100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Classroom Management NBT1 Security Questions and Answers 2024 WGU £21.35   Add to cart

Exam (elaborations)

Classroom Management NBT1 Security Questions and Answers 2024 WGU

 7 views  0 purchase

Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU

Preview 4 out of 167  pages

  • May 1, 2024
  • 167
  • 2023/2024
  • Exam (elaborations)
  • Unknown
All documents for this subject (1)
avatar-seller
Millenialnurse
Question 1:
Correct
While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The
individual in question did not have a security badge.

Which of the following security measures would you MOST likely implement to keep
this from happening in the future?

Answer


Lo-jack recovery service



Door locks with card readers

Correct Answer:

Access control vestibule



Cable locks

Explanation
You could implement an access control vestibule (ACV) at each entrance to the
facility. An ACV is a specialized entrance with two doors that creates a security
buffer zone between two areas. Once a person enters into the space between the
doors, both doors are locked. To enter the facility, authentication must be
provided. If authentication is not provided, the intruder is kept in the access
control vestibule until authorities arrive.

Cable locks are used to secure computer hardware.

In this scenario, door locks with card readers were already circumvented with the
piggybacking technique.

Lo-jack recovery services are used to locate stolen or misplaced computer hardware.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_piggy_backing_mantrap_pp7.question.fex

Question 2:
Correct
Which of the following can be paired with a motion sensor to improve security?

Answer
Correct Answer:

Lights

,Cable lock



Door lock



Magnetometer

Explanation
Motion sensors can be implemented to trigger spotlights or alarms when motion is
detected. The motion sensors can be used both inside and outside of a building.

Cable locks, door locks, and magnetometers would not be paired with a motion sensor
to improve security.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_motion_sensor_lights_pp7.question.fex

Question 3:
Incorrect
Which of the following door locks provides authentication to a specific lock over a
Bluetooth connection?

Answer
Correct Answer:

Key fob



Biometric

Incorrect answer:

Smart card



Standard lock

Explanation
A key fob provides a keyless authentication to a specific lock. The key fob may use
a wireless radio signal, NFC, or Bluetooth to communicate with the lock.

Smart cards also provide a keyless authentication to a specific lock. Smart cards
typically use RFID or NFC to communicate with the lock and need to be scanned by a
special reader to open the lock. Smart cards do not use Bluetooth.

Biometric locks can provide authentication to a lock using a user's unique physical
traits. Biometric locks do not use Bluetooth.

A standard lock uses a key, not Bluetooth.

,References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_key_fob_def_pp7.question.fex

Question 4:
Correct
A public library has purchased new laptop computers to replace their older desktop
computers and is concerned that they are vulnerable to theft.

Which of the following laptop features should they use to physically secure the new
laptops?

Answer
Correct Answer:

Cable locks



A multi-factor password policy



Biometric authentication



An external encryption device

Explanation
Cable locks can be used to physically secure laptops in order to deter theft.

Biometric authentication, a multi-factor password policy, or external encryption
devices do not physically secure laptops.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_sol_pp7.question.fex

Question 5:
Correct
You have five salespeople who work out of your office and who frequently leave
their laptops laying on their desks in their cubicles. You are concerned that
someone might walk by and take one of these laptops.

Which of the following is the BEST protection method to address your concerns?

Answer


Encrypt all company data on the hard drives.

, Implement screen saver passwords.

Correct Answer:

Use cable locks to chain the laptops to the desks.



Require strong passwords in the Local Security Policy.

Explanation
Your main concern, in this case, is with the laptops being stolen. The best
protection against physical theft is to secure the laptops in place using cable
locks.

Requiring strong passwords or using encryption might prevent unauthorized users
from accessing data on the laptops, but doing so does not prevent physical theft.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_chain_sol_pp7.question.fex

Question 6:
Correct
You have been hired to evaluate a client's building security. In your walkthrough,
you notice the following:

All pieces of equipment have cable locks installed.
Server racks are locked and have alarms.
The WAP for the guest Wi-Fi is located on the receptionist's desk.
Biometric locks are installed on high security rooms.
Which of the following would you MOST likely recommend that your client do to
increase security based on this information?

Answer


Install biometric locks on the server racks.



Replace the biometric locks with standard locks.



Upgrade the equipment cable locks.

Correct Answer:

Install the WAP on the ceiling or inside of a special locked box.

Explanation
In this scenario, the WAP should be installed on the ceiling or in a special locked
box to prevent unauthorized access.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Millenialnurse. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £21.35. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£21.35
  • (0)
  Add to cart