Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
Welcome back to us, it security course.
00:04
And in this video we're going to do a short learn check of what you have learned so far regarding physic physical assets,
00:13
security or how to protect them.
00:16
So
00:17
let's go to the first question,
00:20
which is Who is in charge of leased car security. So if you have leaves, the car, who is in charge of
00:27
making it safe
00:30
is just the leasing company. Is it somebody in your company you are that is involved in physical security? Or is it pleasing company in a driver?
00:42
And the correct answer is leasing company in a driver. So if you leave your keys in the car and park it, then it is something that you are.
00:54
If something happens to the car, it's your fault. So
00:58
always driver is involved in police car security.
01:03
Second question. What is downside off? Using the white striking softer
01:07
and the possible losses are it works only if you log into the wife's with passwords.
01:14
It can be easily disabled,
01:15
like with wiping the hard drive before it in the hard drive or disabling the network,
01:22
or the third possible answer is it needs expensive weapon to track it.
01:30
The correct answer is, of course, it can be easily disabled
01:34
in the final question in this learning check,
01:38
What is the largest physical security issue with holy printers?
01:44
Is it physical damage?
01:46
Is it being stolen by fake repairman
01:49
or is it armed robbery?
01:56
And the correct answer is being stole by fake repairman. So we often have a situation in which somebody presenting like a Reaper person or service guy comes in and says, OK, sorry, I have to take this service
02:10
Science necessary paperwork if if it is supposed to be done, But it doesn't matter, the machine is gone out of the door.

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor