Device and Network Protection
Hardware Security
Physical Network Protection & Attacks
Environmental Controls
Fire Extinguishers
100

Provides enhanced security by isolating your publicly accessible network from your privately accessible network.

What is a DMZ

100

The first line of defense in protecting computer systems is to control access to the location where the computers are located.

What is Door Locks

100

Regardless of the size of your organization, networking components should always be inside of a locked room that only specific individuals have access to.

What is Locked network closet

100

Refers to the systems that support the site. Infrastructure components include AC, power, heating, ventilation, air conditioning systems (HVAC), gas, and water.

What is Infrastructure
100

Wood, paper, cloth, plastics

What is Class A

200

A security method that physically isolates a portion of the network (such as a computer, a server, or a small network of computers) from the internet or any other unsecured networks.

What is an Air Gap

200

Prevent the theft of computers or components.

What is a Hardware Locks

200

It is common now to find USB charging stations in public places, such as airports, hotels, and restaurants. It is possible that these could be used to copy data from a users device. Users can protect themselves by using USB data blockers.

What is Malicious universal serial bus (USB) cable

200

Is created by having the front of the equipment face toward the center of the aisle.

What is a cold aisle

200

Petroleum, oil, solvent, alcohol

What is Class B

300

Are designed to block all electromagnetic emissions.

What is a Faraday Cage

300

Can be used to secure a facility, room, or cabinet.

What are Access Cards

300

These _____ can be infected with malware which later can be used to disrupt the operation of a business.

What is Malicious flash drive

300

Have the back of the equipment face the aisle

What is hot aisle

300

Oil, solvents, electrical wires

What is Class K

400

Should be kept within a range of 40 to 65 percent.

What is humidity

400

Data is an important resource for any organization. All digital data and paper data should be protected. Any paperwork containing sensitive information should be securely destroyed.

What is Secure Data Destruction

400

Is the process of making copies of smart cards. Lost, misplaced, or stolen cards can be copied, if there is not cryptographic protection on them.

What is Card cloning

400

Interference is caused by noise between the hot wire and the ground or neutral wires in a circuit.

What is Electro-magnetic interference

400

Electrical equipment, circuits, wires

What is Class C

500

A sag or dip in power is a reduction in voltage for a short period of time (up to as long as a few seconds). Used to prevent them.

What is power conditions

500

Ensures that hardware does not leave the organization's premises without a manager's approval.

What is Checkout Policy

500

Is when there is a card reader placed in order to copy the credentials of a users smart card. Once the cards details are copied, it can be used to create counterfeit cards.

What is Skimming

500

This burst of energy is known as an

What is Electro-magnetic Pulse

500

Sodium, potassium

What is Class D