Deck 7: Physical and Environmental Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following does not destroy the data on a hard drive?

A) Disk wiping
B) Data destruction
C) Formatting
D) Degaussing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following can permanently remove data from a drive?

A) Deleting and formatting
B) Deleting and disk wiping
C) Formatting and degaussing
D) Disk wiping and degaussing
سؤال
Which of the following statements best describes hidden files?

A) Temporary storage of web documents, such as HTML pages and downloads
B) Files that the operating system by design does not display
C) A temporary holding area for files being created
D) Files that authorized users can view and access
سؤال
Which of the following statements about formatting is not true?

A) System recovery software can be used to restore data from a formatted disk.
B) Formatting permanently deletes the files on a disk.
C) Formatting erases the operating system address tables.
D) All of the above
سؤال
Which of the following statements best describes metadata?

A) Information about websites visited
B) Files that the operating system by design does not display
C) Details about a file that describes or identifies it
D) Temporary storage area for web documents
سؤال
Which of the following statements best describes a cookie?

A) File with information about websites visited
B) File that the operating system by design does not display
C) Details about a file that describe or identify it
D) Temporary storage area for web documents
سؤال
Which of the following is a temporary storage for web documents such as HTML pages and downloads?

A) Data cache
B) Metadata
C) Web cache
D) Cookies
سؤال
Which of the following is an example of a browser-based data?

A) Cookies
B) Form history
C) Search bar history
D) All of the above
سؤال
Layered defense for securing facilities is both physical and __________.

A) alarmed
B) psychological
C) monitored
D) structural
سؤال
Class C fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
سؤال
Class A fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
سؤال
The design of a secure site starts with the __________ of the site.

A) scope
B) dimensions
C) storage needs
D) location
سؤال
Which of the following is the first line of defense for fires?

A) Fire detection controls
B) Fire prevention controls
C) Fire containment controls
D) Fire suppression controls
سؤال
Which of the following is an example of a fire prevention control?

A) Fire containment equipment
B) Fire extinguishers
C) Fire suppressors
D) Adhering to building and construction codes
سؤال
Fences used in perimeter security should be at least how many feet in height?

A) 6
B) 7
C) 8
D) 9
سؤال
Which of the following refers to a prolonged increase in voltage (minutes or hours)?

A) Power surge
B) Power spike
C) Sag
D) Fault
سؤال
Which of the following refers to a prolonged period of power loss (hours or days)?

A) Fault
B) Brownout
C) Sag
D) Blackout
سؤال
Which of the following is defined by NIST as "the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive."

A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody
سؤال
Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data's encryption key?

A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Physical and Environmental Security
1
Which of the following does not destroy the data on a hard drive?

A) Disk wiping
B) Data destruction
C) Formatting
D) Degaussing
Formatting
2
Which of the following can permanently remove data from a drive?

A) Deleting and formatting
B) Deleting and disk wiping
C) Formatting and degaussing
D) Disk wiping and degaussing
Disk wiping and degaussing
3
Which of the following statements best describes hidden files?

A) Temporary storage of web documents, such as HTML pages and downloads
B) Files that the operating system by design does not display
C) A temporary holding area for files being created
D) Files that authorized users can view and access
Files that the operating system by design does not display
4
Which of the following statements about formatting is not true?

A) System recovery software can be used to restore data from a formatted disk.
B) Formatting permanently deletes the files on a disk.
C) Formatting erases the operating system address tables.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following statements best describes metadata?

A) Information about websites visited
B) Files that the operating system by design does not display
C) Details about a file that describes or identifies it
D) Temporary storage area for web documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following statements best describes a cookie?

A) File with information about websites visited
B) File that the operating system by design does not display
C) Details about a file that describe or identify it
D) Temporary storage area for web documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a temporary storage for web documents such as HTML pages and downloads?

A) Data cache
B) Metadata
C) Web cache
D) Cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is an example of a browser-based data?

A) Cookies
B) Form history
C) Search bar history
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
9
Layered defense for securing facilities is both physical and __________.

A) alarmed
B) psychological
C) monitored
D) structural
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
10
Class C fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
11
Class A fire extinguishers are best suited for which of the following fires?

A) Computer equipment fires
B) Fires in document storage areas
C) Fires with liquids and gases
D) Fires involving metals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
12
The design of a secure site starts with the __________ of the site.

A) scope
B) dimensions
C) storage needs
D) location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is the first line of defense for fires?

A) Fire detection controls
B) Fire prevention controls
C) Fire containment controls
D) Fire suppression controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is an example of a fire prevention control?

A) Fire containment equipment
B) Fire extinguishers
C) Fire suppressors
D) Adhering to building and construction codes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
15
Fences used in perimeter security should be at least how many feet in height?

A) 6
B) 7
C) 8
D) 9
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following refers to a prolonged increase in voltage (minutes or hours)?

A) Power surge
B) Power spike
C) Sag
D) Fault
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following refers to a prolonged period of power loss (hours or days)?

A) Fault
B) Brownout
C) Sag
D) Blackout
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is defined by NIST as "the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive."

A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following refers to a technique that uses the encryption of target data by enabling sanitization of the target data's encryption key?

A) Degaussing
B) Shoulder surfing
C) Cryptographic erase
D) Layered defense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.