3
.pdf
keyboard_arrow_up
School
Eastern Gateway Community College *
*We aren’t endorsed by this school
Course
NET232
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
6
Uploaded by AmbassadorDiscovery11913
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
1/6
Score: 100%
Passing Score: 80%
Question 1:
Correct
Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles.
You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection
implementation to address your concerns?
Encrypt all company data on hard drives.
Implement screen saver passwords.
Use cable locks to chain the laptops to the desks.
Require strong passwords in the Local Security
Policy.
Explanation
In this case, your main concern is that someone might steal the laptops. The best protection against physical theft is to secure the
laptops in place using a cable lock.
Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but these
measures do not prevent physical theft.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.3 Physical Network Protection
3.2.4 Physical Network Protection Facts
q_hdw_sec_cable_lock_secp7.question.fex
Question 2:
Correct
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not
able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network
to set up remote access or backdoor access.
Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select
two. Each measure is part of a complete solution.)
Place your networking equipment in a Van Eck
cage.
Place your networking equipment in a Faraday
cage.
Place your networking equipment in a locked cage.
Place your networking equipment in a TEMPEST
cage.
Place your networking equipment in a room that
requires key card entry.
INDIVIDUAL RESPONSES
OBJECTIVE ANALYSIS
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
2/6
Explanation
Placing your networking equipment in a locked cage inside of a locked room that also requires key card access is the best way to
physically secure your network from an attacker who would attempt to gain physical access.
A Faraday cage prevents attackers from using Van Eck phreaking to gather electronic emissions coming from your networking closet.
The government uses a special emission security specification called TEMPEST that requires the use of a Faraday cage.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.3 Physical Network Protection
3.2.4 Physical Network Protection Facts
q_hdw_sec_cards.secp7.question.fex
Question 3:
Correct
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you
note the following:
When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office
manager sits.
The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the
server closet.
She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media.
You notice the organization's network switch is kept in the server closet.
You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal
network from external attacks.
The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much
data as possible in the process. You take the workstation back to your office to work on it.
Which security-related recommendations should you make to this client?
Upgrade the server closet lock to a biometric
authentication system.
Replace the tape drive used for backups with
external USB hard disks.
Keep the network infrastructure devices (switch
and all-in-one device) in a locked room separate
from network servers.
Implement a hardware checkout policy.
Explanation
In this scenario, you should recommend the client implement a hardware checkout policy. A checkout policy ensures that hardware
containing sensitive data does not leave the organization's premises without approval and without recording the device's serial number,
make, and model number.
A biometric server room lock is probably not necessary in this scenario. It is acceptable to keep servers and network devices, such as
routers and switches, in the same room, as long as that room is kept secure. There's no security advantage to using external hard
drives instead of tape backup media.
References
3.2.2 Hardware Security Facts
q_hdw_sec_check_pol_secp7.question.fex
10/15/23, 11:42 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/4adc36c7-fee4-4ce0-b034-12b30f0095c1/exam-session/31152006/68ec89c7-1976-4bbb-8…
3/6
Question 4:
Correct
Which of the following is the most important thing to do to prevent console access to the router?
Keep the router in a locked room.
Implement an access list to prevent console
connections.
Disconnect the console cable when not in use.
Set the console and enable secret passwords.
Explanation
To control access to the router console, you must keep the router in a locked room. A console connection can only be established with a
direct physical connection to the router. If the router is in a locked room, only those with access are able to make a console connection.
In addition, even if you had set console passwords, users with physical access to the router could perform router password recovery
and gain access.
References
3.2.1 Hardware Security Guidelines
3.2.2 Hardware Security Facts
3.2.4 Physical Network Protection Facts
q_hdw_sec_phys_lock_secp7.question.fex
Question 5:
Correct
Burning, pulping, and shredding are three ways to securely dispose of data in which form?
Paper
Disk
Cloud
Tape
Explanation
Although tape and disk could be destroyed by industrial shredders, pulping can only be done to paper by using water and chemicals to
dissolve the paper.
Data in the cloud must be disposed of with tools from the cloud provider.
References
3.2.2 Hardware Security Facts
q_hdw_sec_secure_data_secp7.question.fex
Question 6:
Correct
A computer or small network that is not connected to the rest of the network or the internet is known as:
Air gap
Faraday cage
Vault
DMZ
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help