Physical Security Flashcards

1.2 - Summarize fundamental security concepts 2.4 - Analyze indicators of malicious activity

1
Q

What is the primary purpose of Physical Security?

A. To implement software measures that prevent data breaches.
B. To protect tangible assets, such as buildings, equipment, and people, from harm or unauthorized access.
C. To monitor network traffic and prevent cyberattacks.
D. To create fake decoy files and networks to confuse attackers.

A

Answer:
B. To protect tangible assets, such as buildings, equipment, and people, from harm or unauthorized access.

Explanation:

Correct Answer: Physical security involves measures that safeguard physical assets, including infrastructure and personnel.
Incorrect Options:
A: This describes cybersecurity, not physical security.
C: Network traffic monitoring is related to IT security.
D: Decoy files and networks are part of deception technologies, not physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main function of Fencing in physical security?

A. To redirect or block vehicular traffic in specific areas.
B. To enclose an area with interconnected panels or posts, establishing a physical and visual barrier.
C. To protect personnel through the use of dynamic page generation.
D. To create decoy directories to confuse attackers.

A

Answer:
B. To enclose an area with interconnected panels or posts, establishing a physical and visual barrier.

Explanation:

Correct Answer: Fences serve as both a physical barrier and a visual deterrent to unauthorized entry.
Incorrect Options:
A: Redirecting vehicular traffic is the role of bollards.
C: Dynamic page generation is not related to physical security.
D: Decoy directories are digital deception strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Bollards contribute to physical security?

A. By preventing unauthorized personnel from entering large perimeters.
B. By enclosing an area with panels or posts to delay intruders.
C. By managing or redirecting vehicular traffic to counter vehicular threats.
D. By using software tools to track unauthorized vehicles.

A

Answer:
C. By managing or redirecting vehicular traffic to counter vehicular threats.

Explanation:

Correct Answer: Bollards are robust posts designed to prevent vehicles from accessing restricted areas, offering protection against vehicular threats.
Incorrect Options:
A: Bollards do not protect large perimeters; fencing does.
B: Bollards do not enclose areas; fences serve that purpose.
D: Bollards are physical structures, not software tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key difference between Fencing and Bollards in terms of their physical security applications?

A. Fencing is more suited for countering vehicular threats, while bollards safeguard large perimeters.
B. Fencing encloses large perimeters, while bollards are designed to counter vehicular threats in specific areas.
C. Fencing is primarily used to manage vehicular traffic, while bollards delay intruders.
D. Fencing and bollards serve identical purposes but differ in materials used.

A

Answer:
B. Fencing encloses large perimeters, while bollards are designed to counter vehicular threats in specific areas.

Explanation:

Correct Answer: Fencing provides adaptable protection for large perimeters, while bollards are specialized for addressing vehicular threats.
Incorrect Options:
A: Bollards address vehicular threats, not large perimeters.
C: Fencing does not manage vehicular traffic; bollards do.
D: Fencing and bollards have distinct purposes, not identical ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is Fencing considered a key element of physical security?

A. It provides a highly visible boundary to deter unauthorized personnel and delays intruders.
B. It is effective at redirecting vehicular traffic from entering restricted areas.
C. It consists of short, vertical steel or concrete posts designed for small-scale protection.
D. It uses robust dynamic protocols to detect intruders.

A

Answer:
A. It provides a highly visible boundary to deter unauthorized personnel and delays intruders.

Explanation:

Correct Answer: Fencing is both a visual and physical barrier, defining boundaries and delaying intruders to allow security personnel more time to respond.
Incorrect Options:
B: Redirecting vehicular traffic is the role of bollards.
C: This describes bollards, not fencing.
D: Dynamic protocols are unrelated to physical fencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Brute Force Attack in the context of physical or cybersecurity?

A. An attack that uses social engineering to trick users into revealing credentials.
B. A systematic attempt to gain unauthorized access by trying all possibilities until successful.
C. Manipulating network devices to create vulnerabilities.
D. Direct confrontation with security personnel to gain unauthorized access.

A

Answer:
B. A systematic attempt to gain unauthorized access by trying all possibilities until successful.

Explanation:

Correct Answer: Brute force attacks involve systematically trying all possible combinations until the correct one is found.
Incorrect Options:
A: Social engineering involves manipulation, not brute force.
C: This is related to tampering with devices, not brute force.
D: Confronting security personnel is a specific physical brute force tactic, not the general definition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes Forcible Entry in physical security?

A. Gaining unauthorized access by using social engineering techniques.
B. Breaking or bypassing physical barriers like doors or windows.
C. Tampering with firewalls to create vulnerabilities.
D. Driving a vehicle into security barriers to gain access.

A

Answer:
B. Breaking or bypassing physical barriers like doors or windows.

Explanation:

Correct Answer: Forcible entry involves physically breaching or bypassing barriers such as doors, windows, or fences.
Incorrect Options:
A: Social engineering is unrelated to physical forcible entry.
C: Tampering with firewalls relates to cybersecurity, not physical entry.
D: Ramming barriers with vehicles is a separate brute force tactic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can organizations mitigate the risk of Tampering with Security Devices?

A. By training security personnel in conflict resolution and self-defense.
B. By installing high-strength doors with deadbolt locks.
C. By implementing redundancy in physical security measures.
D. By placing bollards to prevent vehicular ramming.

A

Answer:
C. By implementing redundancy in physical security measures.

Explanation:

Correct Answer: Redundancy ensures multiple layers of security, reducing the impact of tampering with a single device.
Incorrect Options:
A: This addresses confronting security personnel, not device tampering.
B: This helps mitigate forcible entry, not device tampering.
D: Bollards prevent vehicular attacks, not device tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Ramming Barriers with Vehicles, and how can it be countered?

A. To confuse security personnel; counter with redundancy in security measures.
B. To bypass physical barriers; counter with high-strength doors.
C. To breach security barriers like gates or fences; counter with bollards or reinforced barriers.
D. To disable security devices; counter with dynamic page generation.

A

Answer:
C. To breach security barriers like gates or fences; counter with bollards or reinforced barriers.

Explanation:

Correct Answer: Ramming barriers is a brute force tactic using vehicles to break through physical barriers. Bollards or reinforced barriers are effective countermeasures.
Incorrect Options:
A: This involves confusing personnel, not physical ramming.
B: High-strength doors are for preventing forcible entry, not vehicle attacks.
D: Dynamic page generation is unrelated to physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it important for security personnel to undergo Conflict Resolution and Self-Defense Training?

A. To handle tampering with security devices effectively.
B. To protect against direct confrontation or attacks by intruders.
C. To install high-strength doors and bollards effectively.
D. To mitigate risks from vehicle ramming attacks.

A

Answer:
B. To protect against direct confrontation or attacks by intruders.

Explanation:

Correct Answer: Confronting security personnel is a physical brute force tactic, and training prepares them to de-escalate or defend against such threats.
Incorrect Options:
A: Tampering with devices does not involve confronting personnel.
C: Installing physical security measures does not require personnel training.
D: Vehicle ramming attacks are countered with physical barriers, not personnel training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following best describes a Surveillance System?

A. A collection of devices used exclusively for video recording.
B. A setup designed to detect and respond to cybersecurity threats.
C. An organized strategy to observe and report activities in a given area.
D. A wireless camera network that transmits data over Wi-Fi.

A

Answer:
C. An organized strategy to observe and report activities in a given area.

Explanation:

Correct Answer: Surveillance systems are designed to monitor and report activities for safety and security.
Incorrect Options:
A: Surveillance systems include more than just video recording devices.
B: This describes cybersecurity monitoring, not physical surveillance.
D: Wireless cameras are part of video surveillance but not the complete system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which features are included in Video Surveillance systems? (Choose Three)

A. Night vision
B. Intrusion alarms
C. Motion detection
D. Facial recognition

A

Answer:
A. Night vision
C. Motion detection
D. Facial recognition

Explanation:

Correct Answers: These are core features of video surveillance systems that enhance monitoring capabilities.
Incorrect Option:
B: Intrusion alarms are part of security systems, not specifically video surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main categories of surveillance systems? (Choose Two)

A. Video Surveillance
B. Lighting
C. Intrusion Detection Systems
D. Security Guards

A

Answer:
A. Video Surveillance
D. Security Guards

Explanation:

Correct Answers: Video surveillance and security guards are key components of a surveillance system.
Incorrect Options:
B: Lighting supports surveillance but is not a standalone category.
C: Intrusion detection systems are not part of the four main surveillance categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are the best places to install security cameras?

