Which of the following statements are true when discussing physical security? (Select all correct answers.)
a. Physical security attempts to control access to data from Internet users.
b. Physical security attempts to control unwanted access to specified areas of a building.
c. Physical security attempts to control the effect of natural disasters on facilities and equipment.
d. Physical security attempts to control internal employee access into secure areas.
Answer: B, C & D.
Natural disasters, unwanted access, and user restrictions are all physical security issues. Preventing Internet users from getting to data is data security, not physical security; therefore, answer A is incorrect.
Learn More :
Physical and Hardware-Based Security
- A new switch has been implemented in areas where there is very little physical access control. Which of the following would the organization implement as a method for additional checks to prevent unauthorized access?
- Which form of cabling is least susceptible to EM interference?
- Which of the following methods would be the most effective method to physically secure computers that are used in a lab environment that operates on a part-time basis?
- Which of the following methods is the most effective way to physically secure laptops that are used in an environment such as an office?
- Which of the following is a high-security installation that requires visual identification, as well as authentication, to gain access?
- Which of the following is a method of cooling server racks in which hot air and cold are both handled in the server room?
- For physical security, what should you do with rack-mounted servers?
- RFI is the byproduct of electrical processes, similar to EMI. The major difference is that RFI is usually projected across which of the following?
- If RF levels become too high, it can cause the receivers in wireless units to become deaf. This process is called:
- In a hot and cold aisle system, what is the typical method of handling cold air?
- Proximity readers work with which of the following? (Choose all that apply.)
- Type K fire extinguishers are intended for use on cooking oil fires. This type is a subset of which other type of fire extinguisher?
- Due to growth beyond current capacity, a new server room is being built. As a manager, you want to make certain that all the necessary safety elements exist in the room when it's finished. Which fire-suppression system works best when used in an enclosed area by displacing the air around a fire?
- You work for an electronics company that has just created a device that emits less RF than any competitor's product. Given the enormous importance of this invention and of the marketing benefits it could offer, you want to have the product certified. Which certification is used to indicate minimal electronic emissions?
- The process of reducing or eliminating susceptibility to outside interference is called what?
- Which technology uses a physical characteristic to establish identity?
- You're the leader of the security committee at ACME. After a move to a new facility, you're installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
- Which of the following is an example of perimeter security?
- After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
- Which of the following is equivalent to building walls in an office building from a network perspective?
- You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
- You're the administrator for MTS. You're creating a team that will report to you, and you're attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
- Which of the following won't reduce EMI?
- You've been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?