CompTIA Security+ (SY0-701) E4 Physical Security H

CalmYellow avatar
CalmYellow
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Match the following physical security measures with their descriptions:

Fencing and Bollards = Measures to protect tangible assets from harm or unauthorized access Surveillance Systems = An organized strategy to observe and report activities Access Control Vestibules = Double-door system electronically controlled to allow only one door open at a time Door Locks = Includes padlocks, pin and tumbler locks, numeric locks, wireless locks, biometric locks, cipher locks

Match the following security control methods with their descriptions:

Brute Force Attacks = Forcible entry, tampering with security devices, confronting security personnel, ramming a barrier with a vehicle Access Badges = Use of Radio Frequency Identification (RFID) or Near Field Communication (NFC) for access Physical Security Measures = Stand out as some of the most primitive tools employed to safeguard assets and people Fence Structure = Encloses an area using interconnected panels or posts and provides a visual deterrent by defining a boundary

Match the following components of surveillance systems with their descriptions:

Video surveillance = Component of surveillance systems Security guards = Component of surveillance systems Lighting = Component of surveillance systems Sensors = Component of surveillance systems

Match the following types of door locks with their descriptions:

<p>Padlocks = Type of door lock Pin and tumbler locks = Type of door lock Numeric locks = Type of door lock Wireless locks = Type of door lock</p> Signup and view all the answers

Match the following security measure with its description:

<p>Bollards = Counter vehicular threats Tampering with security devices = Manipulating devices to create vulnerabilities Infrared Sensors = Detect changes in infrared radiation Access Control Vestibules = Double-door system to prevent piggybacking and tailgating</p> Signup and view all the answers

Match the following security threat with its description:

<p>Brute Force attacks = Gaining access by trying all possibilities Confronting security personnel = Direct confrontation or attack Ramming barriers with vehicles = Using cars or trucks to breach barriers Bypassing Surveillance Systems = Methods used to bypass surveillance</p> Signup and view all the answers

Match the following surveillance technology with its function:

<p>Pan-Tilt-Zoom (PTZ) System = Move camera to better detect issues during intrusion Microwave Sensors = Detect movement in an area Ultrasonic Sensors = Measure reflection of ultrasonic waves off moving objects Pressure Sensors = Activated when specified minimum weight is detected</p> Signup and view all the answers

Match the following security concept with its definition:

<p>Piggybacking = Two people working together, one with legitimate access allowing unauthorized person to enter secure area Surveillance Systems = Organized strategy for observing and reporting activities Lighting = Crucial for effective surveillance, deters criminals, reduces shadows and hiding spots Security Guards = Flexible and adaptable forms of surveillance</p> Signup and view all the answers

Match the following security measure with its purpose:

<p>Fencing = For larger perimeters High-strength doors with deadbolts = Focus on Forcible Entry Act Redundancy in physical security measures = Create new vulnerabilities in security devices Video Surveillance = Includes motion detection, night vision, and facial recognition</p> Signup and view all the answers

Match the following security tactic with its outcome:

<p>Establishing a physical barrier = Countering vehicular threats Surveillance Cameras in data centers = Best places for cameras Rigorous training for security personnel = Help reassure staff and customers Installing bollards or reinforced barriers = Prevent ramming barriers with vehicles</p> Signup and view all the answers

Match the following security measures with their descriptions:

<p>Piggybacking = Uses social engineering to gain consent of the person with legitimate access Tailgating = Doesn’t use or obtain the consent of the person with legitimate access Access control vestibules = Usually integrated with electronic badges and operated by a security guard at the entrance to a secure facility or office building Door Locks = Critical physical security control measure designed to restrict and regulate access to specific spaces or properties, preventing unauthorized intrusions and safeguarding sensitive data and individuals</p> Signup and view all the answers

Match the following authentication methods with their descriptions:

<p>Identification Numbers = Require entry of a unique code, providing a balance of security and convenience Wireless Signals = Utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking Biometrics = Rely on physical characteristics like fingerprints, retinal scans, or facial recognition for authentication Multiple factors authentication = Use multiple factors, such as an identification number and fingerprint, to increase security</p> Signup and view all the answers

Match the following door lock types with their descriptions:

<p>Traditional Padlocks = Easily defeated and offer minimal protection Basic Door Locks = Vulnerable to simple techniques like lock picking Modern Electronic Door Locks = Utilize various authentication methods for enhanced security Cipher Locks = Mechanical locks with numbered push buttons, requiring a correct combination to open, commonly used in high-security areas like server rooms</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>Access Badge Cloning = Copying the data from an RFID or NFC card or badge onto another card or device False Acceptance Rate (FAR) = Occurs when the system erroneously authenticates an unauthorized user False Rejection Rate (FRR) = Denies access to an authorized user. Adjusting sensitivity can increase FRR Crossover Error Rate (CER) = A balance between FAR and FRR for optimal authentication effectiveness</p> Signup and view all the answers

Match the following actions with their descriptions:

<p>Scanning = Scanning or reading the targeted individual’s access badge Data Extraction = Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data Writing to a new card or device = Attacker transfers the extracted data onto a blank RFID or NFC card or another compatible device Using the cloned access badge = Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card</p> Signup and view all the answers

Match the following prevention measures with their descriptions:

<p>Implement advanced encryption in your card-based authentication systems = Implement Multi-Factor Authentication (MFA) = Regularly update your security protocols = Educate your users =</p> Signup and view all the answers

Study Notes

  • DionTraining.com study notes discuss various methods of unauthorized personnel gaining access to secured areas, requiring physical security measures.
  • Establishing a physical barrier: bollards for countering vehicular threats, fencing for larger perimeters.
  • Brute Force attacks: gaining access by trying all possibilities, focus on Forcible Entry Act, use high-strength doors with deadbolts.
  • Tampering with security devices: manipulating devices to create new vulnerabilities, have redundancy in physical security measures.
  • Confronting security personnel: direct confrontation or attack, security personnel should undergo rigorous training.
  • Ramming barriers with vehicles: using cars or trucks to ram into barriers, install bollards or reinforced barriers.
  • Surveillance Systems: organized strategy for observing and reporting activities, includes video surveillance and sensors.
  • Video Surveillance: includes motion detection, night vision, and facial recognition, can be wired or wireless.
  • Pan-Tilt-Zoom (PTZ) System: can move camera to better detect issues during an intrusion.
  • Best places for cameras: data centers, telecommunications closets, entrance or exit areas.
  • Security Guards: flexible and adaptable forms of surveillance, help reassure staff and customers.
  • Lighting: crucial for effective surveillance, deters criminals, reduces shadows and hiding spots, enhances video recording quality.
  • Infrared Sensors: detect changes in infrared radiation, often emitted by warm bodies.
  • Pressure Sensors: activated when specified minimum weight is detected, embedded into floors or mats.
  • Microwave Sensors: detect movement in an area, emit microwave pulses and measure reflection off moving objects.
  • Ultrasonic Sensors: measure reflection of ultrasonic waves off moving objects.
  • Bypassing Surveillance Systems: methods used to bypass surveillance, such as visual obstruction, blinding sensors and cameras, interfering with acoustics, and electromagnetic interference.
  • Access Control Vestibules: double-door system designed to ensure only one door is open at a given time, can prevent piggybacking and tailgating.
  • Piggybacking: two people working together, one with legitimate access allowing unauthorized person to enter a secure area.
  • Tailgating: unauthorized person closely follows someone with legitimate access into a secured area.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team
Use Quizgecko on...
Browser
Browser