Physical security methods for workstations

Physical security methods for workstations
Physical security methods for workstations

Physical security methods for workstations, servers, and network devices

Chapter7
1. Explain physical security methods for workstations, servers, and network devices
2. Implement a network topology for security
3. Explain network communications media in relation to security
4. Discuss how to train workstation users about physical security as shown on page 315 of the text.
5. Discuss the various configurations of wiring closets listed on page 321 of the text.
6. Discuss with students the structured wiring requirements listed on page 333 of the text.
7. Discuss the vertical wiring principles when planning your network as illustrated on page 335 of the text.
8. Discuss what it takes to implement a stable network topology.
9. Discuss the many reasons organizations use centralized or decentralized management.
Case Project 7-2: Expanding Workstation Security
Balsam Music is impressed by the document you created in Case Project 7-1 and they want to continue to explore ways to make user workstations more secure. The Security Steering Committee asks you to create a report that describes ways to secure workstations that go beyond configuring screen savers.
Answers to the Chapter 7 Review Questions

1. You are operating a network management station and discover that you cannot find out information about network performance at a NetWare 6.0 server. Which of the following is the best solution?
Answer:

2. The fire marshal in your city has just inspected the wiring that goes through the ceiling on the second floor of your building and says it is dangerous because the network wiring can cause toxic vapors in a fire. What is the wiring most likely to contain?
Answer:

3. You are designing the network in a building and want to use a cable that will provide speed and security for communications between floors in the building. Which of the following would be the best choice?
Answer

4. Which if the following is important when you centralize servers in a computer room? (Choose all that apply.)
Answer:

5. Which type of cable is most difficult for an intruder to tap into without causing attention to his action?
Answer:

6. In terms of security, a disadvantage of the star topology is that __________________________.
Answer:

7. You are consulting about an older thin coax network when the network goes down because of the work of an attacker. Which of the following is a likely cause of the problem?
Answer:

8. The twists in twisted-pair cable are there to __________________________________. (Choose all that apply.)
Answer:

9. On your NetWare server, someone occasionally loads NLMs that you have not authorized. The financial auditors are very concerned about this problem. Which of the following offer(s) a solution?
Answer:

10. Which of the following fit(s) the definition of a cipher lock that might be used to protect a machine room? (Choose all that apply.)
Answer:

11. In the design of a network you should plan to use which of the following? (Choose all that apply.)
Answer:

12. A department head calls you because she is working on personnel evaluations and she does not want to log off Red Hat Linux 9.x for security each time she leaves her desk for a few moments. What do you recommend?
Answer:

13. Wiring closets should follow the ___________________________ standard.
Answer:

14. When you replace a legacy cable plant, which of the following should you consider? (Choose all that apply.)
Answer:

15. Which cable is most flexible and has the tightest bending radius (providing some protection from a malicious attack)?
Answer:

16. Which parameter used with SCRSAVER in NetWare enables you to display the screen saver’s current settings?
Answer:

17. An intermediate cross-connect is ______________________________.
Answer:

18. SNMP is used with which of the following? (Choose all that apply.)
Answer: a. and d.

19. Your department is almost out of money that is budgeted for this year, and so you are installing twisted-pair cable yourself to connect several new computers to the network. Which of the following is important for you to consider? (Choose all that apply.)
Answer:

20. When you install SNMP, configure a _______________________ at the same time.
Answer:

Any assignment received after the time of the class is considered late (NO EXCUSES) and is graded with 0% off for each class it is late.

We can write this or a similar paper for you! Simply fill the order form!

Unlike most other websites we deliver what we promise;

  • Our Support Staff are online 24/7
  • Our Writers are available 24/7
  • Most Urgent order is delivered with 6 Hrs
  • 100% Original Assignment Plagiarism report can be sent to you upon request.

GET 15 % DISCOUNT TODAY use the discount code PAPER15 at the order form.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: