100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Classroom Management NBT1 Security Questions and Answers 2024 WGU €25,55   In winkelwagen

Tentamen (uitwerkingen)

Classroom Management NBT1 Security Questions and Answers 2024 WGU

 7 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU/Classroom Management NBT1 Security Questions and Answers 2024 WGU

Voorbeeld 4 van de 167  pagina's

  • 1 mei 2024
  • 167
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Onbekend
  • Onbekend
avatar-seller
Question 1:
Correct
While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The
individual in question did not have a security badge.

Which of the following security measures would you MOST likely implement to keep
this from happening in the future?

Answer


Lo-jack recovery service



Door locks with card readers

Correct Answer:

Access control vestibule



Cable locks

Explanation
You could implement an access control vestibule (ACV) at each entrance to the
facility. An ACV is a specialized entrance with two doors that creates a security
buffer zone between two areas. Once a person enters into the space between the
doors, both doors are locked. To enter the facility, authentication must be
provided. If authentication is not provided, the intruder is kept in the access
control vestibule until authorities arrive.

Cable locks are used to secure computer hardware.

In this scenario, door locks with card readers were already circumvented with the
piggybacking technique.

Lo-jack recovery services are used to locate stolen or misplaced computer hardware.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_piggy_backing_mantrap_pp7.question.fex

Question 2:
Correct
Which of the following can be paired with a motion sensor to improve security?

Answer
Correct Answer:

Lights

,Cable lock



Door lock



Magnetometer

Explanation
Motion sensors can be implemented to trigger spotlights or alarms when motion is
detected. The motion sensors can be used both inside and outside of a building.

Cable locks, door locks, and magnetometers would not be paired with a motion sensor
to improve security.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_motion_sensor_lights_pp7.question.fex

Question 3:
Incorrect
Which of the following door locks provides authentication to a specific lock over a
Bluetooth connection?

Answer
Correct Answer:

Key fob



Biometric

Incorrect answer:

Smart card



Standard lock

Explanation
A key fob provides a keyless authentication to a specific lock. The key fob may use
a wireless radio signal, NFC, or Bluetooth to communicate with the lock.

Smart cards also provide a keyless authentication to a specific lock. Smart cards
typically use RFID or NFC to communicate with the lock and need to be scanned by a
special reader to open the lock. Smart cards do not use Bluetooth.

Biometric locks can provide authentication to a lock using a user's unique physical
traits. Biometric locks do not use Bluetooth.

A standard lock uses a key, not Bluetooth.

,References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_key_fob_def_pp7.question.fex

Question 4:
Correct
A public library has purchased new laptop computers to replace their older desktop
computers and is concerned that they are vulnerable to theft.

Which of the following laptop features should they use to physically secure the new
laptops?

Answer
Correct Answer:

Cable locks



A multi-factor password policy



Biometric authentication



An external encryption device

Explanation
Cable locks can be used to physically secure laptops in order to deter theft.

Biometric authentication, a multi-factor password policy, or external encryption
devices do not physically secure laptops.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_sol_pp7.question.fex

Question 5:
Correct
You have five salespeople who work out of your office and who frequently leave
their laptops laying on their desks in their cubicles. You are concerned that
someone might walk by and take one of these laptops.

Which of the following is the BEST protection method to address your concerns?

Answer


Encrypt all company data on the hard drives.

, Implement screen saver passwords.

Correct Answer:

Use cable locks to chain the laptops to the desks.



Require strong passwords in the Local Security Policy.

Explanation
Your main concern, in this case, is with the laptops being stolen. The best
protection against physical theft is to secure the laptops in place using cable
locks.

Requiring strong passwords or using encryption might prevent unauthorized users
from accessing data on the laptops, but doing so does not prevent physical theft.

References

14.3.1 Building Physical Access Measures

14.3.2 Building Physical Access Measure Facts
q_building_security_cable_lock_chain_sol_pp7.question.fex

Question 6:
Correct
You have been hired to evaluate a client's building security. In your walkthrough,
you notice the following:

All pieces of equipment have cable locks installed.
Server racks are locked and have alarms.
The WAP for the guest Wi-Fi is located on the receptionist's desk.
Biometric locks are installed on high security rooms.
Which of the following would you MOST likely recommend that your client do to
increase security based on this information?

Answer


Install biometric locks on the server racks.



Replace the biometric locks with standard locks.



Upgrade the equipment cable locks.

Correct Answer:

Install the WAP on the ceiling or inside of a special locked box.

Explanation
In this scenario, the WAP should be installed on the ceiling or in a special locked
box to prevent unauthorized access.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Millenialnurse. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €25,55. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67866 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen

Laatst bekeken door jou


€25,55
  • (0)
  Kopen