试卷名称:CISSP认证考试(物理安全与环境安全)模拟试卷1

上一题: There are five different classes of...
下一题: The following scenario is to be use...
单项选择题

Electrical power is being provided more through smart grids, which allow for self-healing, resistance to physical and cyberattacks, increased efficiency, and better integration of renewable energy sources. Countries want their grids to be more reliable, resilient, flexible, and efficient. Why does this type of evolution in power infrastructure concern many security professionals?  

A.Allows for direct attacks through Power over Ethernet

B.Increased embedded software and computing capabilities

C.Does not have proper protection against common web-based attacks

D.Power fluctuation and outages directly affect computing systems

您可能感兴趣的题目

As with logical access controls, audit logs should be produced and monitored for physical access controls. Which of the following statements is correct about auditing physical access? Unsuccessful access attempts should be logged but only need to be reviewed by a security guard. Only successful access attempts should be logged and reviewed. Only unsuccessful access attempts during unauthorized hours should be logged and reviewed. All unsuccessful access attempts should be logged and reviewed.
Brad is installing windows on the storefront of a bank in an area known to be at risk of fires in the dry season. Which of the following is least likely to be true of the windows he is installing? The glass has embedded wires. They are made of glass-clad polycarbonate. The window material is acrylic glass. A solar window film has been added to them.
An outline for a physical security design should include program categories and the necessary countermeasures for each. What category do locks and access controls belong to? Assessment Deterrence Response Delay
There are several types of volumetric IDSs. What type of IDS emits a measurable magnetic field that it monitors for disruptions? Capacitance detector Passive infrared system Wave-pattern motion detectors Photoelectric system
There are five different classes of fire. Each depends upon what is on fire. Which of the following is the proper mapping for the items missing in the provided table? [*] Class D—combustible metals Class C—liquid Class B—electrical Class A—electrical
What type of fence detects if someone attempts to climb or cut it? Class IV PIDAS CPTED PCCIP
A number of measures should be taken to help protect devices and the environment from electric power issues. Which of the following is best to keep voltage steady and power clean? Power line monitor Surge protector Shielded cabling Regulator
Sarah recently learned that the painting she inherited from a relative and hung in her downtown coffee shop is worth a lot of money. She is worried about its protection and wants to install an IDS. Which of the following intrusion detection systems is the most appropriate for protecting the painting? Acoustical detection system Proximity detector Photoelectric system Vibration sensor
Windows can have different glazing materials. What type of window may be prohibited by fire codes because of its combustibility? Tempered Polycarbonate acrylic Glass-clad polycarbonate Laminated
CGTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV? A fixed focal length lens allows you to move between various fields of view with a single lens. To cover a large area and not focus on specific items, use a large lens opening. An auto-iris lens should be used in an area with fixed lighting. A shallow depth of focus allows you to focus on smaller details.
Which of the following describes the type of construction materials most commonly used to build a bank’s exterior walls? Dense woods fastened with metal bolts and plates Steel rods encased inside of concrete walls and support beams Untreated lumber Steel
Which of the following is a light-sensitive chip used in most of today’s CCTV cameras? Digital Light Processing Cathode ray tube Annunciator Charged-coupled devices
What of the following allows security personnel to change the field of view of a CCTV lens to different angles and distances? Depth of field Manual iris Zoom Illumination
Electrical power is being provided more through smart grids, which allow for self-healing, resistance to physical and cyberattacks, increased efficiency, and better integration of renewable energy sources. Countries want their grids to be more reliable, resilient, flexible, and efficient. Why does this type of evolution in power infrastructure concern many security professionals? Allows for direct attacks through Power over Ethernet Increased embedded software and computing capabilities Does not have proper protection against common web-based attacks Power fluctuation and outages directly affect computing systems
The following scenario is to be used for questions 30, 31, and 32. Greg is the security facility officer of a financial institution. His boss has told him that visitors need a secondary screening before they are allowed into sensitive areas within the building. Greg has also been told by the network administrators that after the new HVAC system was installed throughout the facility, they have noticed that power voltage to the systems in the data center sags.
Crime Prevention Through Environmental Design (CPTED) is a discipline that outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior. Of CPTED’s three main components, what is illustrated in the following photo? [*] Natural surveillance Target hardening Natural access control Territorial reinforcement
David is preparing a server room at a new branch office. What locking mechanisms should he use for the primary and secondary server room entry doors? The primary and secondary entrance doors should have access controlled through a swipe card or cipher lock. The primary entrance door should have no access controlled through a security guard. The secondary doors should be secured from the inside and allow no entry. The primary entrance door should have access controlled through a swipe card or cipher lock. The secondary doors should have a security guard. The primary entrance door should have access controlled through a swipe card or cipher lock. Secondary doors should be secured from the inside and allow no entry.
Paisley is helping her company identify potential site locations for a new facility. Which of the following is not an important factor when choosing a location? Distance to police and fire stations Lighting Natural disaster occurrence Crime rate
Robert has been given the responsibility of installing doors that provide different types of protection. He has been told to install doors that provide failsafe, fail-secure, and fail-soft protection. Which of the following statements is true about secure door types? Fail-soft defaults to the sensitivity of the area. Fail-safe defaults to locked. Fail-secure defaults to unlocked. Fail-secure defaults to double locked.
John is installing a sprinkler system that makes use of a thermal-fusible link for a data center located in Canada. Which of the following statements is true of the system he’s installing? The pipes of a dry pipe system are filled with water when pressurized air within the pipes is reduced. The pipes of a preaction system are filled with water when pressurized air within the pipes is reduced. The sprinkler heads of a deluge system are wide open to allow a larger volume of water to be released in a shorter period. The pipes in a wet pipe system always contain water.

相关试卷

  • CISSP认证考试模拟试卷4

  • CISSP认证考试模拟试卷3

  • CISSP认证考试模拟试卷2

  • CISSP认证考试模拟试卷1

  • CISSP认证考试(软件开发安全)模拟试卷1

  • CISSP认证考试(访问控制)模拟试卷1

  • CISSP认证考试(信息安全治理与风险管理)模拟试卷1

  • CISSP认证考试(通信安全与网络安全)模拟试卷1

  • CISSP认证考试(安全体系结构和设计)模拟试卷1

  • CISSP认证考试(密码学)模拟试卷1

  • CISSP认证考试(物理安全与环境安全)模拟试卷1

  • CISSP认证考试(法律、法规、调查与合规)模拟试卷1

  • CISSP认证考试(业务连续性和灾难恢复)模拟试卷1

  • CISSP认证考试(安全运营)模拟试卷1