20. Physical Security Flashcards

1
Q
  1. Which of the following would not be considered a detection method?
    a. Camera
    b. Motion sensor
    c. Tamper alert software
    d. Employee training
A

d. Training is considered a prevention method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which motion detection system operates by identifying changes in heat waves in an area?
    a. Infrared
    b. Electromechanical
    c. Photoelectric
    d. Acoustical
A

a. Passive Infrared (PIR) systems work by identifying changes in heat waves in an area. Because the presence of an intruder would raise the temperature of the surrounding air particles, the system alerts or sounds an alarm when this occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which motion detection system operates by emitting a magnetic field and monitoring that field?
    a. Infrared
    b. Capacitance
    c. Wave motion
    d. Acoustical
A

b. These devices emit a magnetic field and monitor it. If the field is disrupted, which will occur when a person enters the area, the alarm will sound.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. An open case warning is an example of which of the following?
    a. Motion detection
    b. Asset tagging
    c. Tamper detection
    d. Dynamic alert
A

c. Tamper detection refers to any method that alerts you when a device or enclosure in which it resides has been opened or an attempt has been made to open it. Another good example is chassis intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is the most effective way to stop social engineering attacks?
    a. Policies
    b. Penalties
    c. Training
    d. Auditing
A

c. Security awareness training educates users about social engineering techniques and makes them less prone to fall for these attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following uses a characteristic factor for authentication?
    a. Biometrics
    b. Secondary authentication
    c. Identity proofing
    d. Hybrid authentication
A

a. Biometric systems are designed to operate using characteristic and behavioural factors. While knowledge factors (password, PIN, or something you know) are the most common authentication factors used, characteristic factors represent something you are (fingerprint, iris scan), while behavioural factors represent something you do (signature analysis).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following is not an example of multifactor authentication?
    a. Password and PIN * (typo?)
    b. Password and iris scan
    c. Retina scan and USB fob
    d. USB fob and smart card
A

d. Multifactor required at least two factors of authentication derived from two different categories of factors. A USB fob and a smart card are both possession factors (something you have).
[ I don’t trust option a here either - password and pin are both something you know]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following occurs when a legitimate user is denied authentication in a biometric system?
    a. False negative
    b. True negative
    c. True positive
    d. False positive
A

a. One of the issues with biometrics is the occurrence of false positives and false negatives. A false positive is when a user that should not be allowed to access is indeed allowed access. A false negative, on the other hand, is when an authorised individual is denied passage by mistake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is also known as an access control vestibule?
    a. Trapdoor
    b. Mantrap
    c. Smart door
    d. Turnstile
A

b. An access control vestibule ( previously known as a mantrap) is used to control access to the vestibule of a building. It is a series of two doors with a small gap between them. The user is authenticated at the first door and then allowed into the room. At that point, additional verification will occur (such as a guard visually identifying a person) and then they are allowed through the second door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is managed using simple desktop or mobile software?
    a. Proximity door
    b. Smart locker
    c. Faraday cage
    d. Black box
A

b. Smart lockers include a new storage locker option born in the last decade. A smart lock is an electromechanical lock that is designed to perform locking and unlocking operations on a door when it receives such instructions from an authorised device using a wireless protocol and a cryptographic key to execute the authorisation process. With smart locks, lockers can be assigned on the fly, reset, audited, and re-assigned using simple desktop or mobile software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly