CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [166]
3. Pick a user at random. Call them and identify yourself as someone who does work with the company. Tell them that you’re supposed to have some new software ready for them by next week and that you need to know their password in order to finish configuring it. Do they do the right thing?
The best defense against any social engineering attack is education. Make certain the employees of your company know how to react to the requests like these.
Review Questions
1. Which component of physical security addresses outer-level access control?
a. Perimeter security
b. Mantraps
c. Security zones
d. Locked doors
2. You’ve been drafted for the safety committee. One of your first tasks is to inventory all the fire extinguishers and make certain the correct types are in the correct locations throughout the building. Which of the following categories of fire extinguisher is intended for use on electrical fires?
a. Type A
b. Type B
c. Type C
d. Type D
3. Which of the following won’t reduce EMI?
a. Physical shielding
b. Humidity control
c. Physical location
d. Overhauling worn motors
4. You’re the administrator for MTS. You’re creating a team that will report to you, and you’re attempting to divide the responsibilities for security among individual members. Similarly, which of the following access methods breaks a large area into smaller areas that can be monitored individually?
a. Zone
b. Partition
c. Perimeter
d. Floor
5. Which of the following is equivalent to building walls in an office building from a network perspective?
a. Perimeter security
b. Partitioning
c. Security zones
d. IDS systems
6. After a number of minor incidents at your company, physical security has suddenly increased in priority. No unauthorized personnel should be allowed access to the servers or workstations. The process of preventing access to computer systems in a building is called what?
a. Perimeter security
b. Access control
c. Security zones
d. IDS systems
7. Which of the following is an example of perimeter security?
a. Chain link fence
b. Video camera
c. Elevator
d. Locked computer room
8. You’re the leader of the security committee at ACME. After a move to a new facility, you’re installing a new security monitoring system throughout. Which of the following best describes a motion detector mounted in the corner of a hallway?
a. Perimeter security
b. Partitioning
c. Security zone
d. IDS system
9. Which technology uses a physical characteristic to establish identity?
a. Biometrics
b. Surveillance
c. Smart card
d. CHAP authenticator
10. As part of your training program, you’re trying to educate users on the importance of security. You explain to them that not every attack depends on implementing advanced technological methods. Some attacks, you explain, take advantage of human shortcomings to gain access that should otherwise be denied. What term do you use to describe attacks of this type?
a. Social engineering
b. IDS system
c. Perimeter security
d. Biometrics
11. Wireless cells have which of the following characteristics?
a. Line-of-site communications
b. Automatic position location
c. High-power portable devices
d. High levels of security
12. You’re attempting to sell upper management on the concept of adopting GSM technology. It promises to provide encryption as well as international usability, and it’s an example of which technology?
a. Perimeter security
b. Surveillance system
c. Security zones
d. Cell technology
13. The process of reducing or eliminating susceptibility to outside interference is called what?
a. Shielding
b. EMI
c. TEMPEST
d. Desensitization
14. You work for an electronics company that has just created a device that emits less RF than any competitor’s product. Given