A. Parking lots and common areas
B. Data centers and telecommunications closets
C. Public parks and streets
D. Office desks and break rooms

A

Answer:
B. Data centers and telecommunications closets

Explanation:

Correct Answer: Cameras should monitor sensitive areas like data centers, telecom closets, and entrances/exits.
Incorrect Options:
A: While parking lots may benefit from surveillance, they are not listed in this context.
C: Public parks and streets fall under municipal surveillance, not internal security.
D: Office desks and break rooms are typically low-priority for security cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a benefit of security guards in surveillance systems?

A. They can replace sensors and video surveillance.
B. They provide a reassuring presence for staff and customers.
C. They automatically respond to environmental changes.
D. They are most effective when placed in unlit areas.

A

Answer:
B. They provide a reassuring presence for staff and customers.

Explanation:

Correct Answer: Security guards reassure people and provide a flexible, adaptable layer of surveillance.
Incorrect Options:
A: Guards complement rather than replace other surveillance methods.
C: Environmental change detection is the role of sensors.
D: Well-lit areas enhance a guard’s effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which types of sensors are used in surveillance systems? (Choose Two)

A. Pressure Sensors
B. Ultrasonic Sensors
C. Motion Alarms
D. Biometric Scanners

A

Answer:
A. Pressure Sensors
B. Ultrasonic Sensors

Explanation:

Correct Answers: Pressure sensors detect weight, while ultrasonic sensors measure wave reflections from moving objects.
Incorrect Options:
C: Motion alarms are part of broader security systems, not standalone sensors.
D: Biometric scanners are access control devices, not surveillance sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the role of lighting in a surveillance system?

A. To detect motion and warm bodies in the monitored area.
B. To reduce shadows, deter criminals, and enhance video quality.
C. To replace the need for infrared sensors and microwave detectors.
D. To provide emergency power for surveillance devices.

A

Answer:
B. To reduce shadows, deter criminals, and enhance video quality.

Explanation:

Correct Answer: Proper lighting supports surveillance by improving visibility and deterring unauthorized activity.
Incorrect Options:
A: Motion and warm body detection are handled by sensors, not lighting.
C: Lighting complements, not replaces, other surveillance components.
D: Emergency power is unrelated to lighting’s surveillance function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which sensor type detects movement using microwave pulses?

A. Infrared Sensors
B. Ultrasonic Sensors
C. Microwave Sensors
D. Pressure Sensors

A

Answer:
C. Microwave Sensors

Explanation:

Correct Answer: Microwave sensors detect movement by emitting pulses and measuring their reflection.
Incorrect Options:
A: Infrared sensors detect heat emitted by warm bodies.
B: Ultrasonic sensors use sound waves, not microwaves.
D: Pressure sensors detect weight, not motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why should cameras in a surveillance system be configured to record their observations?

A. To allow real-time alerts without saving any footage.
B. To enhance lighting conditions in the monitored area.
C. To provide evidence for investigations and audits.
D. To enable guards to monitor multiple areas simultaneously.

A

Answer:
C. To provide evidence for investigations and audits.

Explanation:

Correct Answer: Recording ensures there is a log of activities for review, investigations, or legal purposes.
Incorrect Options:
A: Recording stores footage, while real-time alerts serve immediate responses.
B: Lighting improves video clarity but doesn’t relate to recording.
D: Guards use live monitoring rather than relying solely on recordings.

20
Q

Which of the following describes Visual Obstruction as a method to bypass surveillance systems?

A. Blocking the camera’s view using objects or substances.
B. Overwhelming the camera with electromagnetic interference.
C. Disrupting the microphone with loud noises.
D. Physically disabling the surveillance device by cutting its wires.

A

Answer:
A. Blocking the camera’s view using objects or substances.

Explanation:

Correct Answer: Visual obstruction involves blocking the camera’s line of sight using paint, stickers, or objects like umbrellas.
Incorrect Options:
B: This refers to electromagnetic interference, not visual obstruction.
C: This describes interfering with acoustics, not the camera’s view.
D: Cutting wires falls under physical tampering, not visual obstruction.

21
Q

Which of the following are examples of Blinding Sensors and Cameras? (Choose Two)

A. Spraying paint onto the camera lens.
B. Using a sudden burst of light to overwhelm the sensor.
C. Playing loud music to disrupt the microphone.
D. Shining a laser pointer directly into the camera lens.

