Question: Please answer all 5 exercises. If you do not know the topic and the answer please don't attempt. I will give thumbs up for an

Please answer all 5 exercises. If you do not know the topic and the answer please don't attempt. I will give thumbs up for an explanation and correct answers. Thumbs down if the requirements are not met. Thank you!

  1. Which two physical security tools can prevent tailgating and piggybacking?

Choose 2 answers

Fences

Turnstiles

Mantraps

Badges

  1. Which control method is used for physical security?

Floodlights

DNA scan

Smart cards

Firewalls

  1. A datacenter manager forgets to purchase annual maintenance for a database application, so the application vendor has not patched the application. Users are now complaining that the application is slow and sometimes they are unable to log in.

Which security principle has been affected by this scenario?

Accountability

Integrity

Confidentiality

Availability

  1. A companys heating and air conditioning systems are controlled by a supervisory control and data acquisition SCADA network that has not been updated in years because the hardware is 15 years old. A hacker takes advantage of the vulnerability in the networks firewall, which is the network only form of protection. The hacker accesses one of the air condition sensors and changes the settings. Causing the temperature in one part of the building to rise above 80 degrees. Which security principle should the company implement to thwart this type of attack in the future?

Security though obscurity

Least privilege

Separation of duties

Defense in depth

  1. A network administrator supervisor requests that the administrator allow the CEO direct access to the network from a personal cellular device without using standard encryption, VPN network settings or system validations procedures. The network administrator first protests but then complies since the supervisor takes full responsibility.

Which security principle is being violated?

Security trough obscurity is not an answer, even though people think it is

The tree security goals are confidentiality, availability, and integrity

Complexity is the enemy of security and security systems

There is no such thing as absolute security

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!