43. b. A wet pipe releases water at a set temperature. The pre-action pipe sounds an alarm and delays water release. A water pipe does not delay water release. A gas pipe is not relevant here.
44. What is the best location for a data center?
a. Near stairways
b. Near elevators
c. Near restrooms
d. Any location other than the above
44. d. The objective is to reduce the risk of close physical proximity in terms of vandalism and other disasters (e.g., bombings). The data center should be remote from publicly used areas due to their easy access for both insiders (disgruntled employees) and outsiders (intruders).
45. Which of the following security safeguards is ineffective in an online application system serving multiple users at multiple locations?
a. Procedural controls
b. Physical controls
c. Hardware controls
d. Software controls
45. b. An online application system serving multiple users at multiple locations assumes that a network is in place. With a network there is often no centralized computer room with physical security controls that can be implemented. Therefore, physical controls are ineffective. Examples of physical controls include locked doors, intrusion detection devices, security guards, and magnetic badge readers that restrict physical access. Procedural controls are incorrect because they include instructions to request a user profile, adding and deleting users, and instructions to request database views, and so on. Hardware controls are incorrect because they include fault tolerance devices such as disk mirroring and disk duplexing, smart card processing, encryption, parity checks, and switched ports. Software controls are incorrect because they include user IDs and passwords, smart card processing, encryption, check digits, and message authentication.
46. What is the most effective control in handling potential terrorist attacks, especially bombing?
a. Use simulation software.
b. Examine all letters and parcels coming into a building.
c. Hire security guards.
d. Keep motor vehicles away from the building.
46. c. There is no substitute for vigilant and resourceful security guards protecting the buildings. Simulation software is available that can assess the vulnerability of a structure to explosive blasts by simulating the detonation of devices at various design points. Security can be improved by simply keeping vehicles away from a near proximity to the structure. It also makes sense to examine all letters and parcels coming into a building for explosives.
47. Which of the following is the most commonly used sprinkler system?
a. Wet-pipe system
b. Dry-pipe system
c. Carbon dioxide system
d. Halon system
47. a. Wet-pipe systems are the most commonly used and are applicable when freezing is no threat to their operation. The next most popular one is the dry pipe. The carbon dioxide system is dangerous to people’s health, and the Halon system cannot be used any more due to a halt in Halon production.
48. Which of the following statements about sprinkler systems is not always true?
a. Sprinkler systems cause water damage.
b. Sprinkler systems reduce fire damage locally.
c. Sprinkler systems protect human lives of building occupants.
d. Sprinkler systems limit fire damage to the building itself.
48. a. When properly installed, maintained, and provided with an adequate supply of water, automatic sprinkler systems are highly effective in protecting buildings and their contents. Nonetheless, you often hear uninformed people speak of the water damage done by sprinkler systems as a disadvantage. Fires that trigger sprinkler systems cause the water damage. In short, sprinkler systems reduce the fire damage, protect the lives of building occupants, and limit the fire damage to the building itself.
49. Which of the following is a physical security measure for cryptographic keys such as plaintext secret keys and private keys during their physical maintenance?
a. Zeroization proof
b. Zero-knowledge proof
c. Zero-defects proof
d. Zero-quantum proof