Question: Please answer all 5 exercises. If you do not know the topic and the answer please don't attempt. I will give thumbs up for an
Please answer all 5 exercises. If you do not know the topic and the answer please don't attempt. I will give thumbs up for an explanation and correct answers. Thumbs down if the requirements are not met. Thank you!
- Which two physical security tools can prevent tailgating and piggybacking?
Choose 2 answers
Fences
Turnstiles
Mantraps
Badges
- Which control method is used for physical security?
Floodlights
DNA scan
Smart cards
Firewalls
- A datacenter manager forgets to purchase annual maintenance for a database application, so the application vendor has not patched the application. Users are now complaining that the application is slow and sometimes they are unable to log in.
Which security principle has been affected by this scenario?
Accountability
Integrity
Confidentiality
Availability
- A companys heating and air conditioning systems are controlled by a supervisory control and data acquisition SCADA network that has not been updated in years because the hardware is 15 years old. A hacker takes advantage of the vulnerability in the networks firewall, which is the network only form of protection. The hacker accesses one of the air condition sensors and changes the settings. Causing the temperature in one part of the building to rise above 80 degrees. Which security principle should the company implement to thwart this type of attack in the future?
Security though obscurity
Least privilege
Separation of duties
Defense in depth
- A network administrator supervisor requests that the administrator allow the CEO direct access to the network from a personal cellular device without using standard encryption, VPN network settings or system validations procedures. The network administrator first protests but then complies since the supervisor takes full responsibility.
Which security principle is being violated?
Security trough obscurity is not an answer, even though people think it is
The tree security goals are confidentiality, availability, and integrity
Complexity is the enemy of security and security systems
There is no such thing as absolute security
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
