CompTIA Security+ (SY0-701) E4 Physical Security H
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the following physical security measures with their descriptions:

Fencing and Bollards = Measures to protect tangible assets from harm or unauthorized access Surveillance Systems = An organized strategy to observe and report activities Access Control Vestibules = Double-door system electronically controlled to allow only one door open at a time Door Locks = Includes padlocks, pin and tumbler locks, numeric locks, wireless locks, biometric locks, cipher locks

Match the following security control methods with their descriptions:

Brute Force Attacks = Forcible entry, tampering with security devices, confronting security personnel, ramming a barrier with a vehicle Access Badges = Use of Radio Frequency Identification (RFID) or Near Field Communication (NFC) for access Physical Security Measures = Stand out as some of the most primitive tools employed to safeguard assets and people Fence Structure = Encloses an area using interconnected panels or posts and provides a visual deterrent by defining a boundary

Match the following components of surveillance systems with their descriptions:

Video surveillance = Component of surveillance systems Security guards = Component of surveillance systems Lighting = Component of surveillance systems Sensors = Component of surveillance systems

Match the following types of door locks with their descriptions:

<p>Padlocks = Type of door lock Pin and tumbler locks = Type of door lock Numeric locks = Type of door lock Wireless locks = Type of door lock</p> Signup and view all the answers

Match the following security measure with its description:

<p>Bollards = Counter vehicular threats Tampering with security devices = Manipulating devices to create vulnerabilities Infrared Sensors = Detect changes in infrared radiation Access Control Vestibules = Double-door system to prevent piggybacking and tailgating</p> Signup and view all the answers

Match the following security threat with its description:

<p>Brute Force attacks = Gaining access by trying all possibilities Confronting security personnel = Direct confrontation or attack Ramming barriers with vehicles = Using cars or trucks to breach barriers Bypassing Surveillance Systems = Methods used to bypass surveillance</p> Signup and view all the answers

Match the following surveillance technology with its function:

<p>Pan-Tilt-Zoom (PTZ) System = Move camera to better detect issues during intrusion Microwave Sensors = Detect movement in an area Ultrasonic Sensors = Measure reflection of ultrasonic waves off moving objects Pressure Sensors = Activated when specified minimum weight is detected</p> Signup and view all the answers

Match the following security concept with its definition:

<p>Piggybacking = Two people working together, one with legitimate access allowing unauthorized person to enter secure area Surveillance Systems = Organized strategy for observing and reporting activities Lighting = Crucial for effective surveillance, deters criminals, reduces shadows and hiding spots Security Guards = Flexible and adaptable forms of surveillance</p> Signup and view all the answers

Match the following security measure with its purpose:

<p>Fencing = For larger perimeters High-strength doors with deadbolts = Focus on Forcible Entry Act Redundancy in physical security measures = Create new vulnerabilities in security devices Video Surveillance = Includes motion detection, night vision, and facial recognition</p> Signup and view all the answers

Match the following security tactic with its outcome:

<p>Establishing a physical barrier = Countering vehicular threats Surveillance Cameras in data centers = Best places for cameras Rigorous training for security personnel = Help reassure staff and customers Installing bollards or reinforced barriers = Prevent ramming barriers with vehicles</p> Signup and view all the answers

Match the following security measures with their descriptions:

<p>Piggybacking = Uses social engineering to gain consent of the person with legitimate access Tailgating = Doesn’t use or obtain the consent of the person with legitimate access Access control vestibules = Usually integrated with electronic badges and operated by a security guard at the entrance to a secure facility or office building Door Locks = Critical physical security control measure designed to restrict and regulate access to specific spaces or properties, preventing unauthorized intrusions and safeguarding sensitive data and individuals</p> Signup and view all the answers

Match the following authentication methods with their descriptions:

