J.Dion Sec. 4 Physical Security Flashcards

1
Q

Measure taken to protect tangible assets, like buildings, equipment, and people, from harm or unauthorized access.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Short , sturdy vertical posts designed to control or prevent access by vehicles to an area or structure.

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Barriers that are made of posts, wire, or boards that are erected to enclose a space or separate areas.

A

Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized strategy or setup designed to observe and report activities in a given area.

A

Surveillance system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Double-door system with two electronically controlled doors that ensure only one door is open at any given moment.

A

Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves two people, with and without access, entering a secure area.

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs whenever an unauthorized person closely follows someone with access without their knowledge or consent.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fences prevent unauthorized

A

people from accessing area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bollards prevent

A

vehicles from driving into buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack where access to a system is gained by trying all of the possibilities until breaking through.

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Act of gaining unauthorized access to a space by physically breaking or bypassing its barriers, such as windows, doors, or fences.

A

Forcible entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Involves manipulating security devices to create new vulnerabilities that can be exploited.

A

Tampering with Security Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organized strategy or setup designed to observe and report activities in a given area.

A

Surveillance system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four main categories of surveillance?

A

Video surveillance
Security guards
Lighting
Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Devices that detect and respond to external changes in the environment and convert the information into readable signals or data.

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four categories of sensors?

A

Infrared sensors
Pressure sensors
Microwave sensors
Ultrasonic sensors

17
Q

Sensors that detect changes in infrared radiation that is emitted by warm bodies like humans or animals. These sensors are effective in low light or dark conditions.

A

Infrared Sensors

18
Q

Sensors that are activated when a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat.

A

Pressure sensors

19
Q

Sensors that detect movement in an area by emitting microwave pulses and measuring heir reflection off moving objects.

A

Microwave sensors

20
Q

Sensors that measure the reflection of ultrasonic waves off moving objects.

A

Ultrasonic sensors

21
Q

Double-door system that is designed with two doors that are electronically controlled to ensure that only one door can be opened at a given time.

A

Access control vestibule

22
Q

Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property.

A

Door locks

23
Q

Occurs any time the biometric system authenticates a user as valid, even though that person should not have been granted access to they system.

A

False Acceptance Rate (FAR)

24
Q

Occurs anytime the biometric system denies a user who should have been allowed access to the system.

A

False Rejection Rate (FRR)

25
Q

Biometric rate which uses a measure of the effectiveness of a given biometrics system to achieve a balance.

A

Equal Error Rate (EER)

26
Q

The Equal Error Rate is also known as

A

Crossover Error Rate (CER)

27
Q

At what point does the equal error rate achieve balance?

A

At the intersection of the false rejection rate and false acceptance rate.

28
Q

Refers to copying the data from an RFID or NFC card or badge onto another card or device.

A

Access badge cloning

29
Q

What are the four basic steps in access badge cloning?

A

Scanning
Data extraction
Writing to a new card
Using a cloned access badge

30
Q

Jennifer, a facilities manager at Dion Training, wants to prevent unauthorized vehicles from getting too close to the building and ramming into it. Which of the following physical security control measures should they utilize to achieve this?

a. Fences
b. Bollards
c. Access control vestibules
d. Video surveillance

A

b. Bollards

31
Q

Jacob, a security manager at Dion Training, wants to protect a sensitive server room against unauthorized physical access without relying on electronic locking mechanisms. Which of the following door locks should they utilize to achieve this?

a. Biometric lock
b. RFID lock
c. Cipher lock
d. PIN lock

A

c. Cipher lock

32
Q

Jonni, a security manager at Dion Training, wants to implement a physical security control measure at the main entrance of their new corporate headquarters. Their primary objective is to authenticate individuals in a space between two sets of doors to help prevent tailgating by ensuring that unauthorized persons don’t follow authorized individuals inside. Which of the following security controls should he implement to best achieve this?

a. Perimeter fencing
b. Access control vestibule
c. Motion detection sensors
d. Video surveillance

A

b. Access control vestibule

33
Q

Sheryl, a penetration tester at Dion Training, wants to break into the RFID-protected server room. She sees Mazen sitting in a coffee shop, so she briefly places her purse near Mazen’s backpack. Later, she uses a device from her purse to access the server room. She receives a message stating, “Welcome, Mazen” when she authenticates with the RFID-based lock using the device. Which of the following types of attacks did she utilize to gain access to the server room?

a. Lock picking
b. Password cracking
c. Brute force attack
d. Access badge cloning

A

d. Access badge cloning

34
Q

Which of the following sensors is used to detect changes in environmental heat that is typically emitted by warm bodies such as humans or animals?

a. Infrared sensors
b. Microwave sensors
c. Pressure sensors
d. Ultrasonic sensors

A

a. Infrared sensors

35
Q
A