3

.pdf

School

Eastern Gateway Community College *

*We aren’t endorsed by this school

Course

NET232

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

6

Uploaded by AmbassadorDiscovery11913

10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 1/6 Score: 100% Passing Score: 80% Question 1: Correct Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns? Encrypt all company data on hard drives. Implement screen saver passwords. Use cable locks to chain the laptops to the desks. Require strong passwords in the Local Security Policy. Explanation In this case, your main concern is that someone might steal the laptops. The best protection against physical theft is to secure the laptops in place using a cable lock. Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but these measures do not prevent physical theft. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_hdw_sec_cable_lock_secp7.question.fex Question 2: Correct Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access. Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.) Place your networking equipment in a Van Eck cage. Place your networking equipment in a Faraday cage. Place your networking equipment in a locked cage. Place your networking equipment in a TEMPEST cage. Place your networking equipment in a room that requires key card entry. INDIVIDUAL RESPONSES OBJECTIVE ANALYSIS
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 2/6 Explanation Placing your networking equipment in a locked cage inside of a locked room that also requires key card access is the best way to physically secure your network from an attacker who would attempt to gain physical access. A Faraday cage prevents attackers from using Van Eck phreaking to gather electronic emissions coming from your networking closet. The government uses a special emission security specification called TEMPEST that requires the use of a Faraday cage. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.3 Physical Network Protection 3.2.4 Physical Network Protection Facts q_hdw_sec_cards.secp7.question.fex Question 3: Correct You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet. She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media. You notice the organization's network switch is kept in the server closet. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much data as possible in the process. You take the workstation back to your office to work on it. Which security-related recommendations should you make to this client? Upgrade the server closet lock to a biometric authentication system. Replace the tape drive used for backups with external USB hard disks. Keep the network infrastructure devices (switch and all-in-one device) in a locked room separate from network servers. Implement a hardware checkout policy. Explanation In this scenario, you should recommend the client implement a hardware checkout policy. A checkout policy ensures that hardware containing sensitive data does not leave the organization's premises without approval and without recording the device's serial number, make, and model number. A biometric server room lock is probably not necessary in this scenario. It is acceptable to keep servers and network devices, such as routers and switches, in the same room, as long as that room is kept secure. There's no security advantage to using external hard drives instead of tape backup media. References 3.2.2 Hardware Security Facts q_hdw_sec_check_pol_secp7.question.fex
10/15/23, 11:42 AM TestOut LabSim https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8… 3/6 Question 4: Correct Which of the following is the most important thing to do to prevent console access to the router? Keep the router in a locked room. Implement an access list to prevent console connections. Disconnect the console cable when not in use. Set the console and enable secret passwords. Explanation To control access to the router console, you must keep the router in a locked room. A console connection can only be established with a direct physical connection to the router. If the router is in a locked room, only those with access are able to make a console connection. In addition, even if you had set console passwords, users with physical access to the router could perform router password recovery and gain access. References 3.2.1 Hardware Security Guidelines 3.2.2 Hardware Security Facts 3.2.4 Physical Network Protection Facts q_hdw_sec_phys_lock_secp7.question.fex Question 5: Correct Burning, pulping, and shredding are three ways to securely dispose of data in which form? Paper Disk Cloud Tape Explanation Although tape and disk could be destroyed by industrial shredders, pulping can only be done to paper by using water and chemicals to dissolve the paper. Data in the cloud must be disposed of with tools from the cloud provider. References 3.2.2 Hardware Security Facts q_hdw_sec_secure_data_secp7.question.fex Question 6: Correct A computer or small network that is not connected to the rest of the network or the internet is known as: Air gap Faraday cage Vault DMZ
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help