QUESTION DRILL PHYSICAL SECURITY 020504 - Answers 1. If an intruder is able to circumvent physical access security and is able to take over control of internal systems, what principle of security is violated? B: Loss of control over a system is a violation of integrity. 2. Which of the following is not a threat to physical security? C: A brute force password attack is a violation of technical or logical security. 3. Which of the following is not considered a form of physical access control? D: CCTV is considered a technical or logical access control. 4. Which of the following is an example of a physical security administrative control? A: Facility construction is an example of a physical security administrative control. 5. Which of the following is not an example of a physical security technical control? B: Personnel controls are an example of a physical security administrative control. 6. Which of the following is an example of a physical security technical control? C: Fire detection and suppression is an example of physical security technical control. 7. Physical security is maintained through three types of controls. Which of the following is not one of these? A: Defensive is not a type of physical security control. 8. The study of the facility infrastructure to determine what elements are essential to the support of physical security is known as? B: Critical path analysis is the study of the facility infrastructure to determine what elements are essential to the support of physical security. 9. Which of the following is not a physical security administrative control? C: Intrusion detection systems is a physical security technical control. 10. When evaluating the security of a new facility or site, which of the following is the least important? A: Cost is the least important aspect when evaluating the security of a new facility or site. 11. Which of the following is the least important aspect of a secured server room? B: Human compatibility is the least important aspect of a secured server room. In fact, server rooms are often very incompatible for humans. 12. When evaluating, selecting, and deploying physical security access controls, what is always the most important? C: Protection of human safety is always the most important aspect of any security control. 13. Which of the following is not a physical security physical control? C: Data backups is a physical security technical control. 14. Which of the following is the least important aspect to consider when selecting a physical location for a highly secured facility? D: The proximity to airport flight path is the least important consideration aspect from this list. In most cases, except for top-secret military facilities, being in a flight path is inconsequential. 15. When constructing a new building for a secure site, which of the following is the least important issue to consider in regards to security? D: The size of the facility is the least important security factor to consider. 16. Which of the following is not an example of a physical security physical control? D: Data backups are an example of a physical security technical control. 17. Which of the following is an example of a physical security physical control? A: Security guards are an example of a physical security physical control. 18. Which of the following is the least important aspect to consider when selecting a security facility location? B: Cost is the least important aspect when considering a location for a secure facility (from this list of options). 19. When should hardware be replaced to maintain availability? D: Hardware should be replaced before it reaches its age of mean time between failures. 20. Which of the following is not an example of a physical security administrative control? D: Alarms are examples of physical security technical controls. 21. Which of the following is not a benefit of a human incompatible server/computer room? A: A human incompatible server room cannot serve as an emergency shelter, this is a disadvantage. 22. When physical security is violated and damage occurs to the computer hardware itself, this is a violation of what principle of security? A: Physical damage is a violation of availability. 23. Which of the following is the least important aspect to consider when selecting a security facility location? C: Size is the least important aspect when considering a location for a secure facility (from this list of options). 24. Which of the following is the least important aspect to consider when designing the interior of a security facility? D: Consistency in decorating scheme, such as the color and texture, are the least important aspect of a facility's interior when designing security. 25. Which of the following is not an important physical security factor when considering the security of windows? A: UV reflection or blocking is the least important factor in regards to security when considering windows. 26. Which of the following is a direct physical threat to maintaining the integrity of hosted data? C: Physical damage to access consoles is a direct physical threat to maintaining the integrity of hosted data. 27. Which of the following represents a threat to confidentiality, integrity, and availability? A: Theft of a laptop represents a threat to confidentiality, integrity, and availability. 