3.2.5 Practice Questions Flashcards

1
Q

You are a security consultant and have been hired to evaluate an organization’s physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock.

A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization’s CEO.

What could you do to add an additional layer of security to this organization?

answer

Train the receptionist to keep her iPad in a locked drawer.

Move the receptionist’s desk into the secured area.

Replace the biometric locks with smart cards.

Require users to use workstation screensaver passwords.

A

Train the receptionist to keep her iPad in a locked drawer.

Explanation
In this scenario, the best option to add an additional layer of security is to train the receptionist to keep her iPad in a locked drawer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While reviewing video files from your organization’s security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge.

Which of the following would you most likely implement to keep this from happening in the future?

answer

Anti-passback

Scrubbing

Mantraps

Cable locks

A

Mantraps

Explanation
You could implement mantraps at each entrance to the facility to mitigate piggybacking. A mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Implementing emergency lighting that runs on protected power and automatically switches on when the main power goes off is part of which physical control?

answer

Perimeter barriers

Employee and visitor safety

Physical access logs

Physical access controls

A

Employee and visitor safety

Explanation
https://chat.openai.com/c/24ea0519-e673-41ae-9875-bee10f39d33c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback). Which camera is more vandal-resistant than other cameras?

answer

A c-mount camera

A bullet camera

A dome camera

A Pan Tilt Zoom camera

A

A dome camera

Explanation
A dome camera, which is a camera protected with a plastic or glass dome, is more vandal-resistant than other cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Important aspects of physical security include which of the following?

answer

Identifying what was broken into, what is missing, and the extent of the damage.

Preventing interruptions of computer services caused by problems such as fire.

Influencing the target’s thoughts, opinions, and emotions before something happens.

Implementing adequate lighting in parking lots and around employee entrances.

A

Preventing interruptions of computer services caused by problems such as fire.

Explanation
Restricting physical access to facilities and computer systems.
Preventing interruptions of computer services caused by problems such as loss of power or fire.
Preventing unauthorized disclosure of information.
Disposing of sensitive material.
Protecting the interior and exterior of your facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three factors to keep in mind with physical security?

answer

Implementation, detection, and recovery

Prevention, detection, and recovery

Detection, implementation, and prevention

Detection, prevention, and implementation

A

Prevention, detection, and recovery

Explanation
Prevention is making the location less appealing to hackers.
Detection is identifying what was broken into, what is missing, and the extent of the damage.
Recovery is reviewing the physical security procedures, repairing any damage, and hardening the physical security of the company against future problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A person in a dark grey hoodie has jumped the fence at your research center. A security guard has detained this person, denying him physical access. Which of the following areas of physical security is the security guard currently in?

answer

Physical control

Layered defense

Security sequence

Security factors

A

Security sequence

Explanation
The security sequence area of physical security should be deployed in the following sequence. If a step in the sequence fails, the next step should implement itself automatically.

Deter initial access attempts.
Deny direct physical access.
Detect the intrusion.
Delay the violator to allow for response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes a lock shim?

answer

A small, angled, and pointed tool.

A cut to the number nine position.

A thin, stiff piece of metal.

When the pins are scraped quickly.

A

A thin, stiff piece of metal.

Explanation
A lock shim is a tool that is, basically, a thin, stiff piece of metal that can be inserted into the latch of a padlock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company?

answer

Environmental threat

External threat

Man-made threat

Cloud threat

A

Man-made threat

Explanation
A man-made threat refers to a danger or risk that is created or caused by human actions, such as terrorism, pollution, or cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The U.S. Department of Commerce has an agency with the goal of protecting organizational operations, assets, and individuals from threats such as malicious cyber-attacks, natural disasters, structural failures, and human errors. Which of the following agencies was created for this purpose?

answer

JPCERT

NVD

CAPEC

NIST

A

NIST

Explanation
To protect data from threats and attacks, the U.S. Department of Commerce created the National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the install operating system?

answer

Physical attack

Environmental attack

Man-made attack

Opportunistic attack

A

Physical attack

Explanation
Physical security is the protection of corporate assets including property, facilities, equipment, and personnel from damage, theft, or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly