Deck 16: Physical and Infrastructure Security

ملء الشاشة (f)
exit full mode
سؤال
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
High humidity does not pose a threat to electrical and electronic
equipment as long as the computer's temperature stays within the optimal range.
سؤال
The CHUID is a PIV card data object.
سؤال
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
سؤال
For information systems,the role of logical security is to protect the
physical assets that support the storage and processing of information.
سؤال
A person that becomes statically charged can damage electronic
equipment by an electric discharge.
سؤال
The direct flame is the only threat from fire.
سؤال
Low-intensity devices such as cellular telephones do not interfere with
electronic equipment.
سؤال
Physical security must prevent misuse of the physical infrastructure
that leads to the misuse or damage of the protected information.
سؤال
________ security protects computer-based data from software-based and communication-based threats.

A)Infrastructure
B)Premises
C)Physical
D)Logical
سؤال
________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

A)Supporting facilities
B)Physical facilities
C)Information system hardware
D)Infrastructure facilities
سؤال
Unauthorized physical access can lead to other threats.
سؤال
If a computer's temperature gets too cold the system can undergo
thermal shock when it is turned on.
سؤال
Misuse of the physical infrastructure includes vandalism,theft of
equipment,theft by copying,theft of services,and unauthorized entry.
سؤال
Human-caused threats are less predictable than other types of physical
threats.
سؤال
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

A)Premises
B)Infrastructure
C)Logical
D)Physical
سؤال
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

A)Supporting
B)Information
C)Physical
D)All of the above
سؤال
The optimal temperature for computer systems is between 10 and 32
degrees Fahrenheit.
سؤال
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A)20% and 80%
B)40% and 60%
C)50% and 50%
D)30% and 70%
سؤال
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
سؤال
The security classification for a restricted area containing a security interest is _____.

A)controlled
B)exclusion
C)unrestricted
D)limited
سؤال
Eavesdropping and wiretapping fall into the ________ category.

A)theft
B)vandalism
C)misuse
D)unauthorized physical access
سؤال
The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .

A)static
B)portable
C)mobile
D)all of the above
سؤال
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

A)Smoke detectors
B)UPS
C)Water sensors
D)Equipment power off switches
سؤال
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A)Human-caused
B)Technical
C)EMI
D)Environmental
سؤال
_______ includes destruction of equipment and data.

A)Misuse
B)Vandalism
C)Theft
D)Unauthorized physical access
سؤال
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
سؤال
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
سؤال
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
سؤال
Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.
سؤال
Noise along a power supply line,motors,fans,heavy equipment,microwave relay antennas,and other computers are all sources of _________.
سؤال
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
سؤال
A restricted area within close proximity of a security interest has a classification of ______.

A)exclusion
B)controlled
C)limited
D)unrestricted
سؤال
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
سؤال
_______ threats encompass threats related to electrical power and electromagnetic emission.
سؤال
A prevalent concern that is often overlooked is ________.

A)overvoltage
B)undervoltage
C)dust
D)noise
سؤال
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

A)VIS
B)BIO
C)CHUID
D)CAK
سؤال
________ physical threats are more difficult to deal with than environmental and technical threats.
سؤال
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
سؤال
An area of a facility that has no security interest is classified as _________.

A)unrestricted
B)controlled
C)limited
D)exclusion
سؤال
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
سؤال
To deal with the threat of smoke,the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
سؤال
The most essential element of recovery from physical security breaches is ____.
سؤال
A(n)________ is a battery backup unit that can maintain power to processors,monitors,and other equipment and can also function as a surge protector,power noise filter,and an automatic shutdown device.
سؤال
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Physical and Infrastructure Security
1
Physical security must also prevent any type of physical access or
intrusion that can compromise logical security.
True
2
High humidity does not pose a threat to electrical and electronic
equipment as long as the computer's temperature stays within the optimal range.
False
3
The CHUID is a PIV card data object.
True
4
To implement a physical security program an organization must
conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
For information systems,the role of logical security is to protect the
physical assets that support the storage and processing of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
A person that becomes statically charged can damage electronic
equipment by an electric discharge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The direct flame is the only threat from fire.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Low-intensity devices such as cellular telephones do not interfere with
electronic equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
Physical security must prevent misuse of the physical infrastructure
that leads to the misuse or damage of the protected information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ security protects computer-based data from software-based and communication-based threats.

A)Infrastructure
B)Premises
C)Physical
D)Logical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ includes data processing and storage equipment,transmission and networking facilities,and offline storage media.

A)Supporting facilities
B)Physical facilities
C)Information system hardware
D)Infrastructure facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
Unauthorized physical access can lead to other threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
If a computer's temperature gets too cold the system can undergo
thermal shock when it is turned on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Misuse of the physical infrastructure includes vandalism,theft of
equipment,theft by copying,theft of services,and unauthorized entry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Human-caused threats are less predictable than other types of physical
threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
________ security provides perimeter security,access control,smoke and fire detection,fire suppression,some environmental protection,and usually surveillance systems,alarms,and guards.

A)Premises
B)Infrastructure
C)Logical
D)Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
_______ facilities include electrical power,communication services,and environmental controls such as heat and humidity.

A)Supporting
B)Information
C)Physical
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
The optimal temperature for computer systems is between 10 and 32
degrees Fahrenheit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A)20% and 80%
B)40% and 60%
C)50% and 50%
D)30% and 70%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Physical access control should address not just computers and other IS
equipment but also locations of wiring used to connect systems,equipment and distribution systems,telephone and communications lines,backup media,and documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The security classification for a restricted area containing a security interest is _____.

A)controlled
B)exclusion
C)unrestricted
D)limited
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
Eavesdropping and wiretapping fall into the ________ category.

A)theft
B)vandalism
C)misuse
D)unauthorized physical access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
The role of physical security is affected by the operating location of the information system,which can be characterized as ______ .

A)static
B)portable
C)mobile
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
_______ should be located on the floor of computer rooms as well as under raised floors,and should cut off power automatically in the event of a flood.

A)Smoke detectors
B)UPS
C)Water sensors
D)Equipment power off switches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A)Human-caused
B)Technical
C)EMI
D)Environmental
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
_______ includes destruction of equipment and data.

A)Misuse
B)Vandalism
C)Theft
D)Unauthorized physical access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
Tornados,tropical cyclones,earthquakes,blizzards,lightning,and floods are all types of ________ disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
_________ security,also called infrastructure security,protects the information systems that contain data and the people who use,operate,and maintain the systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
Human-caused threats can be grouped into the following categories: unauthorized physical access,theft,_________ and misuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
Noise along a power supply line,motors,fans,heavy equipment,microwave relay antennas,and other computers are all sources of _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
Power utility problems can be grouped into three categories: undervoltage,overvoltage,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
A restricted area within close proximity of a security interest has a classification of ______.

A)exclusion
B)controlled
C)limited
D)unrestricted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
Physical security threats are organized into three categories: environmental threats,human-caused threats,and _________ threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
_______ threats encompass threats related to electrical power and electromagnetic emission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
A prevalent concern that is often overlooked is ________.

A)overvoltage
B)undervoltage
C)dust
D)noise
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
The ______ is an optional key that may be present on any PIV card,does not require PIN entry,and whose purpose is to authenticate the card and therefore its possessor.

A)VIS
B)BIO
C)CHUID
D)CAK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
________ physical threats are more difficult to deal with than environmental and technical threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
An area of a facility that has no security interest is classified as _________.

A)unrestricted
B)controlled
C)limited
D)exclusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
To deal with the threat of smoke,the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The most essential element of recovery from physical security breaches is ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n)________ is a battery backup unit that can maintain power to processors,monitors,and other equipment and can also function as a surge protector,power noise filter,and an automatic shutdown device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.