21. Which of the following is not an example of fire suppression and detection devices?
a. Master shutoff valves
b. Sprinkler systems
c. Fire extinguishers
d. Smoke detectors
21. a. Master shutoff valves are closed in the event of a significant water leak. The other three choices are part of the fire suppression and detection devices.
22. What is the best action to take when there is no uninterruptible power supply (UPS) in a data center?
a. Install a surge suppressor.
b. Install a line conditioner.
c. Install a backup generator.
d. Install a transformer.
22. b. Under-voltages represent the majority of power problems (sags and brownouts) for computer systems. Instantaneous power from UPS prevents data loss caused by sags and brownouts. UPS is superior to separate surge suppressors. A line conditioner automatically corrects under-voltages and over-voltages to levels that are safe for the computer system. Both generators and transformers are power sources that need to be cleaned for computer use because computers are sensitive.
23. What is the best technique to identify an intruder?
a. Place a bright light in the area.
b. Activate an alarm system.
c. Post a security guard.
d. Install a video camera.
23. d. A video camera takes pictures of an intruder, which can be used to establish a positive identification of the intruder and a proof of evidence. The other three choices do not provide a positive identification of the intruder.
24. What would you do first in case of a fire in your data center?
a. Call the fire department.
b. Pull the fire alarm device.
c. Evacuate people from the building.
d. Call the police department.
24. c. The first thing is to save people’s lives, and therefore evacuating people from the building on fire is the right thing to do. The actions mentioned in the other choices can be performed later.
25. The most frequently used fencing for physical security purposes is which of the following?
a. Barbed wire
b. Concertina wire
c. Chain-link
d. Barbed tape
25. c. A chain-link fence must be securely fastened to rigid metal or reinforced concrete posts set in concrete. It is stronger than other fences. A barbed wire is a twisted, double-stranded fence. A concertina wire is a commercially manufactured wire coil of high-strength-steel barbed wire clipped together at intervals to form a cylinder. A barbed tape consists of barbed wire, barbed tape dispenser, and concertina tape.
26. Which of the following is more secure?
a. Eight-foot wall
b. Eight-foot wall with barbed wire on top
c. Electric gate
d. Key and locked door
26. b. An eight-foot wall with barbed wire is more secure than the other choices mentioned. The requirements for barbed wire include that its height should not be less than 7 feet, excluding top guard. It is a twisted, double-stranded, 12-gauge wire. Intruders will have a problem climbing or standing over because the wire cannot hold any person straight up. Using a long ladder can circumvent an 8-foot wall. An electric gate can be opened by guessing passwords or other codes used to open and close it. A key and locked door is easy to break in by tampering with it.
27. The best location for a data center in a multistoried building is on which of the following:
a. First floor
b. Basement level
c. Top floor
d. Any floor other than the above
27. d. The first floor is not a good location to prevent undesirable access. The basement is not good because of flooding and volatile storage. The top floor of a high-rise building is not good because it may be beyond reach of fire department equipment.
28. Which of the following is not a complementary control when implementing the given logical access security controls?
a. Access profiles
b. User ID
c. ID badge card
d. Password