Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Classroom Management NBT1 Security Questions and Answers 2024 WGU

Rating
-
Sold
-
Pages
167
Uploaded on
01-05-2024
Written in
2023/2024

Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU

Institution
Module

Content preview

Question 1:
Correct
While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The
individual in question did not have a security badge.

Which of the following security measures would you MOST likely implement to keep
this from happening in the future?

Answer


Lo-jack recovery service



Door locks with card readers

Correct Answer:

Access control vestibule



Cable locks

Explanation
You could implement an access control vestibule (ACV) at each entrance to the
facility. An ACV is a specialized entrance with two doors that creates a security
buffer zone between two areas. Once a person enters into the space between the
doors, both doors are locked. To enter the facility, authentication must be
provided. If authentication is not provided, the intruder is kept in the access
control vestibule until authorities arrive.

Cable locks are used to secure computer hardware.

In this scenario, door locks with card readers were already circumvented with the
piggybacking technique.

Lo-jack recovery services are used to locate stolen or misplaced computer hardware.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_piggy_backing_mantrap_pp7.question.fex

Question 2:
Correct
Which of the following can be paired with a motion sensor to improve security?

Answer
Correct Answer:

Lights

,Cable lock



Door lock



Magnetometer

Explanation
Motion sensors can be implemented to trigger spotlights or alarms when motion is
detected. The motion sensors can be used both inside and outside of a building.

Cable locks, door locks, and magnetometers would not be paired with a motion sensor
to improve security.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_motion_sensor_lights_pp7.question.fex

Question 3:
Incorrect
Which of the following door locks provides authentication to a specific lock over a
Bluetooth connection?

Answer
Correct Answer:

Key fob



Biometric

Incorrect answer:

Smart card



Standard lock

Explanation
A key fob provides a keyless authentication to a specific lock. The key fob may use
a wireless radio signal, NFC, or Bluetooth to communicate with the lock.

Smart cards also provide a keyless authentication to a specific lock. Smart cards
typically use RFID or NFC to communicate with the lock and need to be scanned by a
special reader to open the lock. Smart cards do not use Bluetooth.

Biometric locks can provide authentication to a lock using a user's unique physical
traits. Biometric locks do not use Bluetooth.

A standard lock uses a key, not Bluetooth.

,References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_key_fob_def_pp7.question.fex

Question 4:
Correct
A public library has purchased new laptop computers to replace their older desktop
computers and is concerned that they are vulnerable to theft.

Which of the following laptop features should they use to physically secure the new
laptops?

Answer
Correct Answer:

Cable locks



A multi-factor password policy



Biometric authentication



An external encryption device

Explanation
Cable locks can be used to physically secure laptops in order to deter theft.

Biometric authentication, a multi-factor password policy, or external encryption
devices do not physically secure laptops.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_sol_pp7.question.fex

Question 5:
Correct
You have five salespeople who work out of your office and who frequently leave
their laptops laying on their desks in their cubicles. You are concerned that
someone might walk by and take one of these laptops.

Which of the following is the BEST protection method to address your concerns?

Answer


Encrypt all company data on the hard drives.

, Implement screen saver passwords.

Correct Answer:

Use cable locks to chain the laptops to the desks.



Require strong passwords in the Local Security Policy.

Explanation
Your main concern, in this case, is with the laptops being stolen. The best
protection against physical theft is to secure the laptops in place using cable
locks.

Requiring strong passwords or using encryption might prevent unauthorized users
from accessing data on the laptops, but doing so does not prevent physical theft.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_chain_sol_pp7.question.fex

Question 6:
Correct
You have been hired to evaluate a client's building security. In your walkthrough,
you notice the following:

All pieces of equipment have cable locks installed.
Server racks are locked and have alarms.
The WAP for the guest Wi-Fi is located on the receptionist's desk.
Biometric locks are installed on high security rooms.
Which of the following would you MOST likely recommend that your client do to
increase security based on this information?

Answer


Install biometric locks on the server racks.



Replace the biometric locks with standard locks.



Upgrade the equipment cable locks.

Correct Answer:

Install the WAP on the ceiling or inside of a special locked box.

Explanation
In this scenario, the WAP should be installed on the ceiling or in a special locked
box to prevent unauthorized access.

Written for

Institution
Study
Unknown
Module

Document information

Uploaded on
May 1, 2024
Number of pages
167
Written in
2023/2024
Type
Exam (elaborations)
Contains
Unknown

Subjects

$26.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Millenialnurse Freelance Tutor
Follow You need to be logged in order to follow users or courses
Sold
248
Member since
4 year
Number of followers
147
Documents
1482
Last sold
1 month ago
Genuine Study Guides 2024

Holla me for assistance 24/7.

3.4

37 reviews

5
17
4
4
3
4
2
2
1
10

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions