APC du0-001 practice test

Data Center University Associate Exam


Question 1

Which physical security method is most secure?

  • A. Coded lock
  • B. Ordinary key
  • C. Fingerprint reader
  • D. Contactless smart card
Answer:

C

Discussions

Question 2

Which access method is used for channeling high traffic through a security
checkpoint?

  • A. Coded lock
  • B. Ordinary key
  • C. Fingerprint reader
  • D. Contactless smart card
Answer:

D

Discussions

Question 3

Which two criteria make bar code cards a good choice? (Choose two.)

  • A. Low budget
  • B. Low security requirement
  • C. High security requirement
  • D. Frequently changing access privileges
Answer:

A,B

Discussions

Question 4

What is the primary feature of a smart card?

  • A. A picture
  • B. A bar code
  • C. A silicon chip
  • D. An expiration date
Answer:

C

Discussions

Question 5

What is the primary security disadvantage of a bar code card?

  • A. High cost
  • B. Easily damaged
  • C. Easy to counterfeit
  • D. Does not have a picture
Answer:

C

Discussions

Question 6

What is the major weakness of a bar code card system?

  • A. The cards are expensive.
  • B. The cards interfere with RFID systems.
  • C. It is relatively easy to duplicate the cards.
  • D. Running a magnet next to a card reader will disrupt the accuracy of the reader.
Answer:

C

Discussions

Question 7

What are the three basic physical security categories that describe
technologies for personnel identification? (Choose three.)

  • A. Who you are
  • B. Where you are
  • C. What you have
  • D. Who you know
  • E. What you know
Answer:

A,C,E

Discussions

Question 8

What are two primary questions that any good physical security system
should consider regarding any visitor to the data center?

  • A. "Who are you?" and "Why are you here?"
  • B. "Who are you?" and "Where are you going?"
  • C. "Why are you here?" and "Where did you come from?"
  • D. "Where did you come from?" and "Where are you going?"
Answer:

A

Discussions

Question 9

In a conceptual discussion on security, which example illustrates the concept
of "depth of security"?

  • A. The data center is built below ground level in order to further limit access.
  • B. An amount of the annual budget is earmarked to be spent on security solutions.
  • C. A variety of physical security technologies is deployed within the physical space of the data center.
  • D. The inner area is protected both by its own security access methods and by the security levels of the areas that enclose it.
Answer:

D

Discussions

Question 10

What is the primary reason that physical security reduces data center
downtime?

  • A. Physical security systems can provide an early warning that systems are about to go down.
  • B. Physical security reduces the presence of individuals in the data center, thereby reducing human error.
  • C. Physical security determines which individuals are competent to work in the data center.
  • D. By maintaining a record of who enters and leaves the data center, physical security can provide root cause analysis data when an error occurs.
Answer:

B

Discussions
To page 2