Resilience & Physical Security

Estimated time: 5-10 minutes

Question 1 of 10

During an annual compliance audit, a security manager discovers several laptops that were purchased last year but never documented, making them untraceable. Which foundational security process was inadequately implemented?

Question 2 of 10

A company performs full backups every Sunday night. On Wednesday, the administrator needs to perform a backup that captures all data changed since the last full backup, rather than just changes since Tuesday night's backup, to balance storage space with faster restoration time if needed later in the week. Which backup type meets this requirement?

Question 3 of 10

A financial trading firm requires a disaster recovery solution that provides an exact live mirror of their primary data center, allowing for immediate automatic failover with zero data loss and minimal downtime, regardless of the higher operational costs. Which type of site redundancy should they implement?

Question 4 of 10

A database administrator configures a cluster where all nodes simultaneously process user requests and share the workload, providing fault tolerance without having idle standby capacity waiting for a failure to occur. Which clustering configuration is this?

Question 5 of 10

During a brief utility power outage, a data center needs temporary battery power to allow servers to execute a graceful shutdown and prevent data corruption, but does not need to maintain operations for an extended period. Which power infrastructure component serves this specific function?

Question 6 of 10

A corporate headquarters located on a busy urban street is concerned about the risk of vehicle-ramming attacks targeting the main entrance and the data center's loading dock. Which physical security control is best to implement?

Question 7 of 10

A security team places a decoy file named "Executive_Salaries_2026.xlsx" on a file server containing fake data, and creates embedded alerts to detect if an unauthorized user is browsing through sensitive directories. Which technology is being used?

Question 8 of 10

An organization is decommissioning legacy magnetic tape backups and traditional hard drives. To render the data unrecoverable while recycling the physical media rather than shredding it, they expose the devices to a powerful magnetic field that disrupts the magnetic domains. Which data disposal method is described?

Question 9 of 10

A high-security facility installs an entrance system consisting of two interlocking doors with an enclosed space between them; the second door cannot open until the first door closes and the person is authenticated, preventing an unauthorized person from following an authorized employee inside. Which physical access control is this?

Question 10 of 10

An organization contracts a security firm to evaluate their application security posture. The testing team is provided with complete application source code, internal network architecture diagrams, and administrative-level credentials to thoroughly examine specific security controls and logic flaws without expending effort on initial reconnaissance or access acquisition. Which penetration testing methodology is being described?