Physical Security Controls

Physical Security Controls

Professional Development

10 Qs

quiz-placeholder

Similar activities

Communication & Big Data

Communication & Big Data

University - Professional Development

10 Qs

ID - Surveillance Webinar 2023

ID - Surveillance Webinar 2023

Professional Development

8 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

ITF - Quiz 14.1 - Access Controls

ITF - Quiz 14.1 - Access Controls

Professional Development

14 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Physical Security Controls

Physical Security Controls

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is physical security important to protecting data?

Physical access to data will negate the security advantages of the cloud.

Information resides on physical assets, linking physical and information security.

Social engineering can negate any information security controls.

None of the above.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is proper interior and exterior lighting important?

It can detect people who are where they don’t belong.

 It shows who is in a restricted space.

It allows more people and activities to be observed.

It is needed for the use of closed-circuit television cameras.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your organization has experienced multiple incidents of graffiti tagging and people loitering in the parking lot despite the chain-link fence surrounding it. What is the best solution to the issue?

“No Trespassing” signage

More guard stations

Additional external lighting

Changing the chain-link fencing to anti-scale fencing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

After a physical security incident, what critical data can security guards commonly provide?

Employee ID information

Access logs of who has entered and exited the building

Alarm codes

Blueprints showing unmonitored areas of the building

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Alarms are effective only if which of the following is true?

They alert on abnormal conditions.

Every entrance is monitored with a sensor.

They are not tied to the information systems.

They are tuned to provide accurate and useful alerts.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are implementing a test lab at your organization for early alpha software development. To prevent any of the development code from inadvertently getting put on production computers, what should you implement?

Air gap

Strict firewalls

Protected distribution

Patch management

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the security benefit of a Faraday cage?

Prevents attack by EMP

Prevents accessing a device using a wireless network or cell connection

Works better than anti-scale fencing

Prevents stack overflows by EMI

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?