IT CertificationsAnswer Key

Osg Cissp

63 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

False Without control over the physical environment, no amount of administrative or technical/logical access controls can provide adequate security.

ANSWER

True or False: There can be security, even if there is no physical security.

QUESTION 2

True Malicious actors can perform just about any physical or logical damage or destruction.

ANSWER

True or False: If a malicious person can gain physical access to your facility or equipment, they can do just about anything they want, from destruction to disclosure and alteration.

QUESTION 3

1) Deterrence, 2) Denial, 3) Detection, 4) Delay It's important to remember this order when deploying physical security controls: first deterrence, then denial, then detection, then delay.

ANSWER

Functional order of controls.

QUESTION 4

Deterred

ANSWER

Security controls should be deployed so that initial attempts to access physical assets are [blank] (boundary restrictions accomplish this).

QUESTION 5

Denied

ANSWER

If deterrence fails, then direct access to physical assets should be [blank] (for example, locked vault doors).

QUESTION 6

Detect / Delayed

ANSWER

If denial fails, your system needs to [blank] intrusion (for example, using motion sensors), and the intruder should be [blank] sufficiently in their access attempts to enable authorities to respond (for example, a cable lock on the asset).

QUESTION 7

The key elements in making a site selection

ANSWER

Visibility, composition of the surrounding area, area accessibility, and the effects of natural disasters.

QUESTION 8

A key element in designing a facility for construction

ANSWER

Understanding the level of security needed by your organization and planning for it before construction begins.

QUESTION 9

False There should NOT be equal access to all locations within a facility.

ANSWER

True or False: There should be equal access to all locations within a facility.

QUESTION 10

Restricted access

ANSWER

Areas that contain assets of higher value or importance should have what?

QUESTION 11

In the heart or center of protection provided by a facility

ANSWER

Valuable and confidential assets should be located where?

QUESTION 12

False In fact, the more human incompatible a server room is, the more protection it will offer against casual and determined attacks.

ANSWER

True or False: Centralized server or computer rooms need to be human compatible.

QUESTION 13

Wiring closet

ANSWER

Where the networking cables for a whole building or just a floor are connected to other essential equipment, such as patch panels, switches, routers, LAN extenders, and backbone channels.

QUESTION 14

Physical unauthorized access If an unauthorized intruder gains access to the wiring closet, they may be able to steal equipment, pull or cut cables, or even plant a listening device.

ANSWER

Most of the security for a wiring closet focuses on preventing what?

QUESTION 15

A mechanism to handle visitors Often an escort is assigned to visitors, and their access and activities are monitored closely.

ANSWER

If a facility employs restricted areas to control physical security, then what's required?

QUESTION 16

True The untracked action of outsiders can lead to disaster

ANSWER

True or False: Failing to track the actions of outsiders when they are granted access to a protected area can result in malicious activity against the most protected assets.

QUESTION 17

Administrative, technical, and physical. Understand when and how to use each, and be able to list examples of each kind.

ANSWER

The security controls implemented to manage physical security can be divided into what three groups?

QUESTION 18

Examples of ADMINISTRATIVE PHYSICAL security controls

ANSWER

Facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures.

QUESTION 19

Examples of TECHNICAL PHYSICAL security controls

ANSWER

Access controls; intrusion detection; alarms; closed-circuit television (CCTV); monitoring; heating, ventilation, and air conditioning (HVAC) power supplies; and fire detection and suppression.

QUESTION 20

Physical security controls

ANSWER

Fencing, lighting, locks, construction materials, mantraps, dogs, and guards.

QUESTION 21

True The concerns include theft, corruption, and data remnant recovery.

ANSWER

True or False: Media storage facilities should be designed to securely store blank media, reusable media, and installation media.

QUESTION 22

Media storage facility protections

ANSWER

Locked cabinets or safes, using a librarian/custodian, implementing a check-in/check-out process, and using media sanitization.

QUESTION 23

Evidence storage

ANSWER

What's used to retain logs, drive images, virtual machine snapshots, and other datasets for recovery, internal investigations, and forensic investigations?

QUESTION 24

Protections of evidence storage

ANSWER

Dedicated/isolated storage facilities, offline storage, activity tracking, hash management, access restrictions, and encryption.

QUESTION 25

A security guard or other monitoring system

ANSWER

No matter what, what form of physical access control must be deployed to prevent abuse, masquerading, and piggybacking?

QUESTION 26

Abuses of physical access control

ANSWER

Propping open secured doors and bypassing locks or access controls.

QUESTION 27

Masquerading

ANSWER

Using someone else's security ID to gain entry to a facility.

QUESTION 28

Piggybacking

ANSWER

Following someone through a secured gate or doorway without being identified or authorized personally.

QUESTION 29

Audit trails and access logs

ANSWER

Useful records as tools for physical access control.

QUESTION 30

Manually by security guards.

ANSWER

How may audit trails and access logs need to be created?

QUESTION 31

Automatically, if sufficiently automated access control mechanisms are in place (in other words, smartcards and certain proximity readers).

ANSWER

If not created manually by security guards, how else may audit trails and access logs be generated?

QUESTION 32

CCTV Through CCTV, you can compare the audit trails and access logs with a visually recorded history of the events. Such information is critical to reconstructing the events of an intrusion, breach, or attack.

ANSWER

You should also consider monitoring entry points with what?

QUESTION 33

False Most electronic equipment demands clean power in order to function properly.

ANSWER

True or False: Power supplied by electric companies is always consistent and clean.

QUESTION 34

True Many organizations opt to manage their own power through several means.

ANSWER

True or False: Equipment damage because of power fluctuations is a common occurrence.

QUESTION 35

Uninterruptible Power Supply (UPS)

ANSWER

This is a type of self-charging battery that can be used to supply consistent clean power to sensitive equipment.

QUESTION 36

False UPSs also provide continuous power even after the primary power source fails.

ANSWER

True or False: UPSs cannot provide continuous power even after the primary power source fails.

QUESTION 37

False A UPS can continue to supply power for MINUTES or HOURS depending on its capacity and the draw by equipment.

ANSWER

True or False: A UPS can continue to supply power for days or weeks depending on its capacity and the draw by equipment.

QUESTION 38

Fault

ANSWER

A momentary loss of power

QUESTION 39

Blackout

ANSWER

A complete loss of power

QUESTION 40

Sag

ANSWER

Momentary low voltage

QUESTION 41

Brownout

ANSWER

Prolonged low voltage

QUESTION 42

Spike

ANSWER

Momentary high voltage

QUESTION 43

Surge

ANSWER

Prolonged high voltage

QUESTION 44

Inrush

ANSWER

An initial surge of power usually associated with connecting to a power source, whether primary or alternate/secondary

QUESTION 45

Noise

ANSWER

A steady interfering power disturbance or fluctuation

QUESTION 46

Transient

ANSWER

A short duration of line noise disturbance

QUESTION 47

Clean

ANSWER

Nonfluctuating pure power

QUESTION 48

Ground

ANSWER

The wire in an electrical circuit that is grounded

QUESTION 49

Control over the HVAC mechanisms

ANSWER

In addition to power considerations, maintaining the environment involves what?

QUESTION 50

60 to 75 degrees Fahrenheit (15 to 23 degrees Celsius)

ANSWER

Rooms containing primarily computers should be kept between what temperatures?

QUESTION 51

40% and 60%

ANSWER

Between what percentages of humidity should a computer room be maintained?

QUESTION 52

Corrosion / Static electricity.

ANSWER

Too much humidity can cause this, and too little humidity can cause that.

QUESTION 53

True Even minimal levels of static discharge can destroy electronic equipment.

ANSWER

True or False: Even on nonstatic carpeting, if the environment has low humidity it is still possible to generate 20,000-volt static discharges.

QUESTION 54

False Environmental safety policy and procedures should address water leakage and flooding.

ANSWER

True or False: Water leakage and flooding should not be addressed in your environmental safety policy and procedures.

QUESTION 55

True Plumbing leaks are not an everyday occurrence, but when they occur, they often cause significant damage. Water and electricity don't mix. If your computer systems come in contact with water, especially while they are operating, damage is sure to occur.

ANSWER

True or False: Whenever possible, locate server rooms and critical computer equipment away from any water source or transport pipes.

QUESTION 56

True Keep in mind of fire detection and suppression for your facilities storing and protecting IT.

ANSWER

True or False: Fire detection and suppression must not be overlooked.

QUESTION 57

Protecting personnel from harm Preventing harm to people is the most important goal for all security solutions.

ANSWER

In all circumstances and under all conditions, what should always be the most important goal/aspect of any security or protection system?

QUESTION 58

Yes Fire detection and suppression is designed to keep damage caused by fire, smoke, heat, and suppression materials to a minimum.

ANSWER

Yes or No: In addition to protecting people, is fire detection and suppression designed to keep damage caused by fire, smoke, heat, and suppression materials to a minimum, especially in regard to the IT infrastructure?

QUESTION 59

No The destructive elements of a fire include smoke and heat but ALSO the suppression medium, such as water or soda acid.

ANSWER

Yes or No: The destructive elements of a fire include smoke and heat but not the suppression medium, such as water or soda acid.

QUESTION 60

Yes Smoke is damaging to most storage devices.

ANSWER

Yes or No: Smoke is damaging to most storage devices.

QUESTION 61

False Heat CAN damage any electronic or computer component.

ANSWER

True or False: Heat cannot damage any electronic or computer component.

QUESTION 62

True Suppression systems can help but also cause problems, or damage/destroy equipment.

ANSWER

True or False: Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless.

QUESTION 63

False ALL issues caused by a fire and suppression must be addressed when designing a fire response system.

ANSWER

True or False: Not all issues caused by a fire and suppression issues must be addressed when designing a fire response system

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials