Physical Security Flashcards
1.2 - Summarize fundamental security concepts 2.4 - Analyze indicators of malicious activity
What is the primary purpose of Physical Security?
A. To implement software measures that prevent data breaches.
B. To protect tangible assets, such as buildings, equipment, and people, from harm or unauthorized access.
C. To monitor network traffic and prevent cyberattacks.
D. To create fake decoy files and networks to confuse attackers.
Answer:
B. To protect tangible assets, such as buildings, equipment, and people, from harm or unauthorized access.
Explanation:
Correct Answer: Physical security involves measures that safeguard physical assets, including infrastructure and personnel.
Incorrect Options:
A: This describes cybersecurity, not physical security.
C: Network traffic monitoring is related to IT security.
D: Decoy files and networks are part of deception technologies, not physical security.
What is the main function of Fencing in physical security?
A. To redirect or block vehicular traffic in specific areas.
B. To enclose an area with interconnected panels or posts, establishing a physical and visual barrier.
C. To protect personnel through the use of dynamic page generation.
D. To create decoy directories to confuse attackers.
Answer:
B. To enclose an area with interconnected panels or posts, establishing a physical and visual barrier.
Explanation:
Correct Answer: Fences serve as both a physical barrier and a visual deterrent to unauthorized entry.
Incorrect Options:
A: Redirecting vehicular traffic is the role of bollards.
C: Dynamic page generation is not related to physical security.
D: Decoy directories are digital deception strategies.
How do Bollards contribute to physical security?
A. By preventing unauthorized personnel from entering large perimeters.
B. By enclosing an area with panels or posts to delay intruders.
C. By managing or redirecting vehicular traffic to counter vehicular threats.
D. By using software tools to track unauthorized vehicles.
Answer:
C. By managing or redirecting vehicular traffic to counter vehicular threats.
Explanation:
Correct Answer: Bollards are robust posts designed to prevent vehicles from accessing restricted areas, offering protection against vehicular threats.
Incorrect Options:
A: Bollards do not protect large perimeters; fencing does.
B: Bollards do not enclose areas; fences serve that purpose.
D: Bollards are physical structures, not software tools.
What is a key difference between Fencing and Bollards in terms of their physical security applications?
A. Fencing is more suited for countering vehicular threats, while bollards safeguard large perimeters.
B. Fencing encloses large perimeters, while bollards are designed to counter vehicular threats in specific areas.
C. Fencing is primarily used to manage vehicular traffic, while bollards delay intruders.
D. Fencing and bollards serve identical purposes but differ in materials used.
Answer:
B. Fencing encloses large perimeters, while bollards are designed to counter vehicular threats in specific areas.
Explanation:
Correct Answer: Fencing provides adaptable protection for large perimeters, while bollards are specialized for addressing vehicular threats.
Incorrect Options:
A: Bollards address vehicular threats, not large perimeters.
C: Fencing does not manage vehicular traffic; bollards do.
D: Fencing and bollards have distinct purposes, not identical ones.
Why is Fencing considered a key element of physical security?
A. It provides a highly visible boundary to deter unauthorized personnel and delays intruders.
B. It is effective at redirecting vehicular traffic from entering restricted areas.
C. It consists of short, vertical steel or concrete posts designed for small-scale protection.
D. It uses robust dynamic protocols to detect intruders.
Answer:
A. It provides a highly visible boundary to deter unauthorized personnel and delays intruders.
Explanation:
Correct Answer: Fencing is both a visual and physical barrier, defining boundaries and delaying intruders to allow security personnel more time to respond.
Incorrect Options:
B: Redirecting vehicular traffic is the role of bollards.
C: This describes bollards, not fencing.
D: Dynamic protocols are unrelated to physical fencing.
What is a Brute Force Attack in the context of physical or cybersecurity?
A. An attack that uses social engineering to trick users into revealing credentials.
B. A systematic attempt to gain unauthorized access by trying all possibilities until successful.
C. Manipulating network devices to create vulnerabilities.
D. Direct confrontation with security personnel to gain unauthorized access.
Answer:
B. A systematic attempt to gain unauthorized access by trying all possibilities until successful.
Explanation:
Correct Answer: Brute force attacks involve systematically trying all possible combinations until the correct one is found.
Incorrect Options:
A: Social engineering involves manipulation, not brute force.
C: This is related to tampering with devices, not brute force.
D: Confronting security personnel is a specific physical brute force tactic, not the general definition.
Which of the following describes Forcible Entry in physical security?
A. Gaining unauthorized access by using social engineering techniques.
B. Breaking or bypassing physical barriers like doors or windows.
C. Tampering with firewalls to create vulnerabilities.
D. Driving a vehicle into security barriers to gain access.
Answer:
B. Breaking or bypassing physical barriers like doors or windows.
Explanation:
Correct Answer: Forcible entry involves physically breaching or bypassing barriers such as doors, windows, or fences.
Incorrect Options:
A: Social engineering is unrelated to physical forcible entry.
C: Tampering with firewalls relates to cybersecurity, not physical entry.
D: Ramming barriers with vehicles is a separate brute force tactic.
How can organizations mitigate the risk of Tampering with Security Devices?
A. By training security personnel in conflict resolution and self-defense.
B. By installing high-strength doors with deadbolt locks.
C. By implementing redundancy in physical security measures.
D. By placing bollards to prevent vehicular ramming.
Answer:
C. By implementing redundancy in physical security measures.
Explanation:
Correct Answer: Redundancy ensures multiple layers of security, reducing the impact of tampering with a single device.
Incorrect Options:
A: This addresses confronting security personnel, not device tampering.
B: This helps mitigate forcible entry, not device tampering.
D: Bollards prevent vehicular attacks, not device tampering.