A

Answer:
B. Using a sudden burst of light to overwhelm the sensor.
D. Shining a laser pointer directly into the camera lens.

Explanation:

Correct Answers: Both methods involve overloading the camera or sensor with light, rendering it temporarily ineffective.
Incorrect Options:
A: Spraying paint is visual obstruction, not blinding.
C: Loud music disrupts microphones, not sensors or cameras.

22
Q

How can attackers interfere with acoustic surveillance systems?

A. Overloading the system with electromagnetic interference.
B. Spraying foam onto the microphone.
C. Playing loud music to disrupt the microphone’s functionality.
D. Blocking the microphone’s view with an object.

A

Answer:
C. Playing loud music to disrupt the microphone’s functionality.

Explanation:

Correct Answer: Loud music disrupts acoustic systems designed to detect sounds or conversations.
Incorrect Options:
A: Electromagnetic interference affects signals, not acoustic systems.
B: Spraying foam targets visual systems, not microphones.
D: Microphones do not have a “view” to block.

23
Q

What is Electromagnetic Interference (EMI) in the context of bypassing surveillance systems?

A. Blocking the camera’s line of sight with physical objects.
B. Jamming the signals used by surveillance systems to monitor environments.
C. Disrupting acoustic systems with noise interference.
D. Using sudden light bursts to blind cameras or sensors.

A

Answer:
B. Jamming the signals used by surveillance systems to monitor environments.

Explanation:

Correct Answer: EMI involves jamming the electromagnetic signals that surveillance systems rely on, causing disruption.
Incorrect Options:
A: This describes visual obstruction.
C: Noise interference affects acoustic systems, not electromagnetic signals.
D: Light bursts affect cameras and sensors but are unrelated to EMI.

24
Q

Which of the following are examples of physical tampering to bypass surveillance systems? (Choose Three)

A. Cutting wires.
B. Spraying paint onto the camera lens.
C. Physically disabling the surveillance device.
D. Blocking the camera with a balloon.

A

Answer:
A. Cutting wires.
B. Spraying paint onto the camera lens.
C. Physically disabling the surveillance device.

Explanation:

Correct Answers: Physical tampering includes actions like cutting wires, disabling devices, or obstructing functionality directly.
Incorrect Option:
D: Blocking a camera with an object falls under visual obstruction, not physical tampering.

25
Q

How do modern surveillance systems counter physical tampering attempts?

A. By automatically jamming interfering signals.
B. By equipping cameras with tamper detection mechanisms.
C. By blinding attackers with sudden bursts of light.
D. By embedding microphones that resist loud noises.

A

Answer:
B. By equipping cameras with tamper detection mechanisms.

Explanation:

Correct Answer: Modern systems include countermeasures such as tamper alarms or notifications when physical tampering is detected.
Incorrect Options:
A: Jamming is an attack, not a countermeasure.
C: Light bursts are used to blind cameras, not as a defense mechanism.
D: Resistance to loud noises is not a standard feature of surveillance systems.

26
Q

What is the primary goal of attacking the physical environment to bypass surveillance systems?

A. Overloading sensors with environmental noise.
B. Exploiting the environment to compromise surveillance functionality.
C. Disrupting electromagnetic signals used for communication.
D. Blinding cameras with sudden bursts of light.

A

Answer:
B. Exploiting the environment to compromise surveillance functionality.

Explanation:

Correct Answer: The primary goal is to exploit the environment to disable or disrupt the surveillance system. For example, an attacker might manipulate the lighting or layout of a room to create blind spots in the camera’s coverage area or introduce interference that impacts sensor readings. By exploiting the environment, the attacker bypasses or neutralizes the surveillance without directly attacking the technology itself.

Incorrect Options:

A: Overloading sensors can be a method (like using noise to disturb audio sensors), but it’s a specific technique rather than the broader goal of bypassing the system.
C: Disrupting electromagnetic signals is more relevant to communication interference (such as jamming), not necessarily bypassing surveillance.
D: Blinding cameras with light is a specific attack method but doesn’t address the overall goal of compromising the surveillance functionality through environmental manipulation.

27
Q

Which of the following methods are effective in countering surveillance system bypassing attempts? (Choose Two)

A. Redundancy in physical surveillance systems.
B. Using wireless cameras to avoid cable tampering.
C. Equipping devices with tamper-detection mechanisms.
D. Installing soundproof barriers to block noise interference.

A

Answer:
A. Redundancy in physical surveillance systems.
C. Equipping devices with tamper-detection mechanisms.

Explanation:

Correct Answers: Redundancy ensures continued functionality, and tamper-detection mechanisms alert administrators to tampering.
Incorrect Options:
B: Wireless cameras can still be disrupted through EMI.
D: Soundproof barriers are impractical for large surveillance areas.

28
Q

What is the primary purpose of an Access Control Vestibule?

A. To allow multiple people to enter a secure area simultaneously.
B. To ensure only one door can be open at a time, preventing unauthorized access.
C. To store RFID and NFC badges for authorized personnel.
D. To provide a waiting area for visitors.

A

Answer:
B. To ensure only one door can be open at a time, preventing unauthorized access.

Explanation:

Correct Answer: Access control vestibules are designed as a double-door system to enhance security by allowing only one door to be open at a time.
Incorrect Options:
A: The vestibule prevents multiple people from entering simultaneously.
C: Badges are used for access, but they are not stored in the vestibule.
D: The vestibule is not intended as a waiting area.

29
Q

Which of the following are methods by which Access Control Vestibules prevent unauthorized access? (Choose Two)

A. Preventing tailgating through controlled entry.
B. Storing biometric data for identity verification.
C. Requiring electronic badges for door operation.
D. Allowing multiple doors to be open simultaneously for faster access.

A

Answer:
A. Preventing tailgating through controlled entry.
C. Requiring electronic badges for door operation.

Explanation:

Correct Answers: The vestibule prevents tailgating by ensuring controlled, single-person entry and uses electronic badges for access.
Incorrect Options:
B: Biometric data may be used in some systems but is not a core feature of all vestibules.
D: Allowing multiple doors to open simultaneously would compromise security.

30
Q

What is the main difference between Piggybacking and Tailgating?

A. Piggybacking requires consent, while tailgating does not.
B. Tailgating uses social engineering, while piggybacking does not.
C. Tailgating occurs in non-secure areas, while piggybacking occurs in secure areas.
D. Piggybacking involves RFID badges, while tailgating involves magnetic strips.

A

Answer:
A. Piggybacking requires consent, while tailgating does not.

Explanation:

Correct Answer: Piggybacking involves obtaining the consent of the person with legitimate access, while tailgating occurs without their knowledge or consent.
Incorrect Options:
B: Social engineering is used in piggybacking, not tailgating.
C: Both occur in secure areas.
D: Neither term directly relates to RFID or magnetic strips.

31
Q

What features are commonly found on electronic badges used in Access Control Vestibules? (Choose Three)

A. RFID (Radio-Frequency Identification)
B. Facial recognition scanners
C. NFC (Near-field Communication)
D. Magnetic strips

A

Answer:
A. RFID (Radio-Frequency Identification)
C. NFC (Near-field Communication)
D. Magnetic strips

Explanation:

Correct Answers: These are the common technologies used in electronic badges for access control.
Incorrect Option:
B: Facial recognition is not part of the badge itself; it may be used as a separate biometric system.

32
Q

What is the role of security guards in Access Control Vestibules?

A. To operate the vestibule and monitor badge issuance.
B. To visually deter unauthorized access and provide assistance.
C. To install RFID readers and maintain vestibule equipment.
D. To ensure both doors in the vestibule remain open for emergencies.

A

Answer:
B. To visually deter unauthorized access and provide assistance.

Explanation:

Correct Answer: Security guards serve as a visual deterrent, assist with identity verification, and respond to security issues.
Incorrect Options:
A: Security guards do not manage badge issuance.
C: Equipment maintenance is not typically their responsibility.
D: Both doors remaining open would defeat the vestibule’s purpose.

33
Q

Which of the following scenarios describes Piggybacking?

A. An unauthorized individual closely follows someone into a secure area without their consent.
B. Two individuals collaborate, and one with access allows the other unauthorized person to enter.
C. An attacker disables the vestibule’s RFID reader to gain access.
D. A security guard accidentally leaves both doors in the vestibule open.

A

Answer:
B. Two individuals collaborate, and one with access allows the other unauthorized person to enter.

