71. d. Dry-pipe systems are more sophisticated than water-based sprinkler systems. They minimize the chances of accidental discharge of water because they discharge water only as needed. Therefore, they are a substitute for water-based sprinkler systems, which are used to extinguish fire. Carbon dioxide is a clean gas and does not leave a residue on computer equipment or magnetic media. However, its use is diminishing due to potential health problems. Carbon dioxide and water sprinklers, respectively, are ranked from most to least harmful to people when activated.
72. Which of the following causes more fire fatalities?
a. Smoke
b. Toxic gases
c. Heat
d. Flames
72. b. Toxic gases cause more fire fatalities than flames, smoke, or heat.
73. Which one of the following replacements for the Halogenated agents (Halon 1211 and 1301) is the safest to humans?
a. FM-200
b. Argon
c. Water fog
d. Inergen
73. c. The production of Halogenated agents (Halon 1211 and 1301) was stopped in January 1994 due to their depletion of the ozone layer. Many replacements were found, but the water fog is the safest one to humans.
74. Which of the following prevents tailgating or piggybacking in a computer center?
a. Cameras
b. Mantraps
c. Sensors
d. Alarms
74. b. Tailgating (piggybacking) means an unauthorized person is following an authorized person into a facility. It can be prevented by the use of mantraps where they take a measurement of the body weight of a person entering the computer center doors and combine it with a biometric feature such as a fingerprint scan. If the person is not authorized to enter this highly sensitive area, he will not be allowed to proceed further, and security authorities will be notified.
Surveillance cameras are passive and do not take any action. Sensors and alarms do not have the intelligence built in similar to that of mantraps and can give rise to false alarms.
75. Which of the following should be the first step to be performed prior to installing cable wires in a computer center facility?
a. Implement physical security controls.
b. Test the cables.
c. Check with local building codes.
d. Label the cables.
75. c. Prior to any wiring installation, it is good to contact the official local building code standard sources and people to ensure that the planned cable plant is consistent with electrical and fire codes. This is to protect the safety and security of the facility. Physical security controls can include acquiring dedicated space with a locked door to serve as a wiring closet. After checking with the local building codes, the next step is to test the cable for bad spots. By labeling both ends of a cable, a built-in map is available that identifies each cable, its termination point and length, and electrical characteristics.
76. Which of the following should be considered as delaying devices in physical security?
a. Lights
b. Safes
c. Locks
d. Vaults
76. c. Locks are considered as delaying devices only and not bars to entry. The longer it takes to open or break a lock, the shorter the patience for an intruder, and the wider the window of opportunity for detection. The idea is that officials will soon be arriving at the place if it takes longer to open a lock.
Lights serve as a deterrent to violators. Safes provide protection against fire, burglary, and robbery. Vaults are enlarged safes and can be supported by alarm systems.
77. Which of the following does not assess the vulnerability of a facility to damage or an attack?
a. Inspection
b. History of losses
c. Security controls
d. Security budget
77. d. Examining a security budget cannot reveal much because there is no direct correlation between the budget and the vulnerability. An inspection of the facility by an experienced inspector can reveal the status of the facility and its associated controls. Examination of the facility’s record of losses can reveal how bad the situation is. The degree of security controls installed can reveal whether high-value property is properly safeguarded from theft by insiders or attack by outsiders.
78. Which of the following is a safe practice to ensure physical security?
a. Deter
b. Detect
c. Delay
d. Deny