What is the purpose of Ramming Barriers with Vehicles, and how can it be countered?
A. To confuse security personnel; counter with redundancy in security measures.
B. To bypass physical barriers; counter with high-strength doors.
C. To breach security barriers like gates or fences; counter with bollards or reinforced barriers.
D. To disable security devices; counter with dynamic page generation.
Answer:
C. To breach security barriers like gates or fences; counter with bollards or reinforced barriers.
Explanation:
Correct Answer: Ramming barriers is a brute force tactic using vehicles to break through physical barriers. Bollards or reinforced barriers are effective countermeasures.
Incorrect Options:
A: This involves confusing personnel, not physical ramming.
B: High-strength doors are for preventing forcible entry, not vehicle attacks.
D: Dynamic page generation is unrelated to physical security.
Why is it important for security personnel to undergo Conflict Resolution and Self-Defense Training?
A. To handle tampering with security devices effectively.
B. To protect against direct confrontation or attacks by intruders.
C. To install high-strength doors and bollards effectively.
D. To mitigate risks from vehicle ramming attacks.
Answer:
B. To protect against direct confrontation or attacks by intruders.
Explanation:
Correct Answer: Confronting security personnel is a physical brute force tactic, and training prepares them to de-escalate or defend against such threats.
Incorrect Options:
A: Tampering with devices does not involve confronting personnel.
C: Installing physical security measures does not require personnel training.
D: Vehicle ramming attacks are countered with physical barriers, not personnel training.
Which of the following best describes a Surveillance System?
A. A collection of devices used exclusively for video recording.
B. A setup designed to detect and respond to cybersecurity threats.
C. An organized strategy to observe and report activities in a given area.
D. A wireless camera network that transmits data over Wi-Fi.
Answer:
C. An organized strategy to observe and report activities in a given area.
Explanation:
Correct Answer: Surveillance systems are designed to monitor and report activities for safety and security.
Incorrect Options:
A: Surveillance systems include more than just video recording devices.
B: This describes cybersecurity monitoring, not physical surveillance.
D: Wireless cameras are part of video surveillance but not the complete system.
Which features are included in Video Surveillance systems? (Choose Three)
A. Night vision
B. Intrusion alarms
C. Motion detection
D. Facial recognition
Answer:
A. Night vision
C. Motion detection
D. Facial recognition
Explanation:
Correct Answers: These are core features of video surveillance systems that enhance monitoring capabilities.
Incorrect Option:
B: Intrusion alarms are part of security systems, not specifically video surveillance.
What are the main categories of surveillance systems? (Choose Two)
A. Video Surveillance
B. Lighting
C. Intrusion Detection Systems
D. Security Guards
Answer:
A. Video Surveillance
D. Security Guards
Explanation:
Correct Answers: Video surveillance and security guards are key components of a surveillance system.
Incorrect Options:
B: Lighting supports surveillance but is not a standalone category.
C: Intrusion detection systems are not part of the four main surveillance categories.
Where are the best places to install security cameras?
A. Parking lots and common areas
B. Data centers and telecommunications closets
C. Public parks and streets
D. Office desks and break rooms
Answer:
B. Data centers and telecommunications closets
Explanation:
Correct Answer: Cameras should monitor sensitive areas like data centers, telecom closets, and entrances/exits.
Incorrect Options:
A: While parking lots may benefit from surveillance, they are not listed in this context.
C: Public parks and streets fall under municipal surveillance, not internal security.
D: Office desks and break rooms are typically low-priority for security cameras.
Which of the following is a benefit of security guards in surveillance systems?
A. They can replace sensors and video surveillance.
B. They provide a reassuring presence for staff and customers.
C. They automatically respond to environmental changes.
D. They are most effective when placed in unlit areas.
Answer:
B. They provide a reassuring presence for staff and customers.
Explanation:
Correct Answer: Security guards reassure people and provide a flexible, adaptable layer of surveillance.
Incorrect Options:
A: Guards complement rather than replace other surveillance methods.
C: Environmental change detection is the role of sensors.
D: Well-lit areas enhance a guard’s effectiveness.
Which types of sensors are used in surveillance systems? (Choose Two)
A. Pressure Sensors
B. Ultrasonic Sensors
C. Motion Alarms
D. Biometric Scanners
Answer:
A. Pressure Sensors
B. Ultrasonic Sensors
Explanation:
Correct Answers: Pressure sensors detect weight, while ultrasonic sensors measure wave reflections from moving objects.
Incorrect Options:
C: Motion alarms are part of broader security systems, not standalone sensors.
D: Biometric scanners are access control devices, not surveillance sensors.
What is the role of lighting in a surveillance system?
A. To detect motion and warm bodies in the monitored area.
B. To reduce shadows, deter criminals, and enhance video quality.
C. To replace the need for infrared sensors and microwave detectors.
D. To provide emergency power for surveillance devices.
Answer:
B. To reduce shadows, deter criminals, and enhance video quality.
Explanation:
Correct Answer: Proper lighting supports surveillance by improving visibility and deterring unauthorized activity.
Incorrect Options:
A: Motion and warm body detection are handled by sensors, not lighting.
C: Lighting complements, not replaces, other surveillance components.
D: Emergency power is unrelated to lighting’s surveillance function.
Which sensor type detects movement using microwave pulses?
A. Infrared Sensors
B. Ultrasonic Sensors
C. Microwave Sensors
D. Pressure Sensors
Answer:
C. Microwave Sensors
Explanation:
Correct Answer: Microwave sensors detect movement by emitting pulses and measuring their reflection.
Incorrect Options:
A: Infrared sensors detect heat emitted by warm bodies.
B: Ultrasonic sensors use sound waves, not microwaves.
D: Pressure sensors detect weight, not motion.