image


DU0-001 Dumps DU0-001 Braindumps

DU0-001 Real Questions DU0-001 Practice Test DU0-001 Actual Questions


APC


DU0-001


Data Center University Associate Certification


https://killexams.com/pass4sure/exam-detail/DU0-001


E. Personal identification number


Answer: B,C,D


QUESTION: 315

What is the primary purpose of data center physical security?


  1. To monitor activities of data center employees

  2. To set up proper firewalls and avoid hacking of computers

  3. To keep unauthorized people out of places they do not belong

  4. To research the background of individuals who visit the data center


Answer: C


QUESTION: 316

What is the primary reason that physical security reduces data center downtime?


  1. Physical security systems can provide an early warning that systems are about to go down.

  2. Physical security reduces the presence of individuals in the data center, thereby reducing human error.

  3. Physical security determines which individuals are competent to work in the data center.

  4. By maintaining a record of who enters and leaves the data center, physical security can provide root cause analysis data when an error occurs.


Answer: B


QUESTION: 317

In a conceptual discussion on security, which example illustrates the concept of "depth of security"?


  1. The data center is built below ground level in order to further limit access.

  2. An amount of the annual budget is earmarked to be spent on security solutions.

  3. A variety of physical security technologies is deployed within the physical


    space of the data center.

  4. The inner area is protected both by its own security access methods and by the security levels of the areas that enclose it.


Answer: D


QUESTION: 318

What are two primary questions that any good physical security system should consider regarding any visitor to the data center?


  1. "Who are you?" and "Why are you here?"

  2. "Who are you?" and "Where are you going?"

  3. "Why are you here?" and "Where did you come from?"

  4. "Where did you come from?" and "Where are you going?"


Answer: A


QUESTION: 319

What are the three basic physical security categories that describe technologies for personnel identification? (Choose three.)


  1. Who you are

  2. Where you are

  3. What you have

  4. Who you know

  5. What you know


Answer: A,C,E


QUESTION: 320

What is the major weakness of a bar code card system?


  1. The cards are expensive.

  2. The cards interfere with RFID systems.

  3. It is relatively easy to duplicate the cards.

  4. Running a magnet next to a card reader will disrupt the accuracy of the reader.


Answer: C


QUESTION: 321

What is the primary security disadvantage of a bar code card?


  1. High cost

  2. Easily damaged

  3. Easy to counterfeit

  4. Does not have a picture


Answer: C


QUESTION: 322

What is the primary feature of a smart card?


  1. A picture

  2. A bar code

  3. A silicon chip

  4. An expiration date


Answer: C


QUESTION: 323

Which two criteria make bar code cards a good choice? (Choose two.)


  1. Low budget

  2. Low security requirement

  3. High security requirement

  4. Frequently changing access privileges


Answer: A,B


QUESTION: 324

Which access method is used for channeling high traffic through a security checkpoint?


  1. Coded lock

  2. Ordinary key

  3. Fingerprint reader

  4. Contactless smart card


Answer: D


QUESTION: 325

Which physical security method is most secure?


  1. Coded lock

  2. Ordinary key

  3. Fingerprint reader

  4. Contactless smart card


Answer: C


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG