Core 2: Physical Security Flashcards

1
Q

The term “Mantrap” refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

Smart card
ID badge
Soft token
RFID badge

A

RFID badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

MicroSD card
Common Access Card (CAC)
Proximity card
Personal Identity Verification (PIV) card

A

Proximity card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers)

 Motion detection
 Lighting
 Door lock
 CCTV
 Proximity card reader
 Smart card reader
A

Proximity card reader
Door lock
Smart card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protection provided by security guards is an example of:

Technical security control
Physical security control
Administrative security control
Logical security control

A

Technical security control

Physical security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In computer security, the term “Biometrics” refers to physical characteristics of the human body that can be used for identification and access control purposes.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following provides physical security measure against laptop theft?

Cable lock
Trusted Platform Module (TPM)
Geotracking
LoJack for Laptops

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

USB locks are mechanical devices used for blocking a computer’s USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are examples of hardware tokens? (Select 3 answers)

 Key fob
 Cable lock
 Passphrase
 Biometric reader
 RFID badge
 Smart card
A

Key fob
RFID badge
Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In IT security, the term “Entry control roster” refers to a list of personnel allowed to access restricted areas.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly