Exam Compass - Physical & Logical Security Quiz Flashcards
An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
False
True
Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply)
ACL
RFID badge
Key fob
PIN
Smart card
RFID badge
Key fob
Smart card
In computer security, the term “Biometrics” refers to physical characteristics of the human body that can be used for identification and access control purposes.
True
False
True
Examples of biometric devices include: (Select all that apply)
OCR scanner
Retina scanner
ICR scanner
Fingerprint scanner
Palmprint scanner
Retina scanner
Fingerprint scanner
Palmprint scanner
In the context of physical security, a magnetometer is a device used for detecting metal objects.
True
False
True
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.
True
False
True
Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL
ACL - Access Control List
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
ACL
CSR
DLP
AUP
ACL - Access Control List
Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or usernames and passwords (“something you know”). The categories of authentication attributes include geolocation (“somewhere you are”), user-specific activity patterns, such as keyboard typing style (“something you can do”), revealing something about an individual, e.g., wearing an ID badge (“something you exhibit”), or proving the relation with a trusted third party (“someone you know”). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.
True
False
True
Which of the examples listed below meets the requirement of multifactor authentication?
Password and biometric scan
Username and PIN
Smart card and ID badge
Voice recognition and fingerprint scan
Password and biometric scan
Which of the following is an example of a soft authentication token?
Key fob
USB token
Authenticator app
Smart card
Authenticator app
Which type of software enables a centralized administration of mobile devices?
MFA
MMC
MDM
MFD
MDM = Mobile device management
Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures?
MFA
MMC
MDM
MFD
MDM = Mobile device management