Security+ Study Guide-09 Implementing Controls to Protect Assets

Security+ Study Guide-09 Implementing Controls to Protect Assets

Professional Development

15 Qs

quiz-placeholder

Similar activities

Active Directory

Active Directory

University - Professional Development

18 Qs

Security+ Study Guide-05 Securing Hosts and Data

Security+ Study Guide-05 Securing Hosts and Data

Professional Development

15 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

DBMS Advanced Features and Distributed Databases

DBMS Advanced Features and Distributed Databases

Professional Development

10 Qs

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - Data Backups & Recovery

IT ENGLISH: Research Project Topics - Data Backups & Recovery

Professional Development

10 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Cloudbinary_WebServer_Quiz_Linux_Windows

Cloudbinary_WebServer_Quiz_Linux_Windows

Professional Development

10 Qs

Security+ Study Guide-09 Implementing Controls to Protect Assets

Security+ Study Guide-09 Implementing Controls to Protect Assets

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Alejandro Hidalgo

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Employees access the data center by entering a cipher code at the door. However, everyone used the same code, so it does not identify individuals. After a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. However, the installation might take six months or longer.

Which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?

Access control vestibule

Access list

CCTV

Bollards

Compensating control

Answer explanation

Closed-circuit television (CCTV) or a similar video surveillance system can monitor the entrance and record who enters and exits the area.

An access control vestibule (sometimes called a mantrap) prevents tailgating, but it doesn’t necessarily identify individuals.

An access list is useful if a guard identifies users and allows access based on the access list, but the access list does not identify users.

Bollards are a type of barricade that protects building entrances.

Using a CCTV until the key card system is installed is an example of a compensating control, but all compensating controls do not identify people.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your local library is planning to purchase new laptops that patrons can use for Internet research. However, management is concerned about possible theft.

Which of the following is the BEST choice to prevent theft of these laptops?

Mantrap

Anti-malware software

Cable locks

Disk encryption

Answer explanation

A cable lock attaches to a computer and wraps around a piece of furniture to secure it to deter and prevent theft. This is like a bike lock used to secure a bicycle to a bike rack.

A mantrap prevents tailgating but is unrelated to this question.

Anti-malware software protects the systems from viruses and other malware.

Disk encryption is useful if the computers have confidential information, but it wouldn’t be appropriate to put confidential information on a public computer.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your organization needs to create a design for a high-security network for U.S. government contract. The network should not be accessible by your organization's existing networks or the Internet.

Which of the following options will BEST meet this need?

Faraday cage

Air gap

Protected cable distribution

Vault

Answer explanation

An air gap is a physical security control that ensures that a network is physically isolated from other networks, including the Internet.

A Faraday cage prevents radio frequency (RF) signals from entering or emanating beyond an enclosure, but a network within a Faraday cage can still be connected to external networks.

Protected cable distribution practices isolate cables from electromagnetic interference (EMI) sources but don’t isolate networks.

Vaults are rooms or large compartments used to store valuables, not isolate networks.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You need to secure access to a data center. Which of the following choices provides de BEST physical security to meet this need?

(Select THREE)

Biometrics

Cable locks

Access control vestibule

CCTV

HVAC

Answer explanation

A biometric reader used for access control, an access control vestibule (sometimes called a mantrap), and a closed-circuit television (CCTV) system all provide strong physical security for accessing a data center.

Cable locks are effective theft deterrents for mobile devices such as laptops, but they don’t protect data centers.

Heating, ventilation, and air conditioning (HVAC) systems can control the data center’s environment, but they don’t secure access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to add disk redundancy for a critical server in your organization's screened subnet. Management wants to ensure it supports two-drive failure.

Which of the following is the BEST solution for this requirement?

RAID-0

RAID-1

RAID-5

RAID-6

Answer explanation

A redundant array of independent disks 6 (RAID-6) is the best solution of the available answers. It supports two-drive failure meaning that two drives can fail in the RAID-6, and the disk subsystem will continue to operate.

RAID-0 (disk striping) doesn’t have any fault tolerance and will fail completely if a single drive fails.

RAID-1 (disk mirroring) uses only two drives. If one drive fails in a RAID-1, the data is preserved, but if two drives fail, all data is lost.

RAID-5 (striping with parity) will continue to operate if one drive fails, but all data is lost if two drives fail.

6.

MULTIPLE CHOICE QUESTION

45 sec • 2 pts

Your organization host several databases on two servers. Management wants to increase the redundancy of data storage for these servers.

Which of the following is the BEST choice to meet this requirement?

NIC teaming

Managed PDUs

UPS

Multipath

Answer explanation

Multipath is a fault-tolerance technique that provides more than one path for a system to the data storage system. It could be two Small Computer System Interface (SCSI) controllers providing a path to SCSI disks, or two storage area network (SAN) switches providing redundant paths to the SAN.

Network interface card (NIC) teaming combines the bandwidth of two or more NICs to increase the throughput, but the NICs won't necessarily be used to access disks.

Managed power distribution units (PDUs) provide the ability to monitor energy consumption in a data center remotely.

An uninterruptible power supply (UPS) providers short term power to systems after a power failure.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your organization hosts an e-commerce website that has been receiving a significant increase in traffic. The CPU is handling the load, but the server is unable to process the bandwidth consistently.

Which of the following is the BEST choice to solve this problem?

SAN

NIC teaming

Multipath

Managed PDUs

Answer explanation

Network interface card (NIC) teaming combines the bandwidth of two or more NICs to increase the throughput and would solve this problem. A storage area network (SAN) is a computer network that provides block-level data storage.

A SAN can increase disk performance, not bandwidth performance.

Multipath is a fault-tolerance technique used for data storage.

Managed power distribution units (PDUs) provide the ability to remotely monitor energy consumption in a data center.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?