logo image

Security Test 2 Chapter 5

One your way into the back entrace of the building at work one morning, a man dressed as a plumber asks you to let him in so he can “fix the restoom”. What should you do?
Direct him to the front entrance and instruct him to check in with the receptionist
Which of the following are solutions that address physical security?
Escort visitors at all times
Require identification and name badges for all employees
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
Deploy a man trap
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
Turnstiles
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
PTZ
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
Varifocal
Which of the following CCTV types would you use in areas with little or no light?
Infrared
Which of the following allows for easy exit of an area in the event of an emergency but prevents entry?
Double-entry door
Turnstile
Which of the following controls is an example of a physical access control method?
Locks on doors
You are the security adminstrator for a small business. The floor plan for your orgnaiation is shown in the figure below. You’ve hired a third party security consultant to review your organization’s security measures and she has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you implement cable locks to prevent theft of computer equipment. Click on the office where cable locks would be most appropriate:
The Lobby
You are the security adminstrator for a small business. The floor plan for your orgnaiation is shown in the figure below. You’ve hired a third party security consultant to review your organization’s security measures and she has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you implement mantraps to prevent this from happening in the future. Click on the office where a mantrap would be most appropriate:
The Lobby
You are the security adminstrator for a small business. The floor plan for your orgnaiation is shown in the figure below. You’ve hired a third party security consultant to review your organization’s security measures and she has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you provide employees with access badges and implement acces badge readers to prevent this from happening in the future. Click the locations where readers would be most appropriate:
The Lobby
The server room
You are the security adminstrator for a small business. The floor plan for your orgnaiation is shown in the figure below. You’ve hired a third party security consultant to review your organization’s security measures and she has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you implment CCTV surveillance cameras to prevent this from happening in the future. Click on theoffice locations where surveillance cameras would be most appropriate:
The Lobby
The server Room
Match each physical security control with the appropriate example:
Hardened carrier
Protected cable distribution
Barricades
Perimeter barrier
Alarmed carrier
Protected cable distribution
Emergency lighting
Safety
Biometric authentication
Door locks
Emergency escape plans
Safety
Anti-passback system
Physical access control
Exterior floodlights
Perimeter barrier
Which of the following is the most important thing to do to prevent console access to the router?
Keep the router in a locked room
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks
You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around the facility you note the following:
When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager’s cubicle. The receptionist uses a notebook system that is secured with a cable lock.
The office manager infroms you that the organizations servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.
She informs you that the server backups are configured to run each night. A rotation of external usb hard drisks are used a backup media
You notice the orgnaization’s network switch is kept in an empty cubicle adjacent to the office managers workspace
You notice that a router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks.

Which security related recommendations should you make to this client?

Relocate the switch to the locked server closet
Control access to the work area with locking doors and card readers
You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around the facility you note the following:
When you enter thefacility a receptionist greets you and escorts you through a locked door to the work area where the office manager sits.
The office manager informs you that the orgnaizations servers are kept in a locked closet. An access card is required to enter the server closet
She infroms you that the server backups are configured to run each night. A rotation of tapes are used as the backup media
You notice the orgnaiation’s network switch is kept in the server closet
You notice that the router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks.
The office manager information you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the rpocess. You carry the workstation to our car and bring it back to your office to work on it.
What securityrelated recommendations should you make to the client?
Implement a hardware checkout policy
You walk by a server room and notice a fire has started. What should you do first?
Make sure everyone has cleared the area
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
Class C
Which of the following fire extinguisher suppressant types is best used for fires that might result when working with computer components?
Carbon Dioxide
Which of the following fire Extinguisher types poses a safety risk to the users in the area?
Halon

CO2

Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do?
Install shielded cables near the elevator
What is the recommended humidity level for server rooms?
50%
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems?
Add a separate AC unit in the server room
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
Positive pressure system
Which of the following statements about ESD is not correct?
ESD is much more likely to occur when the relative humidity is above 50%
Which of the following is the least effective power loss protection for computer systems?
Surge protector
Besides protecting a computer from under voltages, a typical UPS also performs which 2 actions?
Conditions the power signal
Protects from over voltages
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?
Remote Wipe
Which of the following are not reasons to remote wipe a mobile device?
When the device is inactive for a period of time.
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?
Screen lock
Most mobile device management(MDM) systems can be configured to track the physical location of enrolled mobile devices.
GPS
Wifi Triangulation
Cell phone tower triangulation
IP address resolution
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk for your network and want to strengthen their security profile as much as possible. Which actions should you take?
Enable device encryption
Implement storage segmentation
Over the last several years, the use of mobile devices within your organization has increased dramatically. Unfortunately, many department heads circumvented your Information Systems procurment policeis and directly purchased tablets and smartphones for their employees without authorization. As a result there is a proliferation of devices within your organization without accountability. You need to get things under control and begin tracking the devices that are owned by your organization. How should you do this?
Implement a mobile enpoint management (MEM) solution
Match each bring your own device security issue with the remedy
Preventing malware infections
Implment a network access control solution
Supporting mobile device users
Specify who users can call for help with mobile device apps in your acceptable use policy
Preventing loss of control of sensitive data
Enroll devices in a mobile device management system
Preventing malicious insider attacks
Specify where and when mobile devices can be possessed in your acceptable use policy
Applying the latest anti-malware definition
Implement a network access control solution
Match each bring your own device security concern with the remedy
Users take pictures of proprietary processes and procedures
Specify where and when mobile devices can be possessed in your acceptable use policy
Devices with a data plan can email stolen data
Specify where and when mobile devices can be possessed in our acceptable use policy
Devices have no PIN or password configured
Enroll devices in a mobile device management system
Anti-malware software is not installed
Implement a network access control solution
A device containing sensitive data may be lost
Enroll devices in a mobile device management system
Your organization recently purchased 30 tablet devices for your travelling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security related configuration settings. What is the best approach to take to accomplish this?
Configure and apply security policy settings in a mobile devices management system

Enroll the devices in a mobile device management system

Your organziation recently purchased 18 iPad tablets for use by the organizatin’s management team. These devices have iOS pre-installed on them. To increase the security of these devices, you want to apply a default set of seucrity related configuration settings. What is the best approach to accomplish this?
Configure and apply security policy settings in a mobile device management system
Enroll the devices in a mobile device management system.
Match mobile device application control term with the description
Jail breaking
Allows apps to be installed from sources other than the app store
Sideloading
Allows apps to be installed from sourcse other than the Windows Store
Sandboxing
Prevents a running app from accessing data stored by other running apps
Assigned access
Defines a whitelist of Windows Store Applications
Recently a serious security breach occurred in your organization. An attacker was able to log into the internal network and steal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management I your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president’s home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login informatino on a stick note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log into the network. You’ve reviewed the vice president’s social media pages and you found pictures of her home posted, but you didn’t notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is most likely the cause of the security breach?
Geo-tagging was enabled on her smart phone.
Your organziation is formulating a bring your own device security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
You can’t use domain-based group policies to enforce security settings on mobile devices.
Your organization’s security policy specifies that any mobile device, regardless of ownership, that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several RT tablets, what should you do?
Sign up for a Windows Intune account to manage the tablets
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. One of your sales representatives left her tablet at an airport. The device contains senstivie information and you need to remove it in case the device is compromised. Which Intune protal should you use to perform a remote wipe?
Admin portal
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account.one of your sales representatives left his notebook at a customer’s site. The device contains sensitive information and you want to change the password to prevent the data from being compromised. Which intune portal should you use to remotely change the password?
Admin Portal
The presence of unapproved modems on desktop systems gives rise to the LAN vulnerable to which of the following?
War dialing
Which of the following phone attacks adds unauthorized charges to a telephone bill?
Cramming
Which internet connectivity method sends void phone clls using the TCP/IP protocol over digital data lines?
VoIP
A customer just received a phone bill on which tehre are charges for unauthorized services. This customer is a victim of which type of attack?
Cramming

Need essay sample ? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy