Physical Security Quiz
15 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT one of the three major concerns for physical security in order of importance?

  • Equipment
  • Access control (correct)
  • Personnel
  • Data

Which of the following is NOT one of the three main kinds of physical security measures?

  • Preventative
  • Reactive (correct)
  • Detective
  • Deterrent

Why would you want to use RAID?

  • To improve network security
  • To increase the speed of data access
  • To reduce the amount of storage space required
  • To copy data to more than 1 storage device to protect the data if any one device is destroyed (correct)

Which of the following is NOT a step in a typical risk management process at a high level?

<p>Assess risks (B)</p> Signup and view all the answers

Why is confidentiality important in data security?

<p>To prevent breaches and unauthorized access (A)</p> Signup and view all the answers

Why is authenticity a risk in data security?

<p>To verify the validity of payment and customer information (C)</p> Signup and view all the answers

Why is assessing risks an important step in risk management?

<p>To determine the overall risk (D)</p> Signup and view all the answers

Which category of controls protects the physical environment in which systems sit or where data is stored?

<p>Physical controls (C)</p> Signup and view all the answers

Which category of controls enables prevention of unauthorized activities?

<p>Logical controls (D)</p> Signup and view all the answers

True or False: A vulnerability without a matching threat constitutes a risk.

<p>False (A)</p> Signup and view all the answers

True or False: A threat without a matching vulnerability constitutes a risk.

<p>False (B)</p> Signup and view all the answers

What are measures put in place to account for each threat called?

<p>Controls (B)</p> Signup and view all the answers

What are the three categories of controls mentioned in the text?

<p>Physical, logical, and administrative (C)</p> Signup and view all the answers

True or False: If logical controls are implemented properly and successful, an attacker or unauthorized user can still access applications and data without subverting controls.

<p>False (B)</p> Signup and view all the answers

What is the term used to describe an attacker or unauthorized user accessing applications and data without subverting controls?

<p>Unauthorized access (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser