Deck 16: Physical and Infrastructure Security

ملء الشاشة (f)
exit full mode
سؤال
The optimal temperature for computer systems is between 10 and 32degrees Fahrenheit.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Human-caused threats are less predictable than other types of physicalthreats.
سؤال
________ security protects computer-based data from software-based and communication-based threats.

A) Infrastructure
B) Premises
C) Physical
D) Logical
سؤال
For information systems, the role of logical security is to protect thephysical assets that support the storage and processing of information.
سؤال
To implement a physical security program an organization mustconduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
سؤال
If a computer's temperature gets too cold the system can undergothermal shock when it is turned on.
سؤال
Unauthorized physical access can lead to other threats.
سؤال
The direct flame is the only threat from fire.
سؤال
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A) 20% and 80%
B) 40% and 60%
C) 50% and 50%
D) 30% and 70%
سؤال
_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

A) Supporting
B) Information
C) Physical
D) All of the above
سؤال
A person that becomes statically charged can damage electronicequipment by an electric discharge.
سؤال
High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.
سؤال
Misuse of the physical infrastructure includes vandalism, theft ofequipment, theft by copying, theft of services, and unauthorized entry.
سؤال
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

A) Premises
B) Infrastructure
C) Logical
D) Physical
سؤال
________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

A) Supporting facilities
B) Physical facilities
C) Information system hardware
D) Infrastructure facilities
سؤال
Physical security must also prevent any type of physical access orintrusion that can compromise logical security.
سؤال
Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
سؤال
Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.
سؤال
Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.
سؤال
The CHUID is a PIV card data object.
سؤال
A prevalent concern that is often overlooked is ________.

A) overvoltage
B) undervoltage
C) dust
D) noise
سؤال
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
سؤال
_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.

A) Smoke detectors
B) UPS
C) Water sensors
D) Equipment power off switches
سؤال
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
سؤال
An area of a facility that has no security interest is classified as _________.

A) unrestricted
B) controlled
C) limited
D) exclusion
سؤال
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
سؤال
Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.
سؤال
The role of physical security is affected by the operating location of the information system, which can be characterized as ______ .

A) static
B) portable
C) mobile
D) all of the above
سؤال
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

A) VIS
B) BIO
C) CHUID
D) CAK
سؤال
A restricted area within close proximity of a security interest has a classification of ______.

A) exclusion
B) controlled
C) limited
D) unrestricted
سؤال
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A) Human-caused
B) Technical
C) EMI
D) Environmental
سؤال
The security classification for a restricted area containing a security interest is _____.

A) controlled
B) exclusion
C) unrestricted
D) limited
سؤال
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
سؤال
________ physical threats are more difficult to deal with than environmental and technical threats.
سؤال
Eavesdropping and wiretapping fall into the ________ category.

A) theft
B) vandalism
C) misuse
D) unauthorized physical access
سؤال
_______ threats encompass threats related to electrical power and electromagnetic emission.
سؤال
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
سؤال
_______ includes destruction of equipment and data.

A) Misuse
B) Vandalism
C) Theft
D) Unauthorized physical access
سؤال
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
سؤال
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
سؤال
To deal with the threat of smoke, the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
سؤال
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
سؤال
The most essential element of recovery from physical security breaches is ____.
سؤال
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
سؤال
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Physical and Infrastructure Security
1
The optimal temperature for computer systems is between 10 and 32degrees Fahrenheit.
False
2
Human-caused threats are less predictable than other types of physicalthreats.
True
3
________ security protects computer-based data from software-based and communication-based threats.

A) Infrastructure
B) Premises
C) Physical
D) Logical
D
4
For information systems, the role of logical security is to protect thephysical assets that support the storage and processing of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
To implement a physical security program an organization mustconduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
If a computer's temperature gets too cold the system can undergothermal shock when it is turned on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
Unauthorized physical access can lead to other threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
The direct flame is the only threat from fire.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
Relative humidity should be maintained between ________ to avoid the threats from both low and high humidity.

A) 20% and 80%
B) 40% and 60%
C) 50% and 50%
D) 30% and 70%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
_______ facilities include electrical power, communication services, and environmental controls such as heat and humidity.

A) Supporting
B) Information
C) Physical
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
A person that becomes statically charged can damage electronicequipment by an electric discharge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
High humidity does not pose a threat to electrical and electronicequipment as long as the computer's temperature stays within the optimal range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Misuse of the physical infrastructure includes vandalism, theft ofequipment, theft by copying, theft of services, and unauthorized entry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

A) Premises
B) Infrastructure
C) Logical
D) Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
________ includes data processing and storage equipment, transmission and networking facilities, and offline storage media.

A) Supporting facilities
B) Physical facilities
C) Information system hardware
D) Infrastructure facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Physical security must also prevent any type of physical access orintrusion that can compromise logical security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Physical access control should address not just computers and other ISequipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Physical security must prevent misuse of the physical infrastructurethat leads to the misuse or damage of the protected information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Low-intensity devices such as cellular telephones do not interfere withelectronic equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
The CHUID is a PIV card data object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
A prevalent concern that is often overlooked is ________.

A) overvoltage
B) undervoltage
C) dust
D) noise
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
_________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
_______ should be located on the floor of computer rooms as well as under raised floors, and should cut off power automatically in the event of a flood.

A) Smoke detectors
B) UPS
C) Water sensors
D) Equipment power off switches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
An area of a facility that has no security interest is classified as _________.

A) unrestricted
B) controlled
C) limited
D) exclusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
Tornados, tropical cyclones, earthquakes, blizzards, lightning, and floods are all types of ________ disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The role of physical security is affected by the operating location of the information system, which can be characterized as ______ .

A) static
B) portable
C) mobile
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

A) VIS
B) BIO
C) CHUID
D) CAK
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
A restricted area within close proximity of a security interest has a classification of ______.

A) exclusion
B) controlled
C) limited
D) unrestricted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A) Human-caused
B) Technical
C) EMI
D) Environmental
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The security classification for a restricted area containing a security interest is _____.

A) controlled
B) exclusion
C) unrestricted
D) limited
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
________ physical threats are more difficult to deal with than environmental and technical threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
Eavesdropping and wiretapping fall into the ________ category.

A) theft
B) vandalism
C) misuse
D) unauthorized physical access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
_______ threats encompass threats related to electrical power and electromagnetic emission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
_______ includes destruction of equipment and data.

A) Misuse
B) Vandalism
C) Theft
D) Unauthorized physical access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
To deal with the threat of smoke, the responsible manager should install _______ in every room that contains computer equipment as well as under raised floors and over suspended ceilings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
______ authentication is implemented by using a fingerprint or iris data object sent from the PIV card to the PACS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The most essential element of recovery from physical security breaches is ____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The _______ authentication has an attendant supervise the use of the PIV card and the submission of the PIN and the sample biometric by the cardholder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.