Testout Chapter 5

Unlock all answers in this set

Unlock answers
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Which of the following are solutions that address physical security?(Select two)
answer
Require identification and name badges for all employees AND escort visitors at all times
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
deploy mantrap
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
turnstiles
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
answer
PTZ
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
infared
question
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two)
answer
double-entry door AND turnstile
question
Which of the following controls is an example of a physical access control method?
answer
locks on doors
question
which of the following is the most important thing to do to prevent console access to the router?
answer
keep the router in a locked room
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
use cable locks to chin the laptops to the desks
question
you are an IT consultant and are visiting...........which security-related recommendations should you make to this client?
answer
relocate the switch to the locked server closet AND control access to the work area with locking doors and card readers
question
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?
answer
Remote Swipe
question
Which of the following are not reasons to remote wipe a mobile device?
answer
when the device is inactive for a period of time
question
Which of the following mobile device security considerations will disable the ability to use the device after a short period of inactivity?
answer
screen lock
question
Your organization has recently purchased 20 tablet devices for the human resources
answer
implement storage segmentation AND enable device encryption
question
over the last several years, the use of mobile devices within your organization has increased dramatically....
answer
implement a mobile endpoint management (MEM) solution
question
30 tablets
answer
configure and apply security policy settings in a mobile device management system AND enroll the devices in a mobile device management system
question
Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
answer
you can't use domain-based group policies to enforce security settings on mobile devices
question
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
answer
sign up for a windows intune account to manage the tablets
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left her tablet in an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
admin portal
question
The presence of unapproved modems on desktop systems gives rise to the LAN being vulnerable to which of the following?
answer
war dialing
question
Which of the following phone attacks adds unauthorized charges to a telephone bill?
answer
cramming
question
Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines?
answer
VoIP
question
A customer just received a phone bill on which there were charges for unauthorized services. This customer is a victim of which type of attack?
answer
Cramming
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New