1102 2.1 Security Measures Flashcards

1
Q

What is the purpose of an access control vestibule?

A

To control access through a particular area by allowing only authorized individuals to move through one at a time, ensuring security verification before access to sensitive areas like a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a badge reader enhance security in a building?

A

It allows access only to those who have authorized badges, often used for entering buildings or specific rooms, and can also track time or security patrols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of video surveillance in security?

A

To monitor and record activities in various areas, enhancing security by providing real-time and recorded visual oversight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do alarm systems contribute to security?

A

They alert security personnel to unauthorized access or breaches by detecting opening of doors or windows or by detecting motion in restricted areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the use of motion sensors in security?

A

To detect any unauthorized movement in a specified area, triggering alarms or alerts to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are door locks important in physical security?

A

They provide a basic means of securing an entrance or access point to buildings or rooms, preventing unauthorized entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What role do guards play in physical security?

A

Guards verify identification, control access, and monitor security, ensuring only authorized individuals enter secure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do bollards enhance security around buildings?

A

They prevent vehicle access to pedestrian areas or secure building fronts, providing physical barriers against attacks or accidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of fences in security?

A

To create a physical barrier that prevents or controls access to a property, enhancing perimeter security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do key fobs work in security systems?

A

Key fobs are portable devices that use RFID technology to allow access through locked doors by proximity activation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security functionality do smart cards provide?

A

They contain certificates that authenticate a user’s identity to access controlled areas or systems, often combined with other forms of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do biometric systems like fingerprint scanners enhance security?

A

They provide a high level of security by using unique biological traits of individuals, such as fingerprints, to allow access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the principle of least privilege in logical security?

A

It ensures that users have only the access necessary to perform their job duties, minimizing potential exposure to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do Access Control Lists (ACLs) function in network security?

A

ACLs control the flow of traffic in and out of a network by defining which users or systems can access resources on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Multifactor Authentication (MFA) and its significance?

A

MFA enhances security by requiring multiple forms of verification from independent categories of credentials to authenticate a user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the role of Mobile Device Management (MDM) in security.

A

MDM allows IT administrators to manage and secure corporate data on employees’ mobile devices, enforcing policies and securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the function of a domain in Active Directory?

A

It is a collection of nodes under a single security boundary within an Active Directory environment, organizing and managing a group of assets like users and computers.

18
Q

How does the Group Policy feature in Active Directory enhance security?

A

It allows for centralized management of user and computer settings in an AD environment, applying security policies across the network.

19
Q

What is the purpose of home folders in Active Directory?

A

To centralize the storage of user data on a network server, making management and backup more efficient.

20
Q

Explain the use of folder redirection in Windows environments.

A

Folder redirection helps redirect the path of a folder to a new location, typically a server, to centralize files and facilitate backups and synchronization.

21
Q

What is the role of security groups in Active Directory?

A

Security groups allow for the assignment and management of access rights to resources across a network, simplifying the administration of permissions.

22
Q

What does the login script in Active Directory do?

A

It automates tasks such as mapping network drives and connecting printers upon user login, streamlining user access to network resources.

23
Q

How does a retina scanner improve security?

A

By scanning the unique patterns of a user’s retina, it provides highly accurate biometric authentication for access control.

24
Q

Why is adequate lighting important in security?

A

It enhances visibility, deterring unauthorized access and enabling better monitoring through surveillance systems.

25
Q

What security purpose do magnetometers serve at entry points?

A

They detect metal objects on persons entering a facility, preventing weapons or other unauthorized metallic objects from being brought inside.

26
Q

Describe the role of hard tokens in authentication.

A

Hard tokens generate a code used in MFA systems, providing a physical device that a user must possess to authenticate.

27
Q

What is the purpose of soft tokens in security?

A

Soft tokens generate a secure login code through an app on a user’s device, providing a form of authentication that is tied to the user’s possession of the device.

28
Q

How does SMS-based authentication work?

A

It sends a one-time code to a user’s mobile phone via text message, which they must enter to complete authentication.

29
Q

What are the advantages and risks of voice call authentication?

A

It provides an additional layer of security by delivering a code via a phone call; however, it shares similar security vulnerabilities to SMS, such as interception or phone number hijacking.

30
Q

How does email filtering enhance logical security?

A

By blocking unsolicited or harmful emails and attachments, it prevents phishing, malware, and other security threats from affecting users.

31
Q

What is the significance of organizational units in Active Directory?

A

They help organize and manage users and resources by department, location, or other criteria, facilitating targeted policy and script application.

32
Q

Explain the security purpose of equipment locks in data centers.

A

To secure racks and equipment from unauthorized access, protecting sensitive hardware and data within

33
Q

How does Active Directory handle user login and authentication?

A

By verifying user credentials against its database during the login process, ensuring that only authorized users can access network resources.

34
Q

Why is it important to use biometric scanners in high-security areas?

A

They provide a non-transferable method of authentication, using unique personal characteristics to verify identity with high accuracy.

35
Q

What is the use of implementing biometrics along with badges and PINs?

A

To combine something you have (badge), something you know (PIN), and something you are (biometrics) for multi-factor authentication, greatly enhancing security.

36
Q

How do changes to Active Directory affect network security?

A

Changes to policies, user accounts, and configurations in Active Directory directly affect the security posture of the entire network.

37
Q

What role do domain policies play in network security?

A

They enforce rules and settings across the network, controlling how users, computers, and applications behave and interact.

38
Q

Explain the security implications of using a key cabinet.

A

It secures physical keys, managing access to sensitive areas and equipment, and tracks key usage to prevent unauthorized access.

39
Q

How does an Authenticator application enhance security?

A

It generates time-sensitive codes for MFA, securing accounts by requiring a second form of authentication accessible only through the user’s device.

40
Q

What is the function of Folder Redirection in managing user data?

A

To redirect user profile folders to a network location, ensuring data is centrally stored, backed up, and managed.