HOME - HOME EXAMENES

Examen:

CISSP - (ISC)2 Certified Information Systems Security Professional - Chapter 10

Your organization is planning on building a new facility to house a majority of on-site workers. The current facility has had numerous security issues, such as loitering, theft, graffiti, and even a few physical altercations between employees and nonemployees. The CEO has asked you to assist in developing the facility plan to reduce these security concerns. While researching options you discover the concepts of CPTED.


1.-Which of the following is not one of its core strategies?
A. Natural territorial reinforcement
B. Natural access control
C. Natural training and enrichment
D. Natural surveillance



2.-What method is a systematic effort to identify relationships between mission-critical applications, processes, and operations and all the necessary supporting elements when evaluating the security of a facility or designing a new facility?
A. Log file audit
B. Critical path analysis
C. Risk analysis
D. Taking inventory


(Choose all that apply.)
3.-Which of the following is a true statement in regard to security cameras?
A. Cameras should be positioned to watch exit and entry points allowing any change in authorization or access level.
B. Cameras are not needed around valuable assets and resources as well as to provide additional protection in public areas such as parking structures and walkways.
C. Cameras should be positioned to have clear sight lines of all exterior walls, entrance and exit points, and interior hallways.
D. Security cameras should only be overt and obvious in order to provide a deterrent benefit.
E. Security cameras have a fixed area of view for recording.
F. Some camera systems include a system on a chip (SoC) or embedded components and may be able to perform various specialty functions, such as time-lapse recording, tracking, facial recognition, object detection, or infrared or color-filtered recording.
G. Motion detection or sensing cameras can always distinguish between humans and animals.

Your organization is planning on building a new primary headquarters in a new town. You have been asked to contribute to the design process, so you have been given copies of the proposed blueprints to review.


4.-Which of the following is not a security-focused design element of a facility or site?
A. Separation of work and visitor areas
B. Restricted access to areas with higher value or importance
C. Confidential assets located in the heart or center of a facility
D. Equal access to all locations within a facility

A recent security audit of your organization’s facilities has revealed a few items that need to be addressed. A few of them are related to your main data center. But you think at least one of the findings is a false positive.


5.-Which of the following does not need to be true in order to maintain the most efficient and secure server room?
A. It must be optimized for workers.
B. It must include the use of nonwater fire suppressants.
C. The humidity must be kept between 20 and 80 percent.
D. The temperature must be kept between 59 and 89.6 degrees Fahrenheit.

A recent security policy update has restricted the use of portable storage devices when they are brought in from outside. As a compensation, a media storage management process has been implemented.


6.-Which of the following is not a typical security measure implemented in relation to a media storage facility containing reusable removable media?
A. Employing a media librarian or custodian
B. Using a check-in/check-out process
C. Hashing
D. Using sanitization tools on returned media

The company’s server room has been updated with raised floors and MFA door locks. You want to ensure that updated facility is able to maintain optimal operational efficiency.


7.-What is the ideal humidity range for a server room?
A. 20–40 percent
B. 20–80 percent
C. 80–89.6 percent
D. 70–95 percent

You are mapping out the critical paths of network cables throughout the building.

(Choose all that apply.)
8.-Which of the following items do you need to make sure to include and label on your master cabling map as part of crafting the cable plant management policy?
A. Access control vestibule
B. Entrance facility
C. Equipment room
D. Fire escapes
E. Backbone distribution system
F. Telecommunications room
G. UPSs
H. Horizontal distribution system
I. Loading dock



9.-What is the best type of water-based fire suppression system for a computer facility?
A. Wet pipe system
B. Dry pipe system
C. Preaction system
D. Deluge system

Your company has a yearly fire detection and suppression system inspection performed by the local authorities.


10.-You start up a conversation with the lead inspector and they ask you, “What is the most common cause of a false positive for a water-based fire suppression system?” So, what do you answer?
A. Water shortage
B. People
C. Ionization detectors
D. Placement of detectors in drop ceilings

A data center has had repeated hardware failures. An auditor notices that systems are stacked together in dense groupings with no clear organization.


11.-What should be implemented to address this issue?
A. Visitor logs
B. Industrial camouflage
C. Gas-based fire suppression
D. Hot aisles and cold aisles


(Choose all that apply.)
12.-Which of the following are benefits of a gas-based fire suppression system?
A. Can be deployed throughout a company facility
B. Will cause the least damage to computer systems
C. Extinguishes the fire by removing oxygen
D. May be able to extinguish the fire faster than a water discharge system

When designing physical security for an environment, it is important to focus on the functional order in which controls should be used.


13.-Which of the following is the correct order of the six common physical security control mechanisms?
A. Decide, Delay, Deny, Detect, Deter, Determine
B. Deter, Deny, Detect, Delay, Determine, Decide
C. Deny, Deter, Delay, Detect, Decide, Determine
D. Decide, Detect, Deny, Determine, Deter, Delay

Equipment failure is a common cause of a loss of availability. When deciding on strategies to maintain availability, it is often important to understand the criticality of each asset and business process as well as the organization’s capacity to weather adverse conditions.

1. Clearly defines the response time a vendor will provide in the event of an equipment failure emergency
2. An estimation of the time between the first and any subsequent failures
3. The expected typical functional lifetime of the device given a specific operating environment
4. The average length of time required to perform a repair on the device

14.-Match the term to the definition.
I. MTTF
II. MTTR
III. MTBF
IV. SLA

A. I - 1, II - 2, III - 4, IV - 3
B. I - 4, II - 3, III - 1, IV - 2
C. I - 3, II - 4, III - 2, IV - 1
D. I - 2, II - 1, III - 3, IV - 4

You have been placed on the facility security planning team. You’ve been tasked to create a priority list of issues to address during the initial design phase.


15.-What is the most important goal of all security solutions?
A. Prevention of disclosure
B. Maintaining integrity
C. Human safety
D. Sustaining availability

While reviewing the facility design blueprints, you notice several indications of a physical security mechanism being deployed directly into the building’s construction.


16.-Which of the following is a double set of doors that is often protected by a guard and is used to contain a subject until their identity and authentication are verified?
A. Gate
B. Turnstile
C. Access control vestibule
D. Proximity detector

Due to a recent building intrusion, facility security has become a top priority. You are on the proposal committee that will be making recommendations on how to improve the organization’s physical security stance.


17.-What is the most common form of perimeter security devices or mechanisms?
A. Security guards
B. Fences
C. CCTV
D. Lighting

Your organization has just landed a new contract for a major customer. This will involve increasing production operations at the primary facility, which will entail housing valuable digital and physical assets. You need to ensure that these new assets receive proper protections.


18.-Which of the following is not a disadvantage of using security guards?
A. Security guards are usually unaware of the scope of the operations within a facility.
B. Not all environments and facilities support security guards.
C. Not all security guards are themselves reliable.
D. Prescreening, bonding, and training do not guarantee effective and reliable security guards.

While designing the security plan for a proposed facility, you are informed that the budget was just reduced by 30 percent. However, they did not adjust or reduce the security requirements.


19.-What is the most common and inexpensive form of physical access control device for both interior and exterior use?
A. Lighting
B. Security guard
C. Key locks
D. Fences

While implementing a motion detection system to monitor unauthorized access into a secured area of the building, you realize that the current infrared detectors are causing numerous false positives. You need to replace them with another option.


20.-What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object?
A. Wave
B. Photoelectric
C. Heat
D. Capacitance