Physical Security Quiz
15 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT one of the three major concerns for physical security in order of importance?

  • Equipment
  • Access control (correct)
  • Personnel
  • Data
  • Which of the following is NOT one of the three main kinds of physical security measures?

  • Preventative
  • Reactive (correct)
  • Detective
  • Deterrent
  • Why would you want to use RAID?

  • To improve network security
  • To increase the speed of data access
  • To reduce the amount of storage space required
  • To copy data to more than 1 storage device to protect the data if any one device is destroyed (correct)
  • Which of the following is NOT a step in a typical risk management process at a high level?

    <p>Assess risks</p> Signup and view all the answers

    Why is confidentiality important in data security?

    <p>To prevent breaches and unauthorized access</p> Signup and view all the answers

    Why is authenticity a risk in data security?

    <p>To verify the validity of payment and customer information</p> Signup and view all the answers

    Why is assessing risks an important step in risk management?

    <p>To determine the overall risk</p> Signup and view all the answers

    Which category of controls protects the physical environment in which systems sit or where data is stored?

    <p>Physical controls</p> Signup and view all the answers

    Which category of controls enables prevention of unauthorized activities?

    <p>Logical controls</p> Signup and view all the answers

    True or False: A vulnerability without a matching threat constitutes a risk.

    <p>False</p> Signup and view all the answers

    True or False: A threat without a matching vulnerability constitutes a risk.

    <p>False</p> Signup and view all the answers

    What are measures put in place to account for each threat called?

    <p>Controls</p> Signup and view all the answers

    What are the three categories of controls mentioned in the text?

    <p>Physical, logical, and administrative</p> Signup and view all the answers

    True or False: If logical controls are implemented properly and successful, an attacker or unauthorized user can still access applications and data without subverting controls.

    <p>False</p> Signup and view all the answers

    What is the term used to describe an attacker or unauthorized user accessing applications and data without subverting controls?

    <p>Unauthorized access</p> Signup and view all the answers

    More Like This

    Enhancing Physical Security Measures
    10 questions
    Industrial Security Concepts Quiz
    10 questions
    Industrial Security Overview
    8 questions
    Use Quizgecko on...
    Browser
    Browser