. Each area containing assets or resources of different importance, value, and confidentiality should have a corresponding level of security restriction placed on it.
A. It must be human compatible.
B. It must include the use of nonwater fire suppressants.
C. The humidity must be kept between 40 and 60 percent.
D. The temperature must be kept between 60 and 75 degrees Fahrenheit.
Answer: A
A computer room does not need to be human compatible to be efficient and secure. Having a human-incompatible server room provides a greater level of protection against attacks.
A. Employing a librarian or custodian
B. Using a check-in/check-out process
C. Hashing
D. Using sanitization tools on returned media
Answer: C
Hashing is not a typical security measure implemented in relation to a media storage facility containing reusable removable media. Hashing is used when it is necessary to verify the integrity of a dataset, while data on reusable removable media should be removed and not retained. Usually the security features for a media storage facility include using a librarian or custodian, using a check-in/check-out process, and using sanitization tools on returned media.
A. Gate
B. Turnstile
C. Mantrap
D. Proximity detector
Answer: C
A mantrap is a double set of doors that is often protected by a guard and used to contain a subject until their identity and authentication is verified.
A. Security guards
B. Fences
C. CCTV
D. Lighting
Answer: D
Lighting is the most common form of perimeter security devices or mechanisms. Your entire site should be clearly lit. This provides for easy identification of personnel and makes it easier to notice intrusions.
A. Security guards are usually unaware of the scope of the operations within a facility.
B. Not all environments and facilities support security guards.
C. Not all security guards are themselves reliable.
D. Prescreening, bonding, and training does not guarantee effective and reliable security guards.
Answer: A
Security guards are usually unaware of the scope of the operations within a facility, which supports confidentiality of those operations and thus helps reduce the possibility that a security guard will be involved in the disclosure of confidential information.
A. Water shortage
B. People
C. Ionization detectors
D. Placement of detectors in drop ceilings
Answer: B
The most common cause of failure for a water-based system is human error. If you turn off the water source after a fire and forget to turn it back on, you’ll be in trouble for the future. Also, pulling an alarm when there is no fire will trigger damaging water release throughout the office.
A. Lighting
B. Security guard
C. Key locks
D. Fences
Answer: C
Key locks are the most common and inexpensive form of physical access control device. Lighting, security guards, and fences are all much more costly.
A. Wave
B. Photoelectric
C. Heat
D. Capacitance
Answer: D
A capacitance motion detector senses changes in the electrical or magnetic field surrounding a monitored object.
A. Preventive
B. Deterrent
C. Repellant
D. Notification
Answer: A
There is no such thing as a preventive alarm. Alarms are always triggered in response to a detected intrusion or attack.
A. Piggybacking
B. Espionage
C. Masquerading
D. Abuse
Answer: B
No matter what form of physical access control is used, a security guard or other monitoring system must be deployed to prevent abuse, masquerading, and piggybacking. Espionage cannot be prevented by physical access controls.
A. Prevention of disclosure
B. Maintaining integrity
C. Human safety
D. Sustaining availability
Answer: C
Human safety is the most important goal of all security solutions.
A. 20–40 percent
B. 40–60 percent
C. 60–75 percent
D. 80–95 percent
Answer: B
The humidity in a computer room should ideally be from 40 to 60 percent.
A. 4,000
B. 17,000
C. 40
D. 1,500
Answer: D
Destruction of data stored on hard drives can be caused by 1,500 volts of static electricity.
A. Water
B. CO2
C. Halon or an acceptable halon substitute
D. Soda acid
Answer: A
Water is never the suppression medium in Type B fire extinguishers because they are used on liquid fires.
A. Wet pipe system
B. Dry pipe system
C. Preaction system
D. Deluge system
Answer: C
A preaction system is the best type of water-based fire suppression system for a computer facility.
A. Heat
B. Suppression medium
C. Smoke
D. Light
Answer: D
Light is usually not damaging to most computer equipment, but fire, smoke, and the suppression medium (typically water) are very destructive.