05- Physical Security QUIZ Flashcards

1
Q

What is a mantrap?
A. A trusted security domain
B. A mechanism for logical accessing control
C. A double-door room used for physical access control
D. A device for fire suppression

A

Answer: C
A mantrap is a small room with two doors. The first door is locked; a person is identified and authenticated by a security guard, biometric system, smart card reader, or swipe card reader. Once the person is authenticated and access is authorized, the first door opens and allows the person into the mantrap. The first door locks and the person is trapped. The person must be authenticated again before the second door unlocks and allows him into the facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is not a main component of CPTED?
A. Natural access control
B. Natural surveillance
C. Territorial reinforcement
D. Target hardening
A

Answer: D

Target hardening has to do with implementing locks, security guards, and proximity devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is not a control category in a physical security program?
A. Deterrence and delaying
B. Response and detection
C. Assessment and detection
D. Delaying and lighting
A

Answer: D
The categories of controls that should make up any physical security program are deterrence, delaying, detection, assessment,
and response. Lighting is a control itself, not a category of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following steps should be taken initially when a fire has been detected?
A. Turn off the HVAC system and activate fire door releases
B. Determine the type of fire
C. Instruct individuals to leave the building
D. Turn on the fire suppression system

A

Answer: C
Human life takes precedence. Although the other answers are important steps in this type of situation, the first step is to warn others and save as many lives as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the best choice in choosing security guard for a physical access control
mechanism?
A. When discriminating judgment is required
B. When intrusion detection is needed
C. When the allotted security budget is low
D. When access controls are in place

A

Answer: A
Although many effective physical security mechanisms are on the market today, none can look at a situation, make a judgment about it, and decide what the next step should be. A security guard is employed when a company needs to have a countermeasure that can think and make decisions in different scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following problems are caused by humidity on electrical devices?
A. High humidity causes excess electricity whereas low humidity causes corrosion
B. High humidity causes corrosion whereas low humidity causes static electricity
C. High humidity causes power fluctuations whereas low humidity causes static electricity
D. High humidity causes corrosion whereas low humidity causes power fluctuations

A

Answer: B
High humidity can cause corrosion, and low humidity can cause excessive static electricity. Static electricity can short-out devices or cause loss of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does positive pressurization pertaining to ventilation mean?
A. When a door opens, the air gets in
B. When a fire takes place, the power supply is disabled
C. When a fire takes place, the smoke is diverted to one room
D. When a door opens, the air goes out

A

Answer: D
Positive pressurization means that when someone opens a door, the air goes out, and outside air does not come in. If a facility were on fire and the doors were opened, positive pressure would cause the smoke to go out instead of being pushed back into
the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following means an access control has a fail-safe characteristic but not a
fail-secure characteristic?
A. It defaults to no access
B. It defaults to being unlocked
C. It defaults to being locked
D. It defaults to sounding a remote alarm instead of a local alarm

A

Answer: B
A fail-safe setting means that if a power disruption were to affect the automated locking system, the doors would default to
being unlocked. A fail-secure configuration means a door would default to being locked if there were any problems with the
power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is not considered as a delaying mechanism?
A. Locks
B. Defense-in-depth measures
C. Warning signs
D. Access controls
A

Answer: C
Every physical security program should have delaying mechanisms, which have the purpose of slowing down an intruder so security personnel can be alerted and arrive at the scene. A warning sign is a deterrence control, not a delaying control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is not a drawback to install intrusion detection and monitoring systems?
A. Installation is expensive
B. It cannot be penetrated
C. It requires human response
D. It is subjected to false alarms
A

Answer: B
Monitoring and intrusion detection systems are expensive, require someone to respond when they set off an alarm, and because of their level of sensitivity, can cause several false alarms. Like any other type of technology or device, they have their own vulnerabilities that can be exploited and penetrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical security has a different set of threats, vulnerabilities, and risks when compared to
other security issues we address in this series.
True
False

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Physical threats to companies include: (choose all that apply.)
A. Theft
B. Accidents
C. Cyber crimes
D. Fraud
A

Answer: A, B, and D
Physical security threats to companies include interruption of services, theft, fraud, sabotage, vandalism, and accidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Life safety means protecting the facility is the first priority.
True
False

A

Answer: False

Life safety means protecting human life as the first priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The level of protection depends on what?
A. The number of employees
B. The acceptable risk level
C. The amount of data

A

Answer: B
The objectives of the physical security program should be based on the level of protection for the various assets and the organization as a whole. This level of protection depends upon the company’s acceptable risk level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power failure is much more devastating to a business than it was 10 or 20 years ago.
True
False

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ are short-term solutions to power failure.
A. Generators
B. UPSs
C. Batteries
D. Power supplies
A

Answer: B

UPSs are usually short-term solutions compared to generators.

