Certified Data Centre Specialist
CDCS-001 Exam

Which one of the following is a Physical Security Identification Method?

  1. Voice
  2. Expression
  3. Sound
  4. Batch ID

Answer(s): A

Explanation:

Voice identification is a physical security identification method that uses the sound of an individual's voice to identify them. This method is often used in combination with other identification methods, such as biometric scans, to provide a more secure form of authentication. Voice identification is used in a variety of situations, such as when accessing a secure facility or when making financial transactions.



True or False: Human error is a major cause of data center downtime

  1. True
  2. False

Answer(s): A

Explanation:

Human error is a major cause of data center downtime. Human mistakes are one of the top causes of data center outages, accounting for around one-third of all downtime incidents. Common causes of human error in data centers include misconfiguration, inadequate maintenance, and improper security practices. To reduce the risk of human error, it is important to ensure that data center staff receive proper training, have adequate access control measures in place, and are familiar with best practices for data center operations.



Which one of the following is a Physical Security Device?

  1. Access Key
  2. Contactless smart card
  3. Token card
  4. Fiber optic cable

Answer(s): B

Explanation:

A contactless smart card is a physical security device that uses radio frequency identification (RFID) technology to identify and authenticate an individual. This type of card is used in a variety of applications, such as access control systems and digital payment systems. It is also used in physical access control systems, where the card is used to unlock doors or grant access to restricted areas. Contactless smart cards are also used in building access systems, where the card is used to grant access to certain areas of the building.



Which one of the following uses sensors such as laser beams or touch sensor?

  1. CCTV
  2. Server
  3. Alarms
  4. Backup device

Answer(s): C

Explanation:

Alarms are physical security devices that use sensors such as laser beams or touch sensors to detect movement or intrusion. These devices are used to alert the user of any unauthorized activity in the area. Alarms can also be used in combination with CCTV cameras to provide a comprehensive security system.




Mike M
The exams was excellent and helped me pass without any doubt.Very helpful! Thank you! I passed!
- UNITED ARAB EMIRATES
Upvote


Smart one
You guys rock. I just passed my 920-139 exam with 929 marks. Thanks for accurate & descriptive question bank.
- UK
Upvote


C J
Just to let you know, I passed my exam. Thank you,
- Mexico
Upvote


Mr. P
I just have to say a big thank you to you guys... i passed 70-552 exams with 896. You guys are the bomb! Keep the faith and the flag of being good. A big thank you once again.(10Q ALL).
- GERMANY
Upvote


Darwin
I passed the Novell 640-822 exam on this last Thursday after using your online test and IPad. This is my first experience with your exams. I'll be using your material from now on. In a few days I'll purchase my last study material for the C
- France
Upvote


Bila
Thanks! I passed 070-284 with 880 070-219 next to complete my MCSE.
- Colorado
Upvote


Passed
I just took my Certification testing for 10-184 Microsoft CRM Installation and Configuration. Your test questions definitely covered the essence of the exam material and I easily passed the exam.
- UNITED STATES
Upvote


Ed
I passed the IBM exam successfully
- UNITED STATES
Upvote


Tina
Last week I took the Citrix exam and I passed with a very high mark, more than what I expected. Thanks!!
- Israel
Upvote


Calvin B.
I just took my Certification testing for 10-184 Microsoft CRM Installation and Configuration. Your test questions definitely covered the essence of the exam material and I easily passed the exam.
- Lafayette
Upvote

Read more ...