CompTIA Security+ (SY0-701) E4 Physical Security M

CalmYellow avatar
CalmYellow
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Brute Force attacks involve gaining access by trying all possibilities and do not focus on Forcible Entry Act.

True

Tampering with security devices can create new vulnerabilities and redundancy in physical security measures is important.

True

Surveillance Systems do not include video surveillance and sensors.

False

Pan-Tilt-Zoom (PTZ) System cannot move the camera to better detect issues during an intrusion.

<p>False</p> Signup and view all the answers

Best places for cameras include data centers, telecommunications closets, and entrance or exit areas.

<p>True</p> Signup and view all the answers

Infrared Sensors detect changes in ultraviolet radiation.

<p>False</p> Signup and view all the answers

Pressure Sensors are activated when a specified minimum weight is detected and are embedded into floors or mats.

<p>True</p> Signup and view all the answers

Microwave Sensors emit microwave pulses and measure reflection off moving objects.

<p>True</p> Signup and view all the answers

Ultrasonic Sensors measure reflection of ultrasonic waves off moving objects.

<p>True</p> Signup and view all the answers

Access Control Vestibules are not designed to prevent piggybacking and tailgating.

<p>False</p> Signup and view all the answers

Piggybacking involves two people working together, one with legitimate access allowing unauthorized person to enter a secure area.

<p>True</p> Signup and view all the answers

Tailgating involves an unauthorized person closely following someone with legitimate access into a secured area.

<p>True</p> Signup and view all the answers

Access control vestibules are usually integrated with electronic badges and operated by a security guard at the entrance to a secure facility or office building

<p>True</p> Signup and view all the answers

Piggybacking uses social engineering to gain consent of the person with legitimate access

<p>True</p> Signup and view all the answers

Tailgating doesn’t use or obtain the consent of the person with legitimate access

<p>True</p> Signup and view all the answers

Door Locks are a critical physical security control measure designed to restrict and regulate access to specific spaces or properties

<p>True</p> Signup and view all the answers

Traditional padlocks are easily defeated and offer minimal protection

<p>True</p> Signup and view all the answers

Modern electronic door locks utilize various authentication methods for enhanced security

<p>True</p> Signup and view all the answers

Wireless signals for electronic door locks utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking

<p>True</p> Signup and view all the answers

Biometric authentication methods rely on physical characteristics like fingerprints, retinal scans, or facial recognition

<p>True</p> Signup and view all the answers

Biometric challenges include False Acceptance Rate (FAR), False Rejection Rate (FRR), and Crossover Error Rate (CER)

<p>True</p> Signup and view all the answers

Some electronic door locks use multiple factors, such as an identification number and fingerprint, to increase security

<p>True</p> Signup and view all the answers

Access badge cloning is common because of its ease of execution, ability to be stealthy when conducting the attack, and potentially widespread use in compromising physical security

<p>True</p> Signup and view all the answers

Implementing advanced encryption in card-based authentication systems can help stop access badge cloning

<p>True</p> Signup and view all the answers

Physical security measures are designed to protect intangible assets such as data and information.

<p>False</p> Signup and view all the answers

Fences and bollards are considered primitive tools for safeguarding assets and people.

<p>True</p> Signup and view all the answers

Access control vestibules utilize a single-door system to prevent unauthorized entry.

<p>False</p> Signup and view all the answers

Electronic access control systems can include the use of RFID or NFC technology for access.

<p>True</p> Signup and view all the answers

Wireless locks are not utilized as a form of door locks in physical security.

<p>False</p> Signup and view all the answers

Surveillance systems may include components such as video surveillance, security guards, lighting, and sensors.

<p>True</p> Signup and view all the answers

Piggybacking and tailgating are not considered threats in physical security.

<p>False</p> Signup and view all the answers

Access badges can utilize Radio Frequency Identification (RFID) or Near Field Communication (NFC) for access.

<p>True</p> Signup and view all the answers

Study Notes

  • DionTraining.com study notes discuss various methods of unauthorized personnel gaining access to secured areas, requiring physical security measures.
  • Establishing a physical barrier: bollards for countering vehicular threats, fencing for larger perimeters.
  • Brute Force attacks: gaining access by trying all possibilities, focus on Forcible Entry Act, use high-strength doors with deadbolts.
  • Tampering with security devices: manipulating devices to create new vulnerabilities, have redundancy in physical security measures.
  • Confronting security personnel: direct confrontation or attack, security personnel should undergo rigorous training.
  • Ramming barriers with vehicles: using cars or trucks to ram into barriers, install bollards or reinforced barriers.
  • Surveillance Systems: organized strategy for observing and reporting activities, includes video surveillance and sensors.
  • Video Surveillance: includes motion detection, night vision, and facial recognition, can be wired or wireless.
  • Pan-Tilt-Zoom (PTZ) System: can move camera to better detect issues during an intrusion.
  • Best places for cameras: data centers, telecommunications closets, entrance or exit areas.
  • Security Guards: flexible and adaptable forms of surveillance, help reassure staff and customers.
  • Lighting: crucial for effective surveillance, deters criminals, reduces shadows and hiding spots, enhances video recording quality.
  • Infrared Sensors: detect changes in infrared radiation, often emitted by warm bodies.
  • Pressure Sensors: activated when specified minimum weight is detected, embedded into floors or mats.
  • Microwave Sensors: detect movement in an area, emit microwave pulses and measure reflection off moving objects.
  • Ultrasonic Sensors: measure reflection of ultrasonic waves off moving objects.
  • Bypassing Surveillance Systems: methods used to bypass surveillance, such as visual obstruction, blinding sensors and cameras, interfering with acoustics, and electromagnetic interference.
  • Access Control Vestibules: double-door system designed to ensure only one door is open at a given time, can prevent piggybacking and tailgating.
  • Piggybacking: two people working together, one with legitimate access allowing unauthorized person to enter a secure area.
  • Tailgating: unauthorized person closely follows someone with legitimate access into a secured area.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team
Use Quizgecko on...
Browser
Browser