每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.

Slides:



Advertisements
Similar presentations
Physical Security.
Advertisements

Preventing Equipment Failures
Fire Extinguishers 29 CFR Session Objectives You will be able to: Identify different classes of fire Choose the appropriate type of extinguisher.
HVAC CONTROLS (See section 18.9)
Fire Safety & Fire Extinguisher Use
Water Based Sprinkler Systems 2 major different types of water sprinkler systems Wet pipe system Dry pipe system.
Fire Detection and Suppression Chapter 7 Special Extinguishing Systems.
FIRE SAFETY TRAINING THE LOSS PREVENTION UNIT OF THE OFFICE OF RISK MANAGEMENT.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Means of Egress and Fire Protection. 2 Objectives Understand Alarms and Warning Devices Know the location of Exits and Exit Routes Understand the RACE.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
3-1 NFIRS 3 Structure Fire Module. 3-2 ObjectivesObjectives The participants will be able to: –describe when the Structure Fire Module is to be used.
Principles of Information Security, 3rd Edition 2 Introduction  Physical security addresses the design, implementation, and maintenance of countermeasures.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Information Systems Security Physical Security Domain #4.
Fire Safety & Fire Extinguisher Use. OBJECTIVES Understand the combustion process and different fire classes Understand fire extinguisher types, operating.
Physical Security Chapter 9.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Physical Security EECS710 Fall 2006 Professor Saiedian Presenter:
Physical Security.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
EGRESS AND FIRE PROTECTION
Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect physical resources of an organization.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
HVACR311 – Electrical for Refrigeration International Mechanical Code Relating to Refrigeration.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
Principles of Information Security, 2nd Edition 2 Learning Objectives Upon completion of this material, you should be able to:  Understand the conceptual.
Home Safety and Security
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
1 HVACR318 – Refrigeration II International Mechanical Code Relating to Refrigeration.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
Physical (Environmental) Security
Fire Protection Systems Chapter 6. Fire Protection Systems Most of the time you will work with an electrical engineer or fire-protection designer to coordinate.
Fire No institution is immune from fire. Flood damage can be dried out and restored, stolen property has a chance of being recovered; damage from fire.
Physical Security Chapter 9 If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or.
Physical and Environmental Security Chapter 5 Part 2 Pages 457 to 499.
Health & Safety Risk Management
8.02 Home Safety and Security. Fire Safety Smoke Detectors Sends a loud warning signal if a fire starts Easy to install Should be placed on each floor.
PHYSICAL SECURITY DOMAIN
Fire Extinguisher Primer 10-4 training 10 Slides, 4 minutes.
Fire Extinguishers 29 CFR © Business & Legal Reports, Inc Session Objectives You will be able to: Identify different classes of fire Choose.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Physical Security Ch9 Part II Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
HOW NOT TO INCORRECTLY CARE FOR COMPUTER HARDWARE HANDLING AND STORAGE BY BLAINE AND ZACH.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Physical Security.
CompTIA Security+ Study Guide (SY0-401)
Risk management.
FIRE PROTECTION & SECURITY in ELI Beamlines
NETW4005 COMPUTER SECURITY A
Domain 3 – Security Engineering
What Library Staff Should Know About Fire Safety
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Chapter 10 Physical Security
Firefighting equipment
Fire safety Module 10.
Presentation transcript:

每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet Pipe sprinkler system C Preaction sprinkler system D Deluge sprinkler system C

每时每刻 可信安全 2 Physical security is accomplished through proper facility construction, fire and water protection, anti-theft mechanisms, intrusion detection systems, and security procedures that are adhered to and enforced. Which of the following is not a component that achieves this type of security? A Administrative control mechanisms B Integrity control mechanisms C Technical control mechanisms D Physical control mechanisms B

每时每刻 可信安全 3 Which of the following related to physical security is not considered a technical control? A Access controls B Intrusion detection C Fire detection and suppression D Locks D

每时每刻 可信安全 4 Which of the following suppresses the fuel supply of the fire? A soda acid B CO2 C Halon D water A

每时每刻 可信安全 5 Which of the following is true about a "dry pipe" sprinkler system? A It is a substitute for carbon dioxide systems. B It maximizes chances of accidental discharge of water. C It minimizes chances of accidental discharge of water. D It uses less water than "wet pipe" systems c

每时每刻 可信安全 6 What fencing height is likely to stop a determined intruder? A 3' to 4' high. B 6' to 7' high. C 8' high and above with strands of barbed wire. D No fence can stop a determined intruder C

每时每刻 可信安全 7 Which of the following is NOT a system- sensing wireless proximity card? A magnetically striped card B passive device C field-powered device D transponder A

