Page 681 - StudyBook.pdf
P. 681

Operational and Organizational Security: Incident Response • Chapter 11  665

                      C. Decentralize servers and other vital components, and add security mea-
                         sures to areas where the servers and other components are located.

                      D. Centralize servers and other vital components in a single room of the
                         main building. Because the building prevents unauthorized access to visi-
                         tors and other persons, there is no need to implement physical security in
                         the server room.

                  3. You are evaluating the physical security of a server room to determine if it is
                      sufficient to stop intruders from entering the room.The room is 20 feet long
                      with concrete walls that extend up to a false ceiling and down below the
                      raised floor that contains network cabling.An air vent with a bolted grate is
                      located at the top of one of these walls.There are no windows, and a keypad
                      on the door that requires a four-digit code to unlock the door.Which of the
                      following changes would you do to make this room secure?
                      A. Seal the air vent to prevent people from crawling into the room through
                         the vent.

                      B. Seal the area above the false ceiling to prevent people from crawling
                         through the plenum.

                      C. Seal the area below the raised floor to prevent people from crawling
                         through this area.
                      D. Replace the locking mechanism on the door.

                  4. A company is using Apple computers for employees to work on, with UNIX
                      servers to provide services and store network data.The servers are located in a
                      secure server room, utilize password protection through a screensaver, and use
                      disk encryption.Workstations are located throughout the facilities, with front
                      desk computers in a reception area that is accessible to the public.The work-
                      stations in the reception area have cables with locking mechanisms to prevent
                      people from carrying them away, and don’t have access to the Internet as man-
                      agement feels the receptionist doesn’t require it.All workstations are con-
                      nected to the network, and automatically receive software updates from
                      network servers.Which of the following needs to be done to improve security
                      without affecting the productivity of the receptionist?










                                                                              www.syngress.com
   676   677   678   679   680   681   682   683   684   685   686