Physical Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT one of the three major concerns for physical security in order of importance?

  • Equipment
  • Access control (correct)
  • Personnel
  • Data

Which of the following is NOT one of the three main kinds of physical security measures?

  • Preventative
  • Reactive (correct)
  • Detective
  • Deterrent

Why would you want to use RAID?

  • To improve network security
  • To increase the speed of data access
  • To reduce the amount of storage space required
  • To copy data to more than 1 storage device to protect the data if any one device is destroyed (correct)

Which of the following is NOT a step in a typical risk management process at a high level?

<p>Assess risks (B)</p> Signup and view all the answers

Why is confidentiality important in data security?

<p>To prevent breaches and unauthorized access (A)</p> Signup and view all the answers

Why is authenticity a risk in data security?

<p>To verify the validity of payment and customer information (C)</p> Signup and view all the answers

Why is assessing risks an important step in risk management?

<p>To determine the overall risk (D)</p> Signup and view all the answers

Which category of controls protects the physical environment in which systems sit or where data is stored?

<p>Physical controls (C)</p> Signup and view all the answers

Which category of controls enables prevention of unauthorized activities?

<p>Logical controls (D)</p> Signup and view all the answers

True or False: A vulnerability without a matching threat constitutes a risk.

<p>False (A)</p> Signup and view all the answers

True or False: A threat without a matching vulnerability constitutes a risk.

<p>False (B)</p> Signup and view all the answers

What are measures put in place to account for each threat called?

<p>Controls (B)</p> Signup and view all the answers

What are the three categories of controls mentioned in the text?

<p>Physical, logical, and administrative (C)</p> Signup and view all the answers

True or False: If logical controls are implemented properly and successful, an attacker or unauthorized user can still access applications and data without subverting controls.

<p>False (B)</p> Signup and view all the answers

What is the term used to describe an attacker or unauthorized user accessing applications and data without subverting controls?

<p>Unauthorized access (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser