92. What instrument measures atmospheric humidity in a computer room?
a. Hygrometer
b. Hydrometer
c. Barometer
d. Voltmeter
92. a. A hygrometer is an instrument that measures atmospheric humidity. A hydrometer is an instrument used to determine the specific gravity that sinks in a fluid to a depth used as a measure of the fluid’s specific gravity. A barometer is an instrument for measuring atmospheric pressure, used in weather forecasting and in determining elevation. A voltmeter is an instrument for measuring electrical voltage.
93. Which of the following is not appropriate to provide adequate complementary physical access controls?
a. ID badge card
b. Password
c. Magnetic stripe card
d. Visitor log
93. b. Passwords provide logical access controls, not physical access controls. The other three choices are examples of complementary physical access controls. Each control enhances the other. A function or an area doesn’t need to be weak to use complementary controls. Complementary controls can magnify the effectiveness of two or more controls when applied to a function, program, or operation. Identification (ID) badge cards, magnetic stripe cards, and visitor logs have a synergistic effect in providing a strong physical access control.
94. Which of the following is not appropriate to ensure continuity of electric power supply?
a. Disk mirroring
b. Power line conditioners
c. Uninterruptible power supply equipment
d. Backup generators
94. a. Disk mirroring is not appropriate to ensure the continuity of the electric power supply because it prevents data loss. It is a fault-tolerant mechanism because it copies and stores data in two places (disks). The other three choices are incorrect because they are needed to provide continuity of the electric power supply. Power line conditioners smooth out power fluctuations. Uninterruptible power supply (UPS) equipment provides relief from short power outages. Backup generators support relief from long power outages.
95. Which of the following is not a benefit of automated environmental controls over manual monitoring?
a. System probes to perform diagnosis and analysis
b. Orderly shutdown of the host system
c. Slow recovery
d. Problem recording and notification
95. c. The automation of monitoring and controlling the environmental system can help minimize the damage and speed up the recovery process. The major objective is to reduce the effect of a disaster resulting from malfunctioning of the environmental control system. Manual monitoring can be time consuming, error prone, and unreliable because it requires constant attention.
96. Which of the following controls is not appropriate to prevent unauthorized people from entering a computer center?
a. Double-locked doors
b. CCTV monitors
c. Terminal IDs
d. Picture ID badges
96. c. Logical access controls verify the terminal identification (ID) number and are not a part of physical security. Logical access controls provide a technical means of controlling what information users can utilize, the programs they can run, and the modifications they can make. The other three choices deal with physical security, which is the right kind of control to prevent unauthorized people from entering a computer center.
97. Which one of the following statements is not true regarding a water-based fire extinguishing system?
a. Water cools the equipment relatively quickly.
b. The release of water can be localized to where it is needed.
c. Water and Halon gas systems are mutually exclusive.
d. Jet sprayers can be an alternative to water sprinklers.
97. c. Water and Halon gas should be used with heat and smoke detectors and mechanisms for automatically shutting off electrical power and air conditioning devices. (That is, they are not used in a water-based fire extinguishing system.) It is true that water cools the equipment relatively quickly. It is true that the release of water can be localized to where it is needed. It is true that jet sprayers can be an alternative to water sprinklers. Jet sprayers located on the ceiling spray a fine water mist that turns to steam on contact with the fire, smothering it.
98. Controls such as locked doors, intrusion detection devices, and security guards address which of the following risks?
a. Heat failure
b. Fraud or theft
c. Power failure
d. Equipment failure
98. b. Locked doors, intrusion detection devices, and security guards that restrict physical access are important preventive measures to control sabotage, riots, fraud, or theft. Sabotage can be caused by a disgruntled employee as well as by outsiders. Personnel policies should require the immediate termination and removal from the premise of any employee considered a threat. Restricting access to information that may be altered reduces fraud or theft exposures.
Heat failure may cause an inconvenience to employees. Power failure can be controlled by uninterruptible power supply. Equipment failure may result in extended processing delays. Performance of preventive maintenance enhances system reliability and should be extended to all supporting equipment, such as temperature and humidity control systems and alarm or detecting devices.
99. Which of the following security controls is the simplest safeguard with the least amount of delay?
a. Operating system security controls
b. Network security controls
c. Physical security controls
d. Application system security controls
99. c. Physical security is achieved through the use of locks, guards, and administratively controlled procedures such as visitor badges. It also protects the structures housing the computer and related equipment against damage from accident, fire, and environmental hazards, thus ensuring the protection of their contents. Physical security measures are the first line of defense against the risks that stem from the uncertainties in the environment as well as from the unpredictability of human behavior. Frequently, they are the simplest safeguards to implement and can be put into practice with the least delay. The controls listed in the other three choices take a long time to implement and are not simple to install.
100. Which of the following is not a technical security measure?
a. Hardware
b. Software