CompTIA Security+ (SY0-701) E4 Physical Security M

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Brute Force attacks involve gaining access by trying all possibilities and do not focus on Forcible Entry Act.

True (A)

Tampering with security devices can create new vulnerabilities and redundancy in physical security measures is important.

True (A)

Surveillance Systems do not include video surveillance and sensors.

False (B)

Pan-Tilt-Zoom (PTZ) System cannot move the camera to better detect issues during an intrusion.

<p>False (B)</p> Signup and view all the answers

Best places for cameras include data centers, telecommunications closets, and entrance or exit areas.

<p>True (A)</p> Signup and view all the answers

Infrared Sensors detect changes in ultraviolet radiation.

<p>False (B)</p> Signup and view all the answers

Pressure Sensors are activated when a specified minimum weight is detected and are embedded into floors or mats.

<p>True (A)</p> Signup and view all the answers

Microwave Sensors emit microwave pulses and measure reflection off moving objects.

<p>True (A)</p> Signup and view all the answers

Ultrasonic Sensors measure reflection of ultrasonic waves off moving objects.

<p>True (A)</p> Signup and view all the answers

Access Control Vestibules are not designed to prevent piggybacking and tailgating.

<p>False (B)</p> Signup and view all the answers

Piggybacking involves two people working together, one with legitimate access allowing unauthorized person to enter a secure area.

<p>True (A)</p> Signup and view all the answers

Tailgating involves an unauthorized person closely following someone with legitimate access into a secured area.

<p>True (A)</p> Signup and view all the answers

Access control vestibules are usually integrated with electronic badges and operated by a security guard at the entrance to a secure facility or office building

<p>True (A)</p> Signup and view all the answers

Piggybacking uses social engineering to gain consent of the person with legitimate access

<p>True (A)</p> Signup and view all the answers

Tailgating doesn’t use or obtain the consent of the person with legitimate access

<p>True (A)</p> Signup and view all the answers

Door Locks are a critical physical security control measure designed to restrict and regulate access to specific spaces or properties

<p>True (A)</p> Signup and view all the answers

Traditional padlocks are easily defeated and offer minimal protection

<p>True (A)</p> Signup and view all the answers

Modern electronic door locks utilize various authentication methods for enhanced security

<p>True (A)</p> Signup and view all the answers

Wireless signals for electronic door locks utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking

<p>True (A)</p> Signup and view all the answers

Biometric authentication methods rely on physical characteristics like fingerprints, retinal scans, or facial recognition

<p>True (A)</p> Signup and view all the answers

Biometric challenges include False Acceptance Rate (FAR), False Rejection Rate (FRR), and Crossover Error Rate (CER)

<p>True (A)</p> Signup and view all the answers

Some electronic door locks use multiple factors, such as an identification number and fingerprint, to increase security

<p>True (A)</p> Signup and view all the answers

Access badge cloning is common because of its ease of execution, ability to be stealthy when conducting the attack, and potentially widespread use in compromising physical security

<p>True (A)</p> Signup and view all the answers

Implementing advanced encryption in card-based authentication systems can help stop access badge cloning

<p>True (A)</p> Signup and view all the answers

Physical security measures are designed to protect intangible assets such as data and information.

<p>False (B)</p> Signup and view all the answers

Fences and bollards are considered primitive tools for safeguarding assets and people.

<p>True (A)</p> Signup and view all the answers

Access control vestibules utilize a single-door system to prevent unauthorized entry.

<p>False (B)</p> Signup and view all the answers

Electronic access control systems can include the use of RFID or NFC technology for access.

<p>True (A)</p> Signup and view all the answers

Wireless locks are not utilized as a form of door locks in physical security.

<p>False (B)</p> Signup and view all the answers

Surveillance systems may include components such as video surveillance, security guards, lighting, and sensors.

<p>True (A)</p> Signup and view all the answers

Piggybacking and tailgating are not considered threats in physical security.

<p>False (B)</p> Signup and view all the answers

Access badges can utilize Radio Frequency Identification (RFID) or Near Field Communication (NFC) for access.

<p>True (A)</p> Signup and view all the answers

Flashcards

Physical Security Breach

Unauthorized personnel gaining access to secured areas, necessitating physical security measures.

Physical Barrier

Using barriers such as bollards or fencing to prevent unauthorized physical access.

Brute Force Attack (Physical)

Gaining access by exhaustively trying all possible combinations or entries.

Security Device Tampering

Manipulating or altering security devices to create vulnerabilities.

Signup and view all the flashcards

Confronting Security

Direct confrontation or attacks on security personnel to gain access.

Signup and view all the flashcards

Ramming Barriers

Using vehicles to crash into barriers to gain unauthorized entry.

Signup and view all the flashcards

Surveillance System

An organized observation strategy for reporting activities within an area.

Signup and view all the flashcards

Video Surveillance

Video cameras set up to capture and record activities for security purposes.

Signup and view all the flashcards

Pan-Tilt-Zoom (PTZ) System

A camera system that can be moved remotely to better view an intrusion.

Signup and view all the flashcards

Best places for security cameras?

Data centers, telecommunications closets, entrances, and exits.

Signup and view all the flashcards

Security Guards

People who can flexibly observe and report activities, providing a human element to security.

Signup and view all the flashcards

Security Lighting

Essential for effective surveillance, deterring criminals and enhancing video quality.

Signup and view all the flashcards

Infrared Sensors

Sensors that detect changes in infrared radiation emitted by warm bodies.

Signup and view all the flashcards

Pressure Sensors

Sensors activated when a specified weight is detected, often on floors or mats.

Signup and view all the flashcards

Microwave Sensors

Sensors that emit microwave pulses and measure the reflection off moving objects.

Signup and view all the flashcards

Ultrasonic Sensors

Sensors that measure the reflection of ultrasonic waves off moving objects.

Signup and view all the flashcards

Bypassing Surveillance

Methods to avoid or disable surveillance, like obscuring cameras or interfering with acoustics.

Signup and view all the flashcards

Access Control Vestibule

A double-door system ensuring only one door is open at a time to prevent unauthorized entry.

Signup and view all the flashcards

Piggybacking / Tailgating

An unauthorized person entering a secure area by closely following someone with legitimate access.

Signup and view all the flashcards

Study Notes

  • DionTraining.com study notes discuss various methods of unauthorized personnel gaining access to secured areas, requiring physical security measures.
  • Establishing a physical barrier: bollards for countering vehicular threats, fencing for larger perimeters.
  • Brute Force attacks: gaining access by trying all possibilities, focus on Forcible Entry Act, use high-strength doors with deadbolts.
  • Tampering with security devices: manipulating devices to create new vulnerabilities, have redundancy in physical security measures.
  • Confronting security personnel: direct confrontation or attack, security personnel should undergo rigorous training.
  • Ramming barriers with vehicles: using cars or trucks to ram into barriers, install bollards or reinforced barriers.
  • Surveillance Systems: organized strategy for observing and reporting activities, includes video surveillance and sensors.
  • Video Surveillance: includes motion detection, night vision, and facial recognition, can be wired or wireless.
  • Pan-Tilt-Zoom (PTZ) System: can move camera to better detect issues during an intrusion.
  • Best places for cameras: data centers, telecommunications closets, entrance or exit areas.
  • Security Guards: flexible and adaptable forms of surveillance, help reassure staff and customers.
  • Lighting: crucial for effective surveillance, deters criminals, reduces shadows and hiding spots, enhances video recording quality.
  • Infrared Sensors: detect changes in infrared radiation, often emitted by warm bodies.
  • Pressure Sensors: activated when specified minimum weight is detected, embedded into floors or mats.
  • Microwave Sensors: detect movement in an area, emit microwave pulses and measure reflection off moving objects.
  • Ultrasonic Sensors: measure reflection of ultrasonic waves off moving objects.
  • Bypassing Surveillance Systems: methods used to bypass surveillance, such as visual obstruction, blinding sensors and cameras, interfering with acoustics, and electromagnetic interference.
  • Access Control Vestibules: double-door system designed to ensure only one door is open at a given time, can prevent piggybacking and tailgating.
  • Piggybacking: two people working together, one with legitimate access allowing unauthorized person to enter a secure area.
  • Tailgating: unauthorized person closely follows someone with legitimate access into a secured area.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser