CompTIA Security+ (SY0-701) E4 Physical Security E
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of bollards in physical security?

  • To enclose an area using interconnected panels or posts
  • To electronically control access through a double-door system
  • To provide visual deterrent by defining a boundary
  • To control or prevent vehicle access (correct)
  • What is the function of a double-door system in physical security?

  • To allow only one door open at a time (correct)
  • To electronically control access through biometric locks
  • To provide visual deterrent by defining a boundary
  • To control or prevent vehicle access
  • What is the role of RFID and NFC in access control?

  • To define a boundary that should not be crossed
  • To use radio frequency technology for access (correct)
  • To control or prevent vehicle access
  • To allow only one door open at a time
  • What is the primary purpose of video surveillance in physical security?

    <p>To observe and report activities</p> Signup and view all the answers

    What is the function of cipher locks in physical security?

    <p>To use a code to secure entry or exit</p> Signup and view all the answers

    What is the purpose of security guards in physical security?

    <p>To observe and report activities</p> Signup and view all the answers

    What is the role of lighting in physical security?

    <p>To provide visual deterrent by defining a boundary</p> Signup and view all the answers

    What is the key difference between Piggybacking and Tailgating?

    <p>Piggybacking involves gaining consent of the person with legitimate access, while tailgating doesn't involve obtaining consent.</p> Signup and view all the answers

    What technology is commonly integrated into access control vestibules for authentication?

    <p>All of the above</p> Signup and view all the answers

    What is the main purpose of door locks in a secure facility or office building?

    <p>To restrict and regulate access</p> Signup and view all the answers

    Which type of door locks are vulnerable to simple techniques like lock picking?

    <p>Traditional Padlocks</p> Signup and view all the answers

    Which authentication method relies on physical characteristics like fingerprints, retinal scans, or facial recognition?

    <p>Biometrics</p> Signup and view all the answers

    What is the main challenge associated with Biometric authentication?

    <p>High False Acceptance Rate (FAR)</p> Signup and view all the answers

    Which type of electronic door locks utilize various authentication methods for enhanced security?

    <p>Modern Electronic Door Locks</p> Signup and view all the answers

    What technology is commonly used for contactless authentication in access badge cloning?

    <p>Both a and b</p> Signup and view all the answers

    What is the first step an attacker takes to clone an access badge?

    <p>Scanning or reading the targeted individual’s access badge</p> Signup and view all the answers

    What is a common reason why access badge cloning is widespread?

    <p>Ease of execution</p> Signup and view all the answers

    How can you stop access badge cloning?

    <p>Both a and b</p> Signup and view all the answers

    What is the purpose of shielded wallets or sleeves with RFID access badges?

    <p>To prevent unauthorized cloning</p> Signup and view all the answers

    Which method involves using cars or trucks to ram into barriers as a means of gaining unauthorized access?

    <p>Ramming barriers with vehicles</p> Signup and view all the answers

    What type of sensors are activated when specified minimum weight is detected, and are often embedded into floors or mats?

    <p>Pressure Sensors</p> Signup and view all the answers

    What is the purpose of a Pan-Tilt-Zoom (PTZ) System in the context of physical security measures?

    <p>To move camera to better detect issues during an intrusion</p> Signup and view all the answers

    What is the purpose of Access Control Vestibules in securing access to a facility?

    <p>To ensure only one door is open at a given time</p> Signup and view all the answers

    What is the purpose of Infrared Sensors in the context of physical security measures?

    <p>To detect changes in infrared radiation</p> Signup and view all the answers

    How do Microwave Sensors function in a physical security context?

    <p>By emitting microwave pulses and measuring reflection off moving objects</p> Signup and view all the answers

    What role do Security Guards play in relation to physical security measures?

    <p>To help reassure staff and customers</p> Signup and view all the answers

    What method involves two people working together, with one having legitimate access, allowing an unauthorized person to enter a secure area?

    <p>Piggybacking</p> Signup and view all the answers

    What is the primary function of Lighting in the context of physical security measures?

    <p>To deter criminals and reduce hiding spots</p> Signup and view all the answers

    What is the aim of Tampering with security devices in the context of unauthorized access?

    <p>To manipulate devices to create new vulnerabilities</p> Signup and view all the answers

    Study Notes

    • DionTraining.com study notes discuss various methods of unauthorized personnel gaining access to secured areas, requiring physical security measures.
    • Establishing a physical barrier: bollards for countering vehicular threats, fencing for larger perimeters.
    • Brute Force attacks: gaining access by trying all possibilities, focus on Forcible Entry Act, use high-strength doors with deadbolts.
    • Tampering with security devices: manipulating devices to create new vulnerabilities, have redundancy in physical security measures.
    • Confronting security personnel: direct confrontation or attack, security personnel should undergo rigorous training.
    • Ramming barriers with vehicles: using cars or trucks to ram into barriers, install bollards or reinforced barriers.
    • Surveillance Systems: organized strategy for observing and reporting activities, includes video surveillance and sensors.
    • Video Surveillance: includes motion detection, night vision, and facial recognition, can be wired or wireless.
    • Pan-Tilt-Zoom (PTZ) System: can move camera to better detect issues during an intrusion.
    • Best places for cameras: data centers, telecommunications closets, entrance or exit areas.
    • Security Guards: flexible and adaptable forms of surveillance, help reassure staff and customers.
    • Lighting: crucial for effective surveillance, deters criminals, reduces shadows and hiding spots, enhances video recording quality.
    • Infrared Sensors: detect changes in infrared radiation, often emitted by warm bodies.
    • Pressure Sensors: activated when specified minimum weight is detected, embedded into floors or mats.
    • Microwave Sensors: detect movement in an area, emit microwave pulses and measure reflection off moving objects.
    • Ultrasonic Sensors: measure reflection of ultrasonic waves off moving objects.
    • Bypassing Surveillance Systems: methods used to bypass surveillance, such as visual obstruction, blinding sensors and cameras, interfering with acoustics, and electromagnetic interference.
    • Access Control Vestibules: double-door system designed to ensure only one door is open at a given time, can prevent piggybacking and tailgating.
    • Piggybacking: two people working together, one with legitimate access allowing unauthorized person to enter a secure area.
    • Tailgating: unauthorized person closely follows someone with legitimate access into a secured area.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Prepare for the CompTIA Security+ (SY0-701) exam with these study notes focusing on physical security. Learn about fundamental security concepts, indicators of malicious activity, and physical security measures such as fencing and bollards.

    More Like This

    Use Quizgecko on...
    Browser
    Browser