Explanation:

Correct Answer: Piggybacking involves consent from the authorized individual, who knowingly allows the other person to enter.
Incorrect Options:
A: This describes tailgating.
C: Disabling an RFID reader is a different type of security breach.
D: Leaving both doors open compromises the system but is unrelated to piggybacking.

34
Q

What measures can organizations implement to prevent Tailgating in Access Control Vestibules? (Choose Two)

A. Increase the number of doors to reduce congestion.
B. Require security guards to escort all individuals.
C. Use anti-passback systems with electronic badges.
D. Train employees to report suspicious behavior and avoid unauthorized entry.

A

Answer:
C. Use anti-passback systems with electronic badges.
D. Train employees to report suspicious behavior and avoid unauthorized entry.

Explanation:

Correct Answers: Anti-passback systems prevent repeated use of the same badge, and employee awareness can reduce tailgating incidents.
Incorrect Options:
A: Adding doors does not directly address tailgating.
B: Escorting everyone is impractical and inefficient for large organizations.

35
Q

Which of the following door lock types provides enhanced security through modern authentication methods?

A. Traditional Padlocks
B. Basic Door Locks
C. Modern Electronic Door Locks
D. Cipher Locks

A

Answer:
C. Modern Electronic Door Locks

Explanation:

Correct Answer: Modern Electronic Door Locks utilize advanced authentication methods like biometrics, wireless signals, or identification numbers for improved security.
Incorrect Options:
A: Traditional Padlocks are easily defeated and offer minimal protection.
B: Basic Door Locks are vulnerable to lock-picking techniques.
D: Cipher Locks are mechanical and use push-button combinations but are not as advanced as electronic locks.

36
Q

(Choose Two):
Which of the following are common challenges associated with biometric authentication?

A. Increased False Rejection Rate (FRR)
B. Enhanced ease of use
C. False Acceptance Rate (FAR)
D. Elimination of the need for sensitivity adjustments

A

Answer:
A. Increased False Rejection Rate (FRR)
C. False Acceptance Rate (FAR)

Explanation:

Correct Answers:
A: False Rejection Rate (FRR) occurs when an authorized user is mistakenly denied access, often caused by increased scanner sensitivity.
C: False Acceptance Rate (FAR) happens when an unauthorized user is erroneously authenticated, which decreases as sensitivity improves.
Incorrect Options:
B: Ease of use is a general benefit of biometrics, not a challenge.
D: Sensitivity adjustments are critical in managing FAR and FRR but are not eliminated.

37
Q

Which of the following describes the purpose of door locks in physical security?

A. To improve building aesthetics
B. To restrict and regulate access to spaces or properties
C. To facilitate entry for all individuals
D. To enhance lighting in secure areas

A

Answer:
B. To restrict and regulate access to spaces or properties

Explanation:

Correct Answer: Door locks serve as a critical security measure to control access, safeguard sensitive data, and prevent unauthorized entry.
Incorrect Options:
A, C, and D: These do not align with the primary purpose of door locks in physical security.

38
Q

(Choose Three):
Which of the following are common authentication methods used by modern electronic door locks?

A. Identification Numbers
B. Wireless Signals
C. Retinal Scans
D. Biometrics

A

Answer:
A. Identification Numbers
B. Wireless Signals
D. Biometrics

Explanation:

Correct Answers:
A: Identification Numbers require a unique code for entry.
B: Wireless Signals use technologies like NFC, Wi-Fi, Bluetooth, or RFID for unlocking.
D: Biometrics rely on physical characteristics such as fingerprints or facial recognition.
Incorrect Option:
C: Retinal Scans are a type of biometric, but the broader category (Biometrics) already covers this.

39
Q

What is the main purpose of a Cipher Lock?

A. To allow remote access through wireless signals
B. To open with a key for high convenience
C. To secure areas using a numbered push-button combination
D. To authenticate users through facial recognition

A

Answer:
C. To secure areas using a numbered push-button combination

Explanation:

Correct Answer: Cipher Locks use a mechanical system with numbered buttons, commonly for high-security areas like server rooms.
Incorrect Options:
A: Remote access is associated with modern electronic locks.
B: Cipher Locks do not rely on keys for entry.
D: Facial recognition is part of biometric authentication, not Cipher Locks.

40
Q

Which of the following statements accurately describes the Crossover Error Rate (CER) in biometric authentication?

A. CER represents the balance between the False Acceptance Rate (FAR) and the False Rejection Rate (FRR).
B. CER is used to determine the optimal authentication system by lowering FAR and increasing FRR.
C. CER is a measure of how often an unauthorized user is accepted.
D. CER is the rate at which an authorized user is rejected by the system.

A

Answer:
A. CER represents the balance between the False Acceptance Rate (FAR) and the False Rejection Rate (FRR).

Explanation:

Correct Answer: The Crossover Error Rate (CER) is the point where the FAR and FRR are equal. It indicates the optimal balance between the two for effective authentication.
Incorrect Options:
B: The goal is to find a balance between FAR and FRR, not to lower FAR while increasing FRR.
C: This describes FAR, not CER.
D: This describes FRR, not CER.

41
Q

What is the process of access badge cloning?

A. Scanning, Data Extraction, Writing to a new device, and Using the cloned badge
B. Scanning, Data Rejection, Writing to a new device, and Using the cloned badge
C. Identifying the card holder, Extracting data, Rewriting the data, and Using the card
D. Scanning, Data Extraction, Writing to a new card, and Selling the cloned badge

A

Answer:
A. Scanning, Data Extraction, Writing to a new device, and Using the cloned badge

Explanation:

Correct Answer: Access badge cloning involves scanning the targeted badge, extracting the authentication data, writing it to a new card or device, and using it for unauthorized access.
Incorrect Options:
B: Incorrect process flow.
C: The steps are incorrect for access badge cloning.
D: Selling is not part of the process described.

42
Q

(Choose Two):
Which of the following are technologies used for contactless authentication?

A. Radio Frequency Identification (RFID)
B. Near Field Communication (NFC)
C. Multi-Factor Authentication (MFA)
D. Smart Cards (SC)

A

Answer:
A. Radio Frequency Identification (RFID)
B. Near Field Communication (NFC)

Explanation:

Correct Answers:
A: RFID is widely used for access control and contactless authentication.
B: NFC is another technology for short-range, contactless communication often used in access badges.
Incorrect Option:
C: MFA (Multi-Factor Authentication) is a security method, not a contactless technology.
D: Smart Cards (SC) refer to cards that may use a variety of technologies, including RFID, but are not a specific contactless authentication technology like RFID and NFC.

43
Q

What is a recommended strategy to prevent access badge cloning?

A. Regularly update your security protocols
B. Disable RFID technology in all cards
C. Educate users on password management
D. Require physical presence to access systems

A

Answer:
A. Regularly update your security protocols

Explanation:

Correct Answer: Regularly updating security protocols ensures that the latest protections are in place to guard against cloning attacks.
Incorrect Options:
B: Disabling RFID might limit the convenience of access systems.
C: While password management is essential, it does not directly address RFID or NFC cloning.
D: This is a broader solution but doesn’t target badge cloning specifically.

44
Q

(Choose Three):
Which of the following are steps involved in the badge cloning process?

A. Scanning the access badge
B. Extracting encrypted data from the badge
C. Writing data to a device that is incompatible
D. Using the cloned badge for unauthorized access
E. Creating a new password for the badge holder

A

Answer:
A. Scanning the access badge
B. Extracting encrypted data from the badge
D. Using the cloned badge for unauthorized access

Explanation:

Correct Answers:
A: Scanning or reading the badge is the first step in cloning.
B: Data Extraction allows attackers to obtain necessary credentials.
D: After cloning, attackers use the badge for unauthorized access.
Incorrect Options:
C: The process involves writing to a compatible device, not an incompatible one.
E: Password creation is not part of badge cloning.

45
Q

What does MFA (Multi-Factor Authentication) help to prevent?

A. Unauthorized access through a cloned badge
B. Increased speed of access
C. Errors in badge reading
D. Unauthorized access through a password alone

A

Answer:
A. Unauthorized access through a cloned badge

Explanation:

Correct Answer: MFA adds an extra layer of security to prevent unauthorized access, even if a badge is cloned.
Incorrect Options:
B: MFA may not necessarily increase speed, but it enhances security.
C: MFA does not directly address badge reading errors.
D: MFA specifically aims to prevent access by relying on more than one factor (e.g., something you know and something you have).