Test your basic knowledge |

CISSP Physical Security

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The expected lifetime of a device?






2. This can be costly and unsightly - but can provide crowd control and help control access to the facility.






3. This power source is used in day-to-day operations.






4. Device locks intended to protect hardware from theft. Use for mobile devices and lock them to a secure feature of an environment.






5. Class of fire that is assigned to commercial kitchens and the fire dangers that exist within them. Suppressing agent used in class K fires is wet chemicals.






6. Type of light that is activated when a motion sensor (or some other IDS) is activated?






7. This refers to the portion of the environment that is in focus when shown on a monitor. This increases as the size of the lens opening decreases - the subject distance increases - or the focal length of the lens decreases.






8. Type of IDS that detects changes or breaks in a circuit. Examples are window strips;vibration detectors on walls - screens - ceilings - etc; pressure pads under a rug.






9. If an electrical supply fails and a door defaults to closed and locked - which mode is this?






10. Type of IDS that emits a measurable magnetic field and detects changes in capacitance. This allows it to detect when something/someone comes within a certain range of an object. Usually used to protect specific objects (artwork - cabinets - or a safe






11. This should be clearly marked - and security guards should be trained how to identify when these items leave the facility in an improper manner.






12. Prolonged loss of power






13. An electrical circuit that receives input light from the lens and converts it into an electronic signal - which is then displayed on a monitor. Allows the capture of extraordinary details of objects because its sensors work in the infrared range. Doe






14. This is used to deter trespassing and to enable people to enter a facility through a few controlled entrances.






15. This type of water system has its sprinkler systems wide open to allow a larger volume of water to be released in a short period. These systems are typically not used in data processing environments.






16. This focal length provides a narrower view.






17. These are expensive but provide flexibility in response to security breaches and can deter intruders from attempting an attack.






18. The last line of defense in physical security?






19. Type of fence that will protect a top level security area?






20. Type of task that identifies how data flows through the company. Lists all pieces of an environment and how they interact. Redundant paths should be shown.






21. Type of IDS that uses microphones installed on floors - walls - or ceilings to detect any should made during a forced entry. Can be subject to a large amount of false positives.






22. This type of noise is disturbance imposed on a power line that causes electrical interference.






23. This is a disturbance of power and can be cause by electromagnetic interference (EMI) or radio frequency interference (RFI)






24. Prolonged high voltage power loss






25. Type of fence that uses 2 inch mesh - 9 gauge wiring






26. Type of IDS that detects changes in a light beam. Can only be used in windowless rooms.






27. Type of light that is programmed to turn on and off a predetermined times?






28. Type of window that is the strongest window available today. Resistant to breakage - chemicals - fires - and abrasions. They are also extremely expensive.






29. These are threats to what? Interruption of services - theft - physical damage - unauthorized disclosure - and loss of system integrity.






30. Type of fence that uses 1 inch mesh and 11 gauge wiring






31. Enhanced boundary fencing with motion detectors. Used at facilities that require a high level of protection.






32. What is the more important than protecting a facility or the assets it contains?






33. This should be located within 50 feet of electrical equipment and should be inspected quarterly.






34. This type of lock is programmable and uses a keypad. Can contain a specific code that will open the door and initiate a remote alarm if an employee is under duress.






35. This power source is a backup in case the primary source fails.






36. Type of window that is stronger than standard glass and acrylic windows - but produces a toxic gas if burned.






37. Type of fence that will protect a critical are?






38. What needs to be evaluated for their protective characteristics - their utility - and their cost and benefits.






39. Momentary power outage






40. When should the following items be evaluated? Local crime - natural disaster possibilities - distance to hospitals - police - fire stations - airports - and railroads.






41. These use battery packs that range in size and capacity to provide power backup and protection. These factors should be reviewed: size of the electrical load it can support - the speed with which it can assume the load when the primary source fails -






42. What should dust and other air contaminants be kept to an appropriate level?






43. This is a double door facility used for physical access control.






44. These condition an electrical line to keep voltage steady and clean.






45. These are usually planned and implemented by power companies when they are experiencing high demand.






46. Halon - FM-200 - and other Halon substitutes are examples of what?






47. These need to have shutoff valves and positive drains (substance flows out instead of in).






48. The temperature at which most computers will experience major damage?






49. What documentation should be readily available and periodically reviewed and updated.






50. These controls can be time consuming and error prone and and require constant attention.