Security+ Study Guide

1. 

The component of physical security that addresses outer-level access control is called what?

  1. Perimeter security

  2. Mantraps

  3. Security zones

  4. Locked doors

2. 

Which of the following categories of fire extinguisher are intended for electrical fires?

  1. Type A

  2. Type B

  3. Type C

  4. Type D

3. 

Which of the following will not reduce EMI?

  1. Physical shielding

  2. Humidity control

  3. Physical location

  4. Overhauling worn motors

4. 

Which access method breaks a large area into smaller areas that can be monitored individually?

  1. Zone

  2. Partition

  3. Perimeter

  4. Floor

5. 

Which of the following is equivalent to building walls in an office building from a network perspective?

  1. Perimeter security

  2. Partitioning

  3. Security zones

  4. IDS systems

6. 

The process of preventing access to computer systems in a building is called what?

  1. Perimeter security

  2. Access control

  3. Security zones

  4. IDS systems

7. 

Which of the following is an example of perimeter security?

  1. Chain link fence

  2. Video camera

  3. Elevator

  4. Locked computer room

8. 

Which of following best describes a motion detector mounted in the corner of a hallway?

  1. Perimeter security

  2. Partitioning

  3. Security zones

  4. IDS system

9. 

What is the technology that uses a physical characteristic to establish identity called?

  1. Biometrics

  2. Surveillance

  3. Smart card

  4. CHAP authenticator

10. 

An attack that attempts to use human shortcomings, as opposed to technological methods, to gain access is called what?

  1. Social engineering

  2. IDS system

  3. Perimeter security

  4. Biometrics

11. 

Wireless cells have which of the following characteristics?

  1. Line-of-site communications

  2. Automatic position location

  3. High-power portable devices

  4. High levels of security

12. 

GSM is an example of which technology?

  1. Perimeter security

  2. Surveillance system

  3. Security zones

  4. Cell technology

13. 

The process of reducing or eliminating susceptibility to outside interference is called what?

  1. Shielding

  2. EMI

  3. TEMPEST

  4. Desensitization

14. 

Which certification is used to indicate minimal electronic emissions?

  1. EMI

  2. RFI

  3. CC EAL 4

  4. TEMPEST

15. 

Which term defines the process of a WAP losing sensitivity due to RFI?

  1. RFI desensitization

  2. EMI pickup

  3. Access control

  4. TEMPEST

16. 

Which fire suppression system works best when used in an enclosed area?

  1. Gas-based

  2. Water-based

  3. Fixed system

  4. Overhead sprinklers

17. 

The CBF identifies which aspects of a business?

  1. Access control

  2. Critical access points

  3. Essential business functions

  4. BIA

18. 

Which documents identify the methods used to accomplish a given task?

  1. Policy

  2. Standard

  3. Guidelines

  4. BIA

19. 

Which classification of information designates that information can be released on a restricted basis to outside organizations?

  1. Private information

  2. Full distribution

  3. Restricted information

  4. Limited distribution

20. 

Which information access control prevents users from writing information down to the lower level of security and prevents users from reading above their level of security?

  1. Bell La-Padula model

  2. Biba model

  3. Clark-Wilson model

  4. Noninterference model

Answers

1. 

A. The first layer of access control is perimeter security. Perimeter security is intended to delay or deter entrance into a facility.

2. 

C. Type C fire extinguishers are intended for use in electrical fires.

3. 

B. EMI is caused by electrical devices, such as motors, that generate magnetic fields. Humidity control will not address EMI.

4. 

A. A security zone is a smaller part of a larger area. Security zones can be monitored individually if needed. Answers B, C, and D are examples of security zones.

5. 

B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. This is the same as building walls in an office building.

6. 

B. Access control is the primary process of preventing access to physical systems. Answers A and B are part of the access control process.

7. 

A. Perimeter security involves creating a perimeter or outer boundary for the physical space. Video surveillance systems would not be considered a part of perimeter security, but they can be used to enhance physical security monitoring.

8. 

C. A security zone is an area that is a smaller component of the entire facility. Security zones allow intrusions to be detected in specific parts of the building.

9. 

A. Biometrics is a technology that uses personal characteristics, such as a retinal pattern or fingerprint, to establish identity.

10. 

A. Social engineering uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

11. 

A. Wireless cell systems are primarily line-of-site communication systems. These systems use the microwave band for communications.

12. 

D. Global System for Mobile Communications (GSM) is the newest standard for cellular communications. GSM promises to provide encryption, as well as international usability.

13. 

A. Shielding keeps external electronic signals from disrupting operations.

14. 

D. TEMPEST is the certification given to electronic devices that emit minimal RF emissions. The TEMPEST certification is very difficult to acquire, and it significantly increases the cost of systems.

15. 

A. Receivers tend to desensitize when they are exposed to strong RF signals. This makes the receiver in the WAP seemingly go deaf to normal-strength signals.

16. 

A. Gas-based systems work by displacing the air around a fire. This eliminates one of the three necessary components of a fire.

17. 

C. The critical business functions are those functions that must be established as soon as possible for the business to succeed.

18. 

C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards.

19. 

D. Limited distribution information can be released to select individuals and organizations, such as financial institutions, governmental agencies, and creditors.

20. 

A. The Bell La-Padula model is intended to protect confidentiality of information. This is accomplished by prohibiting users from reading above their security level and keeps them from writing below their security level.

Категории