3.2.5 Section Quiz
pdf
keyboard_arrow_up
School
Eastern Gateway Community College *
*We aren’t endorsed by this school
Course
NET232
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
6
Uploaded by AmbassadorDiscovery11913
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
1/6
Score: 100%
Passing Score: 80%
Question 1:
Correct
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles.
You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection
implementation to address your concerns?
Encrypt all company data on hard drives.
Implement screen saver passwords.
Use cable locks to chain the laptops to the desks.
Require strong passwords in the Local Security
Policy.
Explanation
In this case, your main concern is that someone might steal the laptops. The best protection against physical theft is to secure the
laptops in place using a cable lock.
Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but these
measures do not prevent physical theft.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.3 Physical Network Protection
3.2.4 Physical Network Protection Facts
q_hdw_sec_cable_lock_secp7.question.fex
Question 2:
Correct
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not
able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network
to set up remote access or backdoor access.
Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select
two. Each measure is part of a complete solution.)
Place your networking equipment in a Van Eck
cage.
Place your networking equipment in a Faraday
cage.
Place your networking equipment in a locked cage.
Place your networking equipment in a TEMPEST
cage.
Place your networking equipment in a room that
requires key card entry.
INDIVIDUAL RESPONSES
OBJECTIVE ANALYSIS
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
2/6
Explanation
Placing your networking equipment in a locked cage inside of a locked room that also requires key card access is the best way to
physically secure your network from an attacker who would attempt to gain physical access.
A Faraday cage prevents attackers from using Van Eck phreaking to gather electronic emissions coming from your networking closet.
The government uses a special emission security specification called TEMPEST that requires the use of a Faraday cage.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.3 Physical Network Protection
3.2.4 Physical Network Protection Facts
q_hdw_sec_cards.secp7.question.fex
Question 3:
Correct
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you
note the following:
When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office
manager sits.
The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the
server closet.
She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media.
You notice the organization's network switch is kept in the server closet.
You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal
network from external attacks.
The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much
data as possible in the process. You take the workstation back to your office to work on it.
Which security-related recommendations should you make to this client?
Upgrade the server closet lock to a biometric
authentication system.
Replace the tape drive used for backups with
external USB hard disks.
Keep the network infrastructure devices (switch
and all-in-one device) in a locked room separate
from network servers.
Implement a hardware checkout policy.
Explanation
In this scenario, you should recommend the client implement a hardware checkout policy. A checkout policy ensures that hardware
containing sensitive data does not leave the organization's premises without approval and without recording the device's serial number,
make, and model number.
A biometric server room lock is probably not necessary in this scenario. It is acceptable to keep servers and network devices, such as
routers and switches, in the same room, as long as that room is kept secure. There's no security advantage to using external hard
drives instead of tape backup media.
References
3.2.2 Hardware Security Facts
q_hdw_sec_check_pol_secp7.question.fex
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
3/6
Question 4:
Correct
Which of the following is the most important thing to do to prevent console access to the router?
Keep the router in a locked room.
Implement an access list to prevent console
connections.
Disconnect the console cable when not in use.
Set the console and enable secret passwords.
Explanation
To control access to the router console, you must keep the router in a locked room. A console connection can only be established with a
direct physical connection to the router. If the router is in a locked room, only those with access are able to make a console connection.
In addition, even if you had set console passwords, users with physical access to the router could perform router password recovery
and gain access.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.4 Physical Network Protection Facts
q_hdw_sec_phys_lock_secp7.question.fex
Question 5:
Correct
Burning, pulping, and shredding are three ways to securely dispose of data in which form?
Paper
Disk
Cloud
Tape
Explanation
Although tape and disk could be destroyed by industrial shredders, pulping can only be done to paper by using water and chemicals to
dissolve the paper.
Data in the cloud must be disposed of with tools from the cloud provider.
References
3.2.2 Hardware Security Facts
q_hdw_sec_secure_data_secp7.question.fex
Question 6:
Correct
A computer or small network that is not connected to the rest of the network or the internet is known as:
Air gap
Faraday cage
Vault
DMZ
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
4/6
Explanation
An air gap is a physical break between a computer or a small network to isolate it from potential threats.
DMZ is incorrect because a DMZ is connected to other network segments.
A vault provides physical protection for network equipment.
A Faraday cage prevents wireless emissions from being leaked.
References
3.1.1 Physical Security
3.1.3 Implement Physical Security
3.2.4 Physical Network Protection Facts
q_phys_net_prot_air_gap_secp7.question.fex
Question 7:
Correct
Which device is used to allow a USB device to charge but blocks the data transfer capabilities of the device?
Bollard
Faraday cage
USB data blocker
Air gap
Explanation
A USB data blocker prevents data from being transmitted while allowing the device to draw power. This is useful for charging devices
on unknown USB ports, such as those at public charging stations.
An air gap is a network or device not connected to the rest of the network.
A bollard is physical protection to keep a vehicle from crashing into a secured area.
A Faraday cage prevents wireless emissions from being leaked.
References
3.1.1 Physical Security
3.1.2 Physical Security Facts
3.1.3 Implement Physical Security
3.2.4 Physical Network Protection Facts
q_phys_net_prot_blocker_secp7.question.fex
Question 8:
Correct
Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to
prevent emissions from being retrieved from the air?
Faraday cage
PDS
Air gap
USB data blocker
Explanation
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
5/6
A protective distribution system (PDS) keeps cabling secure while also preventing electronic emissions.
A USB data blocker prevents data from being transmitted while allowing the device to draw power.
An air gap is a network or device not connected to the rest of the network.
A Faraday cage prevents wireless emissions from being leaked, but it does not protect cabling.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.3 Physical Network Protection
3.2.4 Physical Network Protection Facts
q_phys_net_prot_cable_secp7.question.fex
Question 9:
Correct
Which special network area is used to provide added protection by isolating publicly accessible servers?
VLAN
Internet
Intranet
DMZ
Explanation
A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly
accessible servers like web servers and email servers.
A VLAN may be used to create a DMZ, but it is not inherently a DMZ.
The internet and intranet zones are the areas on the outside and inside of a network that a DMZ is designed to protect.
References
3.1.1 Physical Security
3.1.2 Physical Security Facts
3.1.3 Implement Physical Security
3.2.4 Physical Network Protection Facts
5.2.4 DMZ Facts
q_phys_net_prot_dmz_secp7.question.fex
Question 10:
Correct
A Faraday cage is used to prevent what from leaving an area?
Hackers
Electromagnetic emissions
Network packets
Computers
Explanation
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
6/6
Faraday cages are used to prevent electromagnetic emissions like wireless signals from leaving the cage. They are generally used in
very high-security areas.
Network packets could leave a Faraday cage through a shielded cable.
Hackers and computers could be physically moved outside of a Faraday cage.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help