17
Q

You don’t need to test that generators are in working condition after you have installed them.
True
False

A

Answer: False

You should be periodically testing to ensure the generators or the other back-up sources are in working condition.

18
Q
A power spike is:
A. momentary high voltage
B. momentary power outage
C. a surge
D. prolonged low power supply
A

Answer: A
Disturbances to electric power include: Power excess; a spike (Momentary high voltage); a surge (prolonged high voltage); power loss; fault (Momentary power outage); a blackout (prolonged complete loss of electric power); power degradation; a sag or dip (Momentary low-voltage condition from one cycle to a few seconds); a brownout (Prolonged power supply that is below normal voltage); or an inrush current (Initial surge of current required to start a load).

19
Q
The \_\_\_\_\_\_\_\_\_ is your first line of defense.
A. wall
B. layer of defense
C. perimeter
D. security plan
A

Answer: C
The perimeter is the place where you must start your defense mechanism. It is your first line of defense. It could be a fence, a
wall, or a marking.

20
Q
Which are included in the area of access controls? (Choose all that apply?)
A. Photo ID cards
B. Entry points
C. PIN
D. Piggybacking
A

Answer: A and C
Once you decide on access areas and points, you can set-up access controls. These controls can be the use of photo identity cards, swipe cards, biometric identification, or a PIN. You can also have smart cards with details of what areas an employee can visit and any appropriate controls can be set-up at the entry points.

21
Q
Which of the following are physical barriers? (Choose all that apply.)
A. Locks and keys
B. Card access system
C. Gates
D. Walls
E. Doors
A

Answer: C, D, and E
You can provide access control mechanisms through locks and keys, an electronic card access system, and personnel awareness. You can set up physical barriers by having fences, gates, walls, doors, windows, protected vents, and vehicular
barriers.

22
Q

Locks are widely accepted access control mechanisms.
True
False

A

Answer: True
Locks are inexpensive. When locked, they delay the intruder. If it takes longer to break or open a lock, security personnel or police will have that much more time to arrive at the scene.

23
Q

The advantage of surveillance devices is that you don’t need to employ human guards.
True
False

A

Answer: False

The advantage is that you can centrally monitor and deploy people depending on an intrusion attempt.

24
Q
Physical access control systems use software to log what type of information about an access
attempt? (Choose all that apply.)
A. Date
B. Unsuccessful attempts
C. Number of intruders
A

Answer: A and B
Physical access control systems can use software and auditing features to produce audit trails or access logs pertaining to access attempts. The following information should be logged and reviewed: The date and time of the access attempt. The entry point at which access was attempted. The user ID employed when access was attempted. Any unsuccessful access attempts,
especially if during unauthorized hours.

25
Q

It is important that the security manager reviews these logs periodically to ascertain any
breaches or attempts to breach.
True
False

A

Answer: True

26
Q

As long as your employees are aware of the security plan, there is no need to carry out mock drills.
True
False

A

Answer: False
You should carry out an emergency mock drill. To do this, you need to craft a plan with the help of a team and test it out. The drills should be carried out at least once a year and the entire program should be continually updated and improved. The tests and drills prepare your employees for any future event. These tests and drills also point us to gaps in the existing set-up.

27
Q
IDSs can be used to detect changes in:
A. light
B. sounds and vibrations
C. electrical circuits
D. All of these
A

Answer: D
IDSs can be used to detect changes in: beams of light, sounds and vibrations, motion, different types of fields, and electrical
circuits.

28
Q

Intrusion detection systems monitor changes in environment.
True
False

A

Answer: True

29
Q

A fence is sufficient enough security.
True
False

A

Answer: False

Security should be layered. A fence is only the first layer of security.