logo image

Chapter 5 security Practice Exams

5.1.5 Practice Exam
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can “fix the restroom.” What should you do?
Direct him to the front entrance and instruct him to check in with the receptionist.
Which of the following are solutions that address physical security? (Select two.)
Require identification and name badges for all employees
Escort visitors at all times.
Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry?
Deploy a mantrap
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance thorough the exit portal?
Turnstiles
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
PTZ
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
Which of the following CCTV camera types lets you adjust the distance that the camera can see (i.e. zoom in or out)?
Varifocal
Which of the following CCTV types would you use in areas with little or no light?
Infrared
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two.)
Double-entry door
Turnstile
Which of the following controls is an example of a physical access control method?
Locks on doors
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where cable locks would be most appropriate.
At the lobby
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where a mantrap would be most appropriate.
At the lobby
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where where access badge readers would be most appropriate.
Building entrance in the lobby.
Sensitive areas as server room.
You are the security administrator for a small business. The floor plan for your organization is in the figure below. You’ve hired a third-party security consultant to review your organizations security measures and she has discovered multiple instances…. Click on the office location where surveillance cameras would be most appropriate.
Building entrance in the lobby.
Sensitive areas as server room.
Match each physical security control on the left with an appropriate example of the control on the right.
Hardened carrier >> Protected cable distribution

Biometric authentication >> Door locks

Barricades >> Perimeter barrier

Emergency escape plans >> Safety

Alarmed carrier >> Protected cable distribution

Anti-passback system >> Physical access control

Emergency lighting >> Safety

Exterior floodlights >> Perimeter barrier

5.2.4 Practice Exam
Which of the following is the most important thing to do to prevent console access to the router?
Keep the router in a locked room.
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks.
You are an IT consultant and are visiting a ne client’s site to become familiar with their network. As you walk around their facility, you note the following:
-When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager’s cubicle. The receptionist uses a notebook system that is secured to her desk with cable lock.
-The office manager informs you that the organization’s servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.
-She informs you that the server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media.
-You notice the organization’s network switch is kept in an empty cubicle adjacent to the office manager’s workspace.
-You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks.
Which security-related recommendations should you make to this client? (Select two)
Relocate the switch to the locked server closet.

Control access to the work area with locking doors and card readers.

You are an IT consultant and are visiting a ne client’s site to become familiar with their network. As you walk around their facility, you note the following:
-When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits .
-The office manager informs you that the organization’s servers are kept in a locked closet. An access card is required to enter the server closet.
-She informs you that the server backups are configured to run each night. A rotation of tapes are used as the backup media.
-You notice the organization’s network switch is kept in the server closet.
-You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks.
-The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it.

Which security-related recommendations should you make to this client? (Select two)

Implement a hardware checkout policy
5.3.6 Practice Exam
You walk by the server room and notice a fire has started. What should you do first?
Make sure everyone has cleared the area
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
Class C
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
Carbon dioxide (CO2)
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two.)
CO2
Halon
Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You notice that this only seems to happen when the elevator is running. What should you do?
Install shielded cables near the elevator
What is the recommended humidity level for server rooms?
50%
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems?
Add a separate A/C unit in the server room
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
Positive pressure system
Which of the following statements about ESD in “not correct”?
ESD is much more likely to occur when the relative humidity is above 50%.
Which of the following is the “least” effective power loss protection from computer system?
Surge protector
Besides protecting a computer from under voltages, a typical UPS also perform which two actions:
Protects from over voltages
Conditions the power signal
5.4.7 Practice Exam
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?
Remote wipe
Which of the following are “not” reasons to remote wipe a mobile device?
When the device is inactive for a period of time.
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?
Screen lock
Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate.
Most accurate- GPS
More accurate- WI-FI triangulation
Less accurate- cell phone tower triangulation
Least accurate- IP address resolution
Your organization has recently purchases 20 tablets devices for the Human Resources department to use for training sessions.
You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible.
Which actions should you take? (select two)
Implement storage implementation.
Enable service device encryption.
Over the last several years, the use of mobile devices within your organization has increased dramatically.
Unfortunately, many department heads circumvented your Information Systems procurement policies and directly purchased tablets and smartphones for their employees without authorization. As a result there is a proliferation of devices within your organization without accountability.
You need to get things under control and begin tracking the devices that are owned by your organization.
How should you do this?
Implement a mobile endpoint management (MEM) solution
Match each bring your own device (BOYD) security issue on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all.
Preventing malware infections- Implement a network acces control (NAC) solution.

Supporting mobile device users-Specify who users can call for help with mobile devices apps in your acceptable use policy.

Preventing loss of control of sensitive data- Enroll devices in a mobile device management.

Preventing malicious insider attacks-Specify where and when mobile devices can be possessed in your acceptable use policy.

Applying the latest anti-malware definitions- Implement a network access control (NAC) solution.

Match each bring your own device (BOYD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, not at all.
Users take pictures of proprietary processes and procedures- Specify where and when mobile devices can be possessed in your acceptable use policy.

Devices with a data plan can e-mail stole data
Specify where and when mobile devices can be possessed in your acceptable use policy.

Devices have no PIN or password configured
Enroll devices in a mobile device management system

Anti-malware software is not installed
Implement a network access control (NAC) solution.

A device containing sensitive data may be lost.
Enroll devices in a mobile device management system

5.5.6 Practice Exam
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (select two)

-Link the Group Policy Object to the container where the tablets’ computer objects reside.
– Manually configure security settings using the Local Group Policy Editor.
– Configure security settings in a Group Policy Object.
– Enroll the devices in a mobile device management system.
– Configure and apply security policy settings in a mobile device management system.
– Join the tablets to your domain.

Enroll the devices in a mobile device management system.
Configure and apply security policy settings in a mobile device management system.
Your organization recently purchase 18 iPad tablets for use by the organization’s management team. These devices have iOS pre-installed on them. To increase the security of these devices, you wan to apply a default set of security related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution)
Enroll the devices in a mobile device management (MDM) system

Configure and apply security policy settings in a mobile device management system

Match each mobile device application control term on the right with the appropriate description on the left.
Jailbreaking = allows apps to be installed from sources other than the app store

Sideloading = Allows apps to be installed from sources other than the Windows Store.

Sandboxing = prevents a running app from accessing data stored by other running apps

Assigned Access = Defines a whitelist of Windows Store applications

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connections using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice presidents home recorded someone rummaging through her garbage cans prior to the attack. The VP admitted to writing her VPN log in credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You’ve reviewed the VP’s social media pages and found pictures of her home posted, but you didn’t notice anything in he photos that would give away her home address. She assure you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach?
Geo-tagging was enabled on her smart phone
Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
You can’t use domain-based group policies to enforce security settings on mobile devices.
Your organization’s security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
sign up for a Windows Intune account to manage the tablets.
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left her tablet in an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
Admin Portal
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left his notebook at a customer’s site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which Intune portal should you use to remotely change the password?
Admin Portal
5.6.3 Practice Exam
The presence of unapproved modes on desktop system gives rise to the LAN being vulnerable to which of the following?
War dialing
Which of the following phone attacks adds unauthorized charges to a telephone bill?
Cramming
Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines?
VoIP
A customer just received a phone bill on which there are charges for unauthorized services. This customer is a victim to which type of attack?
Cramming

Need essay sample on "Chapter 5 security Practice Exams"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy