Provides enhanced security by isolating your publicly accessible network from your privately accessible network.
What is a DMZ
The first line of defense in protecting computer systems is to control access to the location where the computers are located.
What is Door Locks
Regardless of the size of your organization, networking components should always be inside of a locked room that only specific individuals have access to.
What is Locked network closet
Refers to the systems that support the site. Infrastructure components include AC, power, heating, ventilation, air conditioning systems (HVAC), gas, and water.
Wood, paper, cloth, plastics
What is Class A
A security method that physically isolates a portion of the network (such as a computer, a server, or a small network of computers) from the internet or any other unsecured networks.
What is an Air Gap
Prevent the theft of computers or components.
What is a Hardware Locks
It is common now to find USB charging stations in public places, such as airports, hotels, and restaurants. It is possible that these could be used to copy data from a users device. Users can protect themselves by using USB data blockers.
What is Malicious universal serial bus (USB) cable
Is created by having the front of the equipment face toward the center of the aisle.
What is a cold aisle
Petroleum, oil, solvent, alcohol
What is Class B
Are designed to block all electromagnetic emissions.
What is a Faraday Cage
Can be used to secure a facility, room, or cabinet.
What are Access Cards
These _____ can be infected with malware which later can be used to disrupt the operation of a business.
What is Malicious flash drive
Have the back of the equipment face the aisle
What is hot aisle
Oil, solvents, electrical wires
What is Class K
Should be kept within a range of 40 to 65 percent.
What is humidity
Data is an important resource for any organization. All digital data and paper data should be protected. Any paperwork containing sensitive information should be securely destroyed.
What is Secure Data Destruction
Is the process of making copies of smart cards. Lost, misplaced, or stolen cards can be copied, if there is not cryptographic protection on them.
What is Card cloning
Interference is caused by noise between the hot wire and the ground or neutral wires in a circuit.
What is Electro-magnetic interference
Electrical equipment, circuits, wires
What is Class C
A sag or dip in power is a reduction in voltage for a short period of time (up to as long as a few seconds). Used to prevent them.
What is power conditions
Ensures that hardware does not leave the organization's premises without a manager's approval.
What is Checkout Policy
Is when there is a card reader placed in order to copy the credentials of a users smart card. Once the cards details are copied, it can be used to create counterfeit cards.
What is Skimming
This burst of energy is known as an
What is Electro-magnetic Pulse
Sodium, potassium
What is Class D