Search Header Logo

Physical Security Controls

Authored by Usama Yehia Ibrahim

Computers

Professional Development

Used 10+ times

Physical Security Controls
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is physical security important to protecting data?

Physical access to data will negate the security advantages of the cloud.

Information resides on physical assets, linking physical and information security.

Social engineering can negate any information security controls.

None of the above.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is proper interior and exterior lighting important?

It can detect people who are where they don’t belong.

 It shows who is in a restricted space.

It allows more people and activities to be observed.

It is needed for the use of closed-circuit television cameras.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your organization has experienced multiple incidents of graffiti tagging and people loitering in the parking lot despite the chain-link fence surrounding it. What is the best solution to the issue?

“No Trespassing” signage

More guard stations

Additional external lighting

Changing the chain-link fencing to anti-scale fencing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After a physical security incident, what critical data can security guards commonly provide?

Employee ID information

Access logs of who has entered and exited the building

Alarm codes

Blueprints showing unmonitored areas of the building

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Alarms are effective only if which of the following is true?

They alert on abnormal conditions.

Every entrance is monitored with a sensor.

They are not tied to the information systems.

They are tuned to provide accurate and useful alerts.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are implementing a test lab at your organization for early alpha software development. To prevent any of the development code from inadvertently getting put on production computers, what should you implement?

Air gap

Strict firewalls

Protected distribution

Patch management

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the security benefit of a Faraday cage?

Prevents attack by EMP

Prevents accessing a device using a wireless network or cell connection

Works better than anti-scale fencing

Prevents stack overflows by EMI

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?