Читаем CISSP Practice полностью

71. d. Dry-pipe systems are more sophisticated than water-based sprinkler systems. They minimize the chances of accidental discharge of water because they discharge water only as needed. Therefore, they are a substitute for water-based sprinkler systems, which are used to extinguish fire. Carbon dioxide is a clean gas and does not leave a residue on computer equipment or magnetic media. However, its use is diminishing due to potential health problems. Carbon dioxide and water sprinklers, respectively, are ranked from most to least harmful to people when activated.

72. Which of the following causes more fire fatalities?

a. Smoke

b. Toxic gases

c. Heat

d. Flames

72. b. Toxic gases cause more fire fatalities than flames, smoke, or heat.

73. Which one of the following replacements for the Halogenated agents (Halon 1211 and 1301) is the safest to humans?

a. FM-200

b. Argon

c. Water fog

d. Inergen

73. c. The production of Halogenated agents (Halon 1211 and 1301) was stopped in January 1994 due to their depletion of the ozone layer. Many replacements were found, but the water fog is the safest one to humans.

74. Which of the following prevents tailgating or piggybacking in a computer center?

a. Cameras

b. Mantraps

c. Sensors

d. Alarms

74. b. Tailgating (piggybacking) means an unauthorized person is following an authorized person into a facility. It can be prevented by the use of mantraps where they take a measurement of the body weight of a person entering the computer center doors and combine it with a biometric feature such as a fingerprint scan. If the person is not authorized to enter this highly sensitive area, he will not be allowed to proceed further, and security authorities will be notified.

Surveillance cameras are passive and do not take any action. Sensors and alarms do not have the intelligence built in similar to that of mantraps and can give rise to false alarms.

75. Which of the following should be the first step to be performed prior to installing cable wires in a computer center facility?

a. Implement physical security controls.

b. Test the cables.

c. Check with local building codes.

d. Label the cables.

75. c. Prior to any wiring installation, it is good to contact the official local building code standard sources and people to ensure that the planned cable plant is consistent with electrical and fire codes. This is to protect the safety and security of the facility. Physical security controls can include acquiring dedicated space with a locked door to serve as a wiring closet. After checking with the local building codes, the next step is to test the cable for bad spots. By labeling both ends of a cable, a built-in map is available that identifies each cable, its termination point and length, and electrical characteristics.

76. Which of the following should be considered as delaying devices in physical security?

a. Lights

b. Safes

c. Locks

d. Vaults

76. c. Locks are considered as delaying devices only and not bars to entry. The longer it takes to open or break a lock, the shorter the patience for an intruder, and the wider the window of opportunity for detection. The idea is that officials will soon be arriving at the place if it takes longer to open a lock.

Lights serve as a deterrent to violators. Safes provide protection against fire, burglary, and robbery. Vaults are enlarged safes and can be supported by alarm systems.

77. Which of the following does not assess the vulnerability of a facility to damage or an attack?

a. Inspection

b. History of losses

c. Security controls

d. Security budget

77. d. Examining a security budget cannot reveal much because there is no direct correlation between the budget and the vulnerability. An inspection of the facility by an experienced inspector can reveal the status of the facility and its associated controls. Examination of the facility’s record of losses can reveal how bad the situation is. The degree of security controls installed can reveal whether high-value property is properly safeguarded from theft by insiders or attack by outsiders.

78. Which of the following is a safe practice to ensure physical security?

a. Deter

b. Detect

c. Delay

d. Deny

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес