3.1.4 Section Quiz

pdf

School

Eastern Gateway Community College *

*We aren’t endorsed by this school

Course

NET232

Subject

Computer Science

Date

Feb 20, 2024

Type

pdf

Pages

6

Uploaded by AmbassadorDiscovery11913

Report
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 1/6 Score: 80% Passing Score: 80% Question 1: Correct Which of the following are solutions that address physical security? (Select two.) Implement complex passwords Disable guest accounts on computers Scan all floppy disks before use Escort visitors at all times Require identification and name badges for all employees Explanation Physical security controls physical access to the network or its components. Physical security controls include: Requiring identification or key cards before entry is permitted Escorting visitors at all times Keeping doors and windows locked Keeping devices with sensitive information out of view of public users Keeping the server room locked (locking computers to racks or tables to prevent theft) Implementing complex password, disabling guest accounts on computers, and scanning all floppy disks before use are not considered physical security controls. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security q_phys_sec_badges_01_secp7.question.fex Question 2: Incorrect You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. You've hired a third-party security consultant to review your organization's security measures. She has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you provide employees with access badges and implement access badge readers to prevent this from happening in the future. Click on the office locations where access badge readers would be most appropriate. INDIVIDUAL RESPONSES OBJECTIVE ANALYSIS
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 2/6 Explanation Access badge readers are typically implemented at building entrances to control access to a facility. Only individuals who have an authorized access badge are allowed to enter the facility. Individuals who do not have an access badge must be cleared and admitted by security personnel. Additional access badge readers can be implemented within the facility to further restrict access to sensitive areas, such as the server room. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security q_phys_sec_badges_02_secp7.question.fex Question 3: Correct If a fingerprint or retina scan is required to open a secured door, which kind of physical security has been implemented? Biometric locks Access list Double-entry door Mantrap Explanation Biometric locks use unique physical characteristics of a person to authenticate his or her access to a secured item. Often, these locks take the form of fingerprint scanners or retina scanners. An access list is incorrect because it is a list of names that a guard checks. Mantraps and double-entry doors are also incorrect because they are styles of entryways and don't check physical characteristics. References 3.1.2 Physical Security Facts 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_phys_sec_biometric_secp7.question.fex Question 4: Correct
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 3/6 Which option is a benefit of CCTV? Reduce the need for locks and sensors on doors Provide a corrective control Increase security protection throughout an environment Expand the area visible by security guards Explanation A primary benefit of CCTV is that it expands the area visible by security guards. This helps few guards oversee and monitor a larger area. CCTV does not reduce the need for locks and sensors on doors and does not provide a corrective control (it is a preventative, deterrent, or detective control). CCTV does not increase security protection throughout an environment, as the range is limited to areas over which it is aimed. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security q_phys_sec_cctv_01_secp7.question.fex Question 5: Correct You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose? PTZ Bullet Dome C-mount Explanation A Pan Tilt Zoom (PTZ) camera lets you dynamically move the camera and zoom in on specific areas (cameras without PTZ capabilities are set looking a specific direction). Automatic PTZ mode automatically moves the camera between several preset locations. Manual PTZ lets an operator remotely control the position of the camera. A bullet camera has a built-in lens and is long and round in shape. Most bullet cameras can be used indoors or outdoors. A c-mount camera has interchangeable lenses, is typically rectangular in shape, and carries the lens on its end. Most c-mount cameras require special housing to be used outdoors. A dome camera is a camera protected with a plastic or glass dome. These cameras are more vandal-resistant than other cameras. Bullet, c-mount, or dome cameras can also be PTZ cameras. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security q_phys_sec_cctv_02_secp7.question.fex Question 6: Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 4/6 Which of the following controls is an example of a physical access control method? Hiring background checks Passwords Smart cards Access control lists with permissions Locks on doors Explanation Locks on doors are an example of a physical access control method. Physical controls restrict or control physical access. Passwords, access control lists, and smart cards are all examples of technical controls. Even though a smart card is a physical object, the card by itself is a part of a technical implementation. Requiring background checks for hiring is an example of a policy or an administrative control. References 3.1.2 Physical Security Facts q_phys_sec_door_secp7.question.fex Question 7: Correct Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry? Use key locks rather than electronic locks Use weight scales Install security cameras Deploy a mantrap Explanation Piggybacking is when an authorized or unauthorized individual gains entry into a secured area by exploiting the credentials of a prior person. Often, the first person authenticates, unlocks the door, and then holds it open for the next person to enter without forcing them to authenticate separately. Piggybacking can be stopped by a mantrap. A mantrap is a single-person room with two doors. It often includes a scale to prevent piggybacking. Mantraps requires proper authentication before the inner door unlocks to allow authorized personal into a secured area. Those who fail to properly authenticate are held captive until authorities respond. A security camera may deter piggybacking, but it does not directly stop it. Using weight scales inside a mantrap stops piggybacking, but they are not useful or effective without the mantrap. The use of conventional keys as opposed to electronic locks has little effect on preventing piggybacking and may actually make piggybacking more prevalent. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security q_phys_sec_mantrap_secp7.question.fex Question 8: Incorrect After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring?
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 5/6 Recovery Prevention Detection Data breach Explanation Recovery is the phase after a breach has occurred in which damage from the event is repaired and a review is made to determine what should be done to prevent future incidents of the same nature. Prevention is incorrect because it is the phase before a breach occurs. Detection is incorrect because it is the phase when the breach itself is discovered. A data breach may be the result of a physical security incident, but is not one of the phases. References 3.1.2 Physical Security Facts 12.1.1 Incident Response Process q_phys_sec_recovery_secp7.question.fex Question 9: Correct Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access? Smart card Biometric locks Proximity card Keypad locks Explanation Unlike proximity cards that only transmit the owner's identity, smart cards can contain and transmit many more pieces of information. Biometric locks and keypad locks don't transmit data wirelessly. In contrast, they require physical interaction. References 6.2.3 Authentication Facts 6.6.12 Smart Card Authentication Facts q_phys_sec_smartcards_secp7.question.fex Question 10: Correct Which of the following allows an easy exit of an area in the event of an emergency, but also prevents entry? (Select two.) Mantrap Turnstile PTZ CCTV Bollard Double-entry door Explanation
10/15/23, 11:35 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/6f275ed4-740f-48e1-88c4-dfaedfd63bb1/exam-session/31151894/68ec89c7-1976-4bbb-8… 6/6 A double-entry door has two doors that are locked from the outside and have crash bars on the inside, allowing for an easy exit. Double-entry doors are typically used only for emergency exits, and alarms sound when the doors are opened. A turnstile is a barrier that permits entry in only one direction. Turnstiles are often used to permit easy exit from a secure area. Entry is controlled through a mantrap or other system that requires authentication for entry. A mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas. Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided. This may include visual identification and identification credentials. Bollards are short, sturdy posts used to prevent a car from crashing into a secure area.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help