3.2.5 Practice Questions Flashcards
You are a security consultant and have been hired to evaluate an organization’s physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization’s CEO.
What could you do to add an additional layer of security to this organization?
answer
Train the receptionist to keep her iPad in a locked drawer.
Move the receptionist’s desk into the secured area.
Replace the biometric locks with smart cards.
Require users to use workstation screensaver passwords.
Train the receptionist to keep her iPad in a locked drawer.
Explanation
In this scenario, the best option to add an additional layer of security is to train the receptionist to keep her iPad in a locked drawer.
While reviewing video files from your organization’s security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge.
Which of the following would you most likely implement to keep this from happening in the future?
answer
Anti-passback
Scrubbing
Mantraps
Cable locks
Mantraps
Explanation
You could implement mantraps at each entrance to the facility to mitigate piggybacking. A mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas
Implementing emergency lighting that runs on protected power and automatically switches on when the main power goes off is part of which physical control?
answer
Perimeter barriers
Employee and visitor safety
Physical access logs
Physical access controls
Employee and visitor safety
Explanation
https://chat.openai.com/c/24ea0519-e673-41ae-9875-bee10f39d33c
Closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback). Which camera is more vandal-resistant than other cameras?
answer
A c-mount camera
A bullet camera
A dome camera
A Pan Tilt Zoom camera
A dome camera
Explanation
A dome camera, which is a camera protected with a plastic or glass dome, is more vandal-resistant than other cameras.
Important aspects of physical security include which of the following?
answer
Identifying what was broken into, what is missing, and the extent of the damage.
Preventing interruptions of computer services caused by problems such as fire.
Influencing the target’s thoughts, opinions, and emotions before something happens.
Implementing adequate lighting in parking lots and around employee entrances.
Preventing interruptions of computer services caused by problems such as fire.
Explanation
Restricting physical access to facilities and computer systems.
Preventing interruptions of computer services caused by problems such as loss of power or fire.
Preventing unauthorized disclosure of information.
Disposing of sensitive material.
Protecting the interior and exterior of your facility.
What are the three factors to keep in mind with physical security?
answer
Implementation, detection, and recovery
Prevention, detection, and recovery
Detection, implementation, and prevention
Detection, prevention, and implementation
Prevention, detection, and recovery
Explanation
Prevention is making the location less appealing to hackers.
Detection is identifying what was broken into, what is missing, and the extent of the damage.
Recovery is reviewing the physical security procedures, repairing any damage, and hardening the physical security of the company against future problems.
A person in a dark grey hoodie has jumped the fence at your research center. A security guard has detained this person, denying him physical access. Which of the following areas of physical security is the security guard currently in?
answer
Physical control
Layered defense
Security sequence
Security factors
Security sequence
Explanation
The security sequence area of physical security should be deployed in the following sequence. If a step in the sequence fails, the next step should implement itself automatically.
Deter initial access attempts.
Deny direct physical access.
Detect the intrusion.
Delay the violator to allow for response.
Which of the following best describes a lock shim?
answer
A small, angled, and pointed tool.
A cut to the number nine position.
A thin, stiff piece of metal.
When the pins are scraped quickly.
A thin, stiff piece of metal.
Explanation
A lock shim is a tool that is, basically, a thin, stiff piece of metal that can be inserted into the latch of a padlock.
On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company?
answer
Environmental threat
External threat
Man-made threat
Cloud threat
Man-made threat
Explanation
A man-made threat refers to a danger or risk that is created or caused by human actions, such as terrorism, pollution, or cyberattacks.
The U.S. Department of Commerce has an agency with the goal of protecting organizational operations, assets, and individuals from threats such as malicious cyber-attacks, natural disasters, structural failures, and human errors. Which of the following agencies was created for this purpose?
answer
JPCERT
NVD
CAPEC
NIST
NIST
Explanation
To protect data from threats and attacks, the U.S. Department of Commerce created the National Institute of Standards and Technology (NIST)
Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the install operating system?
answer
Physical attack
Environmental attack
Man-made attack
Opportunistic attack
Physical attack
Explanation
Physical security is the protection of corporate assets including property, facilities, equipment, and personnel from damage, theft, or harm.