Which form of cabling is least susceptible to EM interference?
a. STP
b. UTP
c. Coaxial
d. Fiber optic
Answer: D
Fiber-optic cabling is least subject to electromagnetic interference because its communications are conducted by transmitting pulses of light over glass, plastic, or sapphire transmission fibers. Twisted-pair (shielded STP as well as unshielded UTP) copper cables provide minimal shielding against interference but can function as antenna picking up nearby EM sources when extended over long cable runs, making answers A and B incorrect. Answer C is incorrect because although coaxial cables limit EM interference by encasing one conductor in a sheath of conductive material, they are still conductive and not as resistant as purely optical forms of communication.
Learn More :
Physical and Hardware-Based Security
- A new switch has been implemented in areas where there is very little physical access control. Which of the following would the organization implement as a method for additional checks to prevent unauthorized access?
- Which of the following statements are true when discussing physical security? (Select all correct answers.)
- Which of the following methods would be the most effective method to physically secure computers that are used in a lab environment that operates on a part-time basis?
- Which of the following methods is the most effective way to physically secure laptops that are used in an environment such as an office?
- Which of the following is a high-security installation that requires visual identification, as well as authentication, to gain access?
- Which of the following is a method of cooling server racks in which hot air and cold are both handled in the server room?
- For physical security, what should you do with rack-mounted servers?
- RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the following?
- If RF levels become too high, it can cause the receivers in wireless units to become deaf. This process is called:
- In a hot and cold aisle system, what is the typical method of handling cold air?
- Proximity readers work with which of the following? (Choose all that apply.)
- Type K fire extinguishers are intended for use on cooking oil fires. This type is a subset of which other type of fire extinguisher?
- Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
- You work for an electronics company that has just created a device that emits less RF than any competitor's product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
- The process of reducing or eliminating susceptibility to outside interference is called what?
- Which technology uses a physical characteristic to establish identity?
- You're the leader of the security committee at ACME. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
- Which of the following is an example of perimeter security?
- After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
- Which of the following is equivalent to building walls in an office building from a network perspective?
- You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
- You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
- Which of the following won't reduce EMI?
- You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?