Exam Compass - Physical & Logical Security Quiz Flashcards

1
Q

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply)
ACL
RFID badge
Key fob
PIN
Smart card

A

RFID badge
Key fob
Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In computer security, the term “Biometrics” refers to physical characteristics of the human body that can be used for identification and access control purposes.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of biometric devices include: (Select all that apply)
OCR scanner
Retina scanner
ICR scanner
Fingerprint scanner
Palmprint scanner

A

Retina scanner
Fingerprint scanner
Palmprint scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the context of physical security, a magnetometer is a device used for detecting metal objects.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL

A

ACL - Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
ACL
CSR
DLP
AUP

A

ACL - Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or usernames and passwords (“something you know”). The categories of authentication attributes include geolocation (“somewhere you are”), user-specific activity patterns, such as keyboard typing style (“something you can do”), revealing something about an individual, e.g., wearing an ID badge (“something you exhibit”), or proving the relation with a trusted third party (“someone you know”). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the examples listed below meets the requirement of multifactor authentication?
Password and biometric scan
Username and PIN
Smart card and ID badge
Voice recognition and fingerprint scan

A

Password and biometric scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an example of a soft authentication token?
Key fob
USB token
Authenticator app
Smart card

A

Authenticator app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of software enables a centralized administration of mobile devices?
MFA
MMC
MDM
MFD

A

MDM = Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures?
MFA
MMC
MDM
MFD

A

MDM = Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly