On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can “fix the restroom.”
What should you do?
What should you do?
Direct him to the front entrance and instruct him to check in with the receptionist.
Which of the following are solutions that address physical security?(Select two)
Require identification and name badges for all employees AND escort visitors at all times
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
Which of the following CCTV types would you use in areas with little or no lights?
Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two)
double-entry door AND turnstile
Which of the following controls is an example of a physical access control method?
locks on doors
which of the following is the most important thing to do to prevent console access to the router?
keep the router in a locked room
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
use cable locks to chin the laptops to the desks
you are an IT consultant and are visiting………..which security-related recommendations should you make to this client?
relocate the switch to the locked server closet AND control access to the work area with locking doors and card readers
A smart phone was lost at the airport. There is no way to recover the device. Which of the following will ensure data confidentiality on the device?
Which of the following are not reasons to remote wipe a mobile device?
when the device is inactive for a period of time
Which of the following mobile device security considerations will disable the ability to use the device after a short period of inactivity?
Your organization has recently purchased 20 tablet devices for the human resources
implement storage segmentation AND enable device encryption
over the last several years, the use of mobile devices within your organization has increased dramatically….
implement a mobile endpoint management (MEM) solution
configure and apply security policy settings in a mobile device management system AND enroll the devices in a mobile device management system
Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
you can’t use domain-based group policies to enforce security settings on mobile devices
Your organization’s security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
sign up for a windows intune account to manage the tablets
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloud-based Windows Intune account. Once of your sales reps left her tablet in an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
The presence of unapproved modems on desktop systems gives rise to the LAN being vulnerable to which of the following?
Which of the following phone attacks adds unauthorized charges to a telephone bill?
Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines?
A customer just received a phone bill on which there were charges for unauthorized services. This customer is a victim of which type of attack?