每时每刻 可信安全 8 A prolonged power outage is a: A brownout B blackout C surge D fault B Power increase (1) spike momentary high voltage surge prolonged high voltage Power loss (2) fault momentary power outage blackout prolonged loss of power (3) sag momentary low voltage blackout prolonged power suply that is below normal voltage

每时每刻 可信安全 9 The ideal operating humidity range is defined as 40 percent to 60 percent. Low humidity (less than 40 percent) can produce what type of problem on computer parts? A Static electricity B Electro-plating C Energy-plating D Element-plating A

每时每刻 可信安全 10 While referring to Physical Security, what does Positive pressurization means? A The pressure inside your sprinkler system is greater than zero. B The air goes out of a room when a door is opened and outside air does not go into the room C Causes the sprinkler system to go off D A series of measures that increase pressure on employees in order to make them more productive. B

每时每刻 可信安全 11 What is the first step that should be done when a fire has been detected? A . Turn off the HVAC : system and activate fire door releases . B . Determine which type of fire it is . C . Advise individuals within the building to leave . D . Activate fire suppression system . C

每时每刻 可信安全 12 . Which of the following items does not provide physical protection? A . Smart card B . Token C . Biometric device D . Single sign-On system D

每时每刻 可信安全 13. When should a Class C fire extinguisher be used instead of a Class A? A.When electrical equipment is on fire B.When wood and paper are on fire C. When a combustible liquid is on fire D. When the fire is in an open area A

每时每刻 可信安全 14. Which is not a preventive physical security control? A.Fences B. Locks C. Security guard D. Access and audit log D

每时每刻 可信安全 15. How does Halon fight fires? A. It reduces the fire's fuel intake. B. It reduces the temperature of the area and cools the fire out. C. It disrupts the chemical reactions of a fire. D. it reduces the oxygen in the area. C

每时每刻 可信安全 16. What is a mantrap? A. A trusted security domain B. A logical access control mechanism C. A double-door facility used for physical access control D. A fire suppression device C

每时每刻 可信安全 17. What is true about a transponder? A. It is a card that can be read without sliding it through a card reader. B. It is a passive proximity device. C. It is a card that a user swipes through a card reader to gain access to a facility. D. It exchanges tokens with an authentication server. A

每时每刻 可信安全 18. When is a security guard the best choice for a physical access control mechanism? A. When discriminating judgment is required B. When intrusion detection is required C. When the security budget is low D. When access controls are in place A

每时每刻 可信安全 19. Critical areas should have illumination of A. Three foot-candles and eight feet in height B. Two foot-candles and eight feet in height C. Three foot-candles and six feet in height D. Two foot-candles and six feet in height B

每时每刻 可信安全 20. What is a common problem with vibration-detection devices used for perimeter security? A. They can be defeated by emitting the right electrical signals in the protected area. B. The power source is easily disabled. C. They cause false alarms by things that do not threaten the environment. D. They interfere with computing devices. C

每时每刻 可信安全 21 What are the problems from humidity in an area with electrical devices? A. High humidity causes excess electricity, and low humidity causes corrosion. B. High humidity causes corrosion, and low humidity causes static electricity. C. High humidity causes power fluctuations, and low humidity causes static electricity. D. High humidity causes corrosion, and low humidity causes power fluctuations. B

每时每刻 可信安全 22 What does positive pressurization pertaining to ventilation mean? A. When a door opens, the air comes in. B. When a fire takes place, the power supply is disabled. C. When a fire takes place, the smoke is diverted to one room. D. When a door opens, the air goes out. D

每时每刻 可信安全 23 When deciding on a location to build a facility, which item is not as important as the rest? A. Possibility of natural disasters B. Crime rate C. Proximity to library D. Proximity to fire station C

每时每刻 可信安全 24 Which is not an administrative control pertaining to emergency procedures? A. Intrusion detection systems B. Awareness and training C. Drills and inspections D. Delegation of duties A

每时每刻 可信安全 25 If an access control has a fail-safe characteristic and not a fail-secure characteristic, what does that mean? A. It defaults to no access. B. It defaults to being unlocked. C. It defaults to being locked. D. It defaults to sounding a remote alarm instead of a local alarm. B

每时每刻 可信安全 26 What are the two general types of proximity identification devices? A. Biometric devices and access control devices B. Swipe card devices and passive devices C. Preset code devices and wireless devices D. User-activated devices and system sensing devices D

每时每刻 可信安全 27 Which is not a drawback to installing intrusion detection and monitoring systems? A. Expensive to install B. Cannot be penetrated C. Requires human response D. Subject to false alarms B

每时每刻 可信安全 28 What is a cipher lock? A. A lock that uses cryptographic keys B. A lock that uses a type of key that cannot be reproduced C. A lock that uses a token and perimeter reader D. A lock that uses a keypad D