<p>Identification Numbers = Require entry of a unique code, providing a balance of security and convenience Wireless Signals = Utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking Biometrics = Rely on physical characteristics like fingerprints, retinal scans, or facial recognition for authentication Multiple factors authentication = Use multiple factors, such as an identification number and fingerprint, to increase security</p> Signup and view all the answers

Match the following door lock types with their descriptions:

<p>Traditional Padlocks = Easily defeated and offer minimal protection Basic Door Locks = Vulnerable to simple techniques like lock picking Modern Electronic Door Locks = Utilize various authentication methods for enhanced security Cipher Locks = Mechanical locks with numbered push buttons, requiring a correct combination to open, commonly used in high-security areas like server rooms</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>Access Badge Cloning = Copying the data from an RFID or NFC card or badge onto another card or device False Acceptance Rate (FAR) = Occurs when the system erroneously authenticates an unauthorized user False Rejection Rate (FRR) = Denies access to an authorized user. Adjusting sensitivity can increase FRR Crossover Error Rate (CER) = A balance between FAR and FRR for optimal authentication effectiveness</p> Signup and view all the answers

Match the following actions with their descriptions:

<p>Scanning = Scanning or reading the targeted individual’s access badge Data Extraction = Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data Writing to a new card or device = Attacker transfers the extracted data onto a blank RFID or NFC card or another compatible device Using the cloned access badge = Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card</p> Signup and view all the answers

Match the following prevention measures with their descriptions:

<p>Implement advanced encryption in your card-based authentication systems = Implement Multi-Factor Authentication (MFA) = Regularly update your security protocols = Educate your users =</p> Signup and view all the answers

Study Notes

  • DionTraining.com study notes discuss various methods of unauthorized personnel gaining access to secured areas, requiring physical security measures.
  • Establishing a physical barrier: bollards for countering vehicular threats, fencing for larger perimeters.
  • Brute Force attacks: gaining access by trying all possibilities, focus on Forcible Entry Act, use high-strength doors with deadbolts.
  • Tampering with security devices: manipulating devices to create new vulnerabilities, have redundancy in physical security measures.
  • Confronting security personnel: direct confrontation or attack, security personnel should undergo rigorous training.
  • Ramming barriers with vehicles: using cars or trucks to ram into barriers, install bollards or reinforced barriers.
  • Surveillance Systems: organized strategy for observing and reporting activities, includes video surveillance and sensors.
  • Video Surveillance: includes motion detection, night vision, and facial recognition, can be wired or wireless.
  • Pan-Tilt-Zoom (PTZ) System: can move camera to better detect issues during an intrusion.
  • Best places for cameras: data centers, telecommunications closets, entrance or exit areas.
  • Security Guards: flexible and adaptable forms of surveillance, help reassure staff and customers.
  • Lighting: crucial for effective surveillance, deters criminals, reduces shadows and hiding spots, enhances video recording quality.
  • Infrared Sensors: detect changes in infrared radiation, often emitted by warm bodies.
  • Pressure Sensors: activated when specified minimum weight is detected, embedded into floors or mats.
  • Microwave Sensors: detect movement in an area, emit microwave pulses and measure reflection off moving objects.
  • Ultrasonic Sensors: measure reflection of ultrasonic waves off moving objects.
  • Bypassing Surveillance Systems: methods used to bypass surveillance, such as visual obstruction, blinding sensors and cameras, interfering with acoustics, and electromagnetic interference.
  • Access Control Vestibules: double-door system designed to ensure only one door is open at a given time, can prevent piggybacking and tailgating.
  • Piggybacking: two people working together, one with legitimate access allowing unauthorized person to enter a secure area.
  • Tailgating: unauthorized person closely follows someone with legitimate access into a secured area.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Prepare for the CompTIA Security+ (SY0-701) exam with this study guide focused on physical security. Learn about fundamental security concepts, indicators of malicious activity, and physical security measures such as fencing and bollards.

More Like This

Use Quizgecko on...
Browser
Browser