28. Which of the following is not considered a physical security emergency? B: Intrusion attempts through communication links is a technical or logical security emergency, not physical. 29. Which of the following is not an important physical security factor when considering the security of flooring? B: The texture of following is the least important physical security factor when considering the security of flooring. 30. Internal partitions are useful for creating? C: Partitions are useful for creating separate work spaces. 31. Which of the following should be used to provide sufficient security and separation of areas with various levels of sensitivity and confidentiality? D: Floor to ceiling permanent walls should be used to provide sufficient security and separation of areas with various levels of sensitivity and confidentiality. 32. Which of the following is not a human threat to physical security? C: Utility loss is a threat of physical security that can be caused by humans, but it can also be caused by natural disasters. This is the best answer for this question. 33. The most important factor when designing and implementing physical security solutions is? D: Personnel safety is always the most important factor when designing and implementing physical security solutions. 34. To protect the data center from threats to physical security, what should be done? A: The data center should be placed in the center or core of a facility for the maximum protection from threats to physical security. 35. When designing a facility to provide protection for sensitive electrical equipment, what is the most important factor? B: The most important factor when protecting sensitive electrical equipment is the electrical conductance of the flooring material or the likelihood of generation and sparking of static electricity. 36. Secure and protected computer rooms or data centers should be all but which of the follow? C: A computer room or data center need not be human compatible to be secure and protected. 37. The momentary increase in power often experienced at the moment when a device or a power system is turned on is known as? D: An inrush is the momentary increase in power often experienced at the moment when a device or a power system is turned on. 38. The short duration of an interfering disturbance in the power line is known as? A: A transient is a short duration of an interfering disturbance in the power line. 39. The radiation generated by the difference in power of the hot and neutral wires of a circuit is known as? B: Traverse modem noise is the radiation generated by the difference in power of the hot and neutral wires of a circuit. 40. The second most important aspect of a physical security mechanism, after protecting human safety, is? A: The cost benefits of a physical security mechanism are second most important after human safety. If a mechanism costs more to implement and maintain that the assets it is protecting, then it should not be deployed. 41. Physical security mechanisms should always? B: Physical security mechanisms should always comply with laws and regulations. 42. To control costs while maintaining a reasonable level of protection against the failure of hardware, you should? C: Obtaining a service level agreement with a hardware vendor provides a reasonable level of protection against the failure of hardware. 43. Which of the following is not an effective means to eliminate or reduce power line noise? C: Cables with fewer twists will increase the likelihood of power line noise. 44. According to the ANSI standard, at what point of a drop in power between the power source and the meter is a brownout declared? D: According to the ANSI standard, at a drop of 8% in power between the power source and the meter is a brownout declared. 45. Which is not a Water-based Fire protection System? D: An Infared flame detector is not a water based fire protection system in itself. It can be used inconjunction with other water based systems. The infared flame detector reacts to emissions from flame. 46. Hardware components should be replaced when? D: Hardware components should be replaced before their mean time between failure (MTBF) time period expires. 47. The hardware component rating of mean time to repair (MTTR) is used for what purpose? A: The mean time to repair (MTTR) is used to determine how often to expect to repair a device. 48. Which of the following is not considered an adequate protection means for a mission critical server? B: A surge protector, while useful and recommended, is not the best option from this list of power protection devices for a mission critical server. 49. A momentary loss of power is known as? C: A fault is a momentary loss of power. 50. Radio frequency interference (RFI) can be caused by all but which of the following? B: Cement walls do not cause radio frequency interference (RFI), but may actually reduce it. 51. A pre-employment screening process should include all but which of the following? C: A supervisor review can only occur after a worker has been employed for a length of time. This is not an element of the pre-employment screening process. 52. Which of the following is not an element that should be a part of on-going employee checks? D: Termination of physical access should occur as an element of the postemployment or termination procedures, not as part of on-going employee checks. 53. What is the ideal operating humidity for a data center room? B: The ideal operating humidity for a data center room is 40-60%. 54. Static electricity discharges over ___________ volts are possible on low-static carpeting with very low humidity. C: Static electricity discharges over 20,000 volts are possible on low-static carpeting with very low humidity. 55. A static discharge of , volts is sufficient to cause which of the following forms of damage? D: A static discharge of , volts is sufficient to scramble a monitor display. 56. A static discharge of only __________ volts is sufficient to cause a printer jam or serious malfunction? A: A static discharge of only 4,000 volts is sufficient to cause a printer jam or serious malfunction 57. When selecting a fire extinguisher to use against burning liquids, you should not select one which uses? D: Water should never be used to attempt to extinguish burning liquids. In most cases, water will help spread the fire rather than suppress it. 58. What is the most effective suppressant for electrical fires? A: CO or Halon are most effective against electrical fires. Type C fire extinguishers use CO, Halon, or a Halon replacement to suppress electrical fires. 59. In a data center, what is the best choice for a hand-held fire extinguisher? B: Type C fire extinguishers use CO, Halon, or a Halon replacement to suppress electrical fires. Type C is the best choice for a data center. 60. The termination procedure may include all but which of the following? A: The issuing of photo ID is an element of the employment or hiring procedures, not the termination procedures. 61. Which of the following is not an administrative control for maintaining physical security? B: Assigning a user account logon rights is a logical or technical control for maintaining logical or technical security. 62. When maintaining administrative controls to protect physical security in the event of a disaster or emergency, all but which of the follow should be performed? C: Risk analysis is not an element of maintaining administrative controls to protect physical security. Instead, risk analysis is used to select the safeguards to implement and re-evaluate their effectiveness, not in the maintenance of a selected security solution. 63. The most appropriate form of fire suppression mechanism for data centers is? B: A gas discharge system is most appropriate for data centers since a gas can be selected that will cause the least damage to the equipment in the event of a real or a false alarm release of the suppression medium. 64. A gas discharge system suppresses fires by what means? C: A gas discharge system suppresses fires by means of oxygen displacement. 65. Why is Halon being replaced whenever possible and not being used when new fire suppression gas-discharge systems are installed? D: Halon degrades into toxic chemicals at 900 degrees. 66. A benefit of security guards is what? A: A benefit of security guards is their ability to offer discriminating judgment on site. 67. The most suitable replacement for security guards is? B: For certain situations, dogs are the most suitable replacement or alternative for security guards. 68. The benefit of guards dogs is? C: Guard dogs are excellent tools for perimeter security control. 69. Fire detectors respond to a fire through a sensor that detects one of all but which of the following? C: Fire detectors do not sense the sound of fire. Intrusion detection alarms or certain types of motion detectors use sound (such as glass breaking or the change in a steadily broadcast frequency) to detect movement. 70. What type of flame or fire detector is considered the most expensive but also the fastest in detecting fires? D: Flame actuated fire detectors are considered the most expensive but also the fastest in detecting fires. 71. What form of water-based fire suppression systems is considered the most inappropriate for data centers? A: Deluge systems are a form of dry pipe system, but with a larger volume of water. Deluge systems are not recommended for data centers. 72. What physical security mechanism is the most recognized means of defining the outer perimeter of a secured or controlled area? D: Fencing is the most recognized physical security mechanism used to define the outer perimeter of a secured or controlled area 73. Casual trespassers are usually deterred by what? A: Casual trespassers are usually deterred by a fence a minimum of 3 to 4 feet high. They are also deterred by stronger or higher means, such as a fence feet high. However, this question asked only for a deterrent against just casual trespassers, not stronger mechanisms of trespassing protection. 74. The most effective means to contain a subject while the authentication process is performed so that in the event of a failure a security guard response can result in the capture of the subject is what? B: A mantrap is the most effective means to contain a subject while the authentication process is performed so that in the event of a failure a security guard response can result in the capture of the subject. In a mantrap, a subject must enter a small room that has both doors locked. Only after a successful authentication is the inner door opened for entry. If the authentication fails, a security guard is notified and the subject is detained within the enclosure. 75. The most commonly used ecological replacement for Halon in gas discharge systems is? A: FM-200 is the most commonly used ecological replacement for Halon in gas discharge systems. 76. Which of the following is not an ecological replacement for Halon in gas discharge fire suppression systems? B: Neon is not a fire suppression medium. 77. When a Halon or equivalent gas discharge fire suppression system is triggered to stop a fire, which of the following is responsible for causing the lease amount of damage to the computer equipment? C: The suppression medium, Halon or its replacement equivalents, are designed to cause little or no damage to electrical equipment. 78. The benefits of a security guard include all but which of the following? D: Being susceptible to social engineering or any form of intrusion or attack is a disadvantage of any security mechanism, include security guards. 79. Information on magnetic media can be destroyed by all but which of the following? B: OS based formatting will not destroy the data on media in most cases. 80. The only way to absolutely prevent data remenance from being extracted from electronic media is to? C: The only way to absolutely prevent data remenance from being extracted from electronic media is to destroy it by cremation. 81. When a media is to be re-used in the same environment, which of the following is minimally sufficient to prevent unnecessary disclosure? D: Clearing is the process of overwriting a media so it can be re-used in the same environment. It is not as thorough as a purge, but sufficient as long as the security classification remains constant. 82. The most commonly deployed form of perimeter protection is? C: The most commonly deployed form of perimeter protection lighting. 83. Which of the following is correct? D: This statement is correct. The NIST standard for perimeter protection provided by light is that critical areas should be illuminated by 2 candle feet power at 8 feet in height. 84. The use of closed circuit television (CCTV) for monitoring live events is considered what form or type of security control? A: The use of closed circuit television (CCTV) for monitoring live events is considered a preventative form of security control. 85. What is a sag? B: A sag is momentary low voltage. 86. An initial surge of power at the startup of a device or system is known as? C: An inrush is an initial surge of power at the startup of a device or system. 87. The radiation generated by the electrical difference between the hot and neutral wires is known as? D: Traverse-mode noise is the radiation generated by the electrical difference between the hot and neutral wires. 88. Which of the following is not an effective protection measure against electrical noise? A: Increasing voltage is not an effective means to reduce noise, often increased voltage creates more noise. 89. What is always the most important aspect of physical security? C: Safety of people is always the most important. 90. All but which of the following should be true of physical security mechanisms? D: Physical security should employ both obvious and apparent as well as subtle and unseen mechanisms. 91. To ensure ongoing operation and to maintain security (especially availability), hardware components should be replaced how often? A: To maintain security and operation, hardware should be replaced just before or at the end of the time period defined by the mean time between failures. 92. Static electricity generated by a human on non-static carpeting in a low humidity environment can exceed __________ volts. B: Static electricity generated by a human on non-static carpeting in a low humidity environment can exceed 20,000 volts. 93. Which of the following is not an important aspect of candidate screening when hiring a new employee? A: Awareness training is not an aspect of candidate screening, it is an aspect of post-hiring job training. 94. Which of the following is the least important aspect of employee termination in relation to security? C: Return of personal belongings should be performed, but is the least important aspect of employee termination from a security perspective. 95. The definition of a brownout according to the ANSI standards is the condition when there is an _________ drop between the power source and the meter or a __________ drop between the meter and the wall. B: The definition of a brownout according to the ANSI standards is the condition when there is an 8% drop between the power source and the meter or a 3.5% drop between the meter and the wall. 96. The ideal operating humidity for electronic components is? C: The ideal operating humidity for electronic components is 40 - 60 %. 97. Low humidity causes? C: Low humidity causes static. 98. At what voltage of a static discharge will permanent chip damage occur? D: 17,000 volts can cause permanent chip damage. 99. Why is halon no longer available for newly installed fire suppression systems? A: Halon has been removed from the market for new systems because it degrades into toxic chemicals at high temperatures. 100. What type of fence or boundary is minimally required to deter casual trespassers? C: A to 3 to 4 foot fence is minimally required to deter casual trespassers. 101. What is the most common from of physical security control deployed on the perimeter of a facility? A: Lighting is the most common form of perimeter security control. 102. What is the most important aspect of emergency response and reaction procedures? D: Protection of personnel safety is always the most important factor. 103. What is the order in which security controls should function in the protection of a physical asset? A: Physical security controls should be deployed so that initial attempts to access physical assets is deterred (i.e, boundary restrictions). If deterrence fails, then direct access to the physical asset should be denied (i.e. locked vault doors). If denial fails, then the intrusion should be detected (i.e. motion detectors). Then the intrusion should be delayed sufficiently for response by authorities (i.e. a cable lock on the asset). 104. Which of the following results in the violation of all three principles of the CIA triad? B: Theft of a laptop due to a cable lock failure causes a violation of all three principles of CIA. 105. What is the NIST standard for lighting when it is used for perimeter protection? B: The NIST standard is 2 foot-candles of power at 8 ft high for perimeter security lighting. 106. What is the most secure location to store backup media? D: Off-site is always the most secure location to store backup media. However, security controls at the offsite location must be maintained. The security of off-site storage is to prevent the backup media from being affected by the same disaster that destroys or damages the primary facility. 107. When an unauthorized person gains access into a facility by following an authorized person through a controlled access point, this is called? B: Piggybacking occurs when an unauthorized person gains access into a facility by following an authorized person through a controlled access point. 108. A Class C fire extinguisher may employ which of the following suppression mediums? A: A Class C fire extinguisher may contain CO, halon, or a halon equivalent or replacement. 109. Which form of fire suppression system is least recommended for a computer center? D: Deluge is inappropriate for computer centers. 110. Which of the following is not one of the three elements or aspects of a fire that can be removed to extinguish a flame? C: Removing humidity will not extinguish a flame. 111. Which type of fire detection and suppression systems is most prone to false alarms? C: Rate of rise systems are most prone to false alarms (i.e. sprinkler triggering). 112. Which of the following does not require secure destruction to prevent re-use when it is no longer required or needed within a secured environment? C: Video cards do not need to be destroyed. 113. Which of the following is a benefit of dogs? B: Dogs are often more reliable than guards, this is a benefit. 114. A room that is both secure and safe should have what? B: A secure and safe room has no more than two doors. This allows to avenues of safe escape in the event of an emergency while limiting the number of access points that must be monitored. 115. When closed circuit television is used to record live events, this is what type of physical security control? C: CCTV recording is a detective security control. 116. A double set of doors used to protect an entry into a highly secured area which is often monitored by a guard is known as? D: A man-trap is a double-door system used to control entry into a secured area often monitored by a guard. 117. If an intrusion detection and alarm system is to employ a local audible alarm, from what distance must the alarm be heard? A: An audible alarm must be heard from at least 400 ft. 118. An electrical fire can be safely and properly extinguished using what class of fire extinguisher? C: Only class C extinguishers are rated for electrical fires. 119. Which of the following is not a benefit of using guards for perimeter security? A: Guards are overall unreliable due to the fact that they are human, prescreening may have failed, they could be improperly trained, they take vacations, become ill, may perform substance abuse, and are vulnerable to social engineering. 120. What fire detection system acts as a early warning mechanism? D: An ionization detector can serve as an early warning system for fire detection. 121. Which of the following is not a replacement for halon? C: Halon 1301 is just a gaseous form of halon, it is not a halon replacement. 122. When an FM- fire suppression system is discharged to manage a fire in a computer center, which of the following elements would be least responsible for causing physical damage to the equipment? D: The suppression medium of FM- will be the cause of the least amount of damage to equipment since it does not leave a residue on equipment. 123. Which of the following is not an element in an automatic intrusion detection and alarm system designed to monitor for facility breaches? D: CCTV requires a human and therefore is not used as part of an automated intrusion detection and alarm system.