3.2.5 Section Quiz

pdf

School

Eastern Gateway Community College *

*We aren’t endorsed by this school

Course

NET232

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

6

Uploaded by AmbassadorDiscovery11913

Report
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 1/6 Score: 100% Passing Score: 80% Question 1: Correct Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns? Encrypt all company data on hard drives. Implement screen saver passwords. Use cable locks to chain the laptops to the desks. Require strong passwords in the Local Security Policy. Explanation In this case, your main concern is that someone might steal the laptops. The best protection against physical theft is to secure the laptops in place using a cable lock. Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but these measures do not prevent physical theft. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_hdw_sec_cable_lock_secp7.question.fex Question 2: Correct Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access. Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.) Place your networking equipment in a Van Eck cage. Place your networking equipment in a Faraday cage. Place your networking equipment in a locked cage. Place your networking equipment in a TEMPEST cage. Place your networking equipment in a room that requires key card entry. INDIVIDUAL RESPONSES OBJECTIVE ANALYSIS
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 2/6 Explanation Placing your networking equipment in a locked cage inside of a locked room that also requires key card access is the best way to physically secure your network from an attacker who would attempt to gain physical access. A Faraday cage prevents attackers from using Van Eck phreaking to gather electronic emissions coming from your networking closet. The government uses a special emission security specification called TEMPEST that requires the use of a Faraday cage. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_hdw_sec_cards.secp7.question.fex Question 3: Correct You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet. She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media. You notice the organization's network switch is kept in the server closet. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much data as possible in the process. You take the workstation back to your office to work on it. Which security-related recommendations should you make to this client? Upgrade the server closet lock to a biometric authentication system. Replace the tape drive used for backups with external USB hard disks. Keep the network infrastructure devices (switch and all-in-one device) in a locked room separate from network servers. Implement a hardware checkout policy. Explanation In this scenario, you should recommend the client implement a hardware checkout policy. A checkout policy ensures that hardware containing sensitive data does not leave the organization's premises without approval and without recording the device's serial number, make, and model number. A biometric server room lock is probably not necessary in this scenario. It is acceptable to keep servers and network devices, such as routers and switches, in the same room, as long as that room is kept secure. There's no security advantage to using external hard drives instead of tape backup media. References 3.2.2 Hardware Security Facts q_hdw_sec_check_pol_secp7.question.fex
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 3/6 Question 4: Correct Which of the following is the most important thing to do to prevent console access to the router? Keep the router in a locked room. Implement an access list to prevent console connections. Disconnect the console cable when not in use. Set the console and enable secret passwords. Explanation To control access to the router console, you must keep the router in a locked room. A console connection can only be established with a direct physical connection to the router. If the router is in a locked room, only those with access are able to make a console connection. In addition, even if you had set console passwords, users with physical access to the router could perform router password recovery and gain access. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.4 Physical Network Protection Facts q_hdw_sec_phys_lock_secp7.question.fex Question 5: Correct Burning, pulping, and shredding are three ways to securely dispose of data in which form? Paper Disk Cloud Tape Explanation Although tape and disk could be destroyed by industrial shredders, pulping can only be done to paper by using water and chemicals to dissolve the paper. Data in the cloud must be disposed of with tools from the cloud provider. References 3.2.2 Hardware Security Facts q_hdw_sec_secure_data_secp7.question.fex Question 6: Correct A computer or small network that is not connected to the rest of the network or the internet is known as: Air gap Faraday cage Vault DMZ
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 4/6 Explanation An air gap is a physical break between a computer or a small network to isolate it from potential threats. DMZ is incorrect because a DMZ is connected to other network segments. A vault provides physical protection for network equipment. A Faraday cage prevents wireless emissions from being leaked. References 3.1.1 Physical Security 3.1.3 Implement Physical Security 3.2.4 Physical Network Protection Facts q_phys_net_prot_air_gap_secp7.question.fex Question 7: Correct Which device is used to allow a USB device to charge but blocks the data transfer capabilities of the device? Bollard Faraday cage USB data blocker Air gap Explanation A USB data blocker prevents data from being transmitted while allowing the device to draw power. This is useful for charging devices on unknown USB ports, such as those at public charging stations. An air gap is a network or device not connected to the rest of the network. A bollard is physical protection to keep a vehicle from crashing into a secured area. A Faraday cage prevents wireless emissions from being leaked. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security 3.2.4 Physical Network Protection Facts q_phys_net_prot_blocker_secp7.question.fex Question 8: Correct Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to prevent emissions from being retrieved from the air? Faraday cage PDS Air gap USB data blocker Explanation
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 5/6 A protective distribution system (PDS) keeps cabling secure while also preventing electronic emissions. A USB data blocker prevents data from being transmitted while allowing the device to draw power. An air gap is a network or device not connected to the rest of the network. A Faraday cage prevents wireless emissions from being leaked, but it does not protect cabling. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_phys_net_prot_cable_secp7.question.fex Question 9: Correct Which special network area is used to provide added protection by isolating publicly accessible servers? VLAN Internet Intranet DMZ Explanation A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers. A VLAN may be used to create a DMZ, but it is not inherently a DMZ. The internet and intranet zones are the areas on the outside and inside of a network that a DMZ is designed to protect. References 3.1.1 Physical Security 3.1.2 Physical Security Facts 3.1.3 Implement Physical Security 3.2.4 Physical Network Protection Facts 5.2.4 DMZ Facts q_phys_net_prot_dmz_secp7.question.fex Question 10: Correct A Faraday cage is used to prevent what from leaving an area? Hackers Electromagnetic emissions Network packets Computers Explanation
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 6/6 Faraday cages are used to prevent electromagnetic emissions like wireless signals from leaving the cage. They are generally used in very high-security areas. Network packets could leave a Faraday cage through a shielded cable. Hackers and computers could be physically moved outside of a Faraday cage.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help