Physical Security( Comptia Objective 2.1) Flashcards

1
Q

What security method has an area where both doors will be unlocked until the first door is opened and then the second one locks. Also allows only one person through at a time?

A
  • Man trap
  • One at a time controlled groups
  • All doors normally unlocked( opening one door causes others to lock)
  • All doors normally locked( unlocking one door prevents others from being unlocked)
  • Key is one door open/ other locked( when one is open the other can’t be unlocked.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of Door access controls?

A
  • Conventional ( Lock and key)
  • Deadbolt( Physical bolt)
  • Electronic( Keyless pin required)
  • Token based( RFID badge, magnetic swipe card or key fob)
  • Biometric( Hand print, finger print or retina scan required to unlock the door)
  • Multi factor( smart card and pin required etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Smart cards work?

A
  • Integrates with devices, may require a pin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do USB tokens work?

A
  • Certificate is on the USB device usb device will then have to be inserted into the slot to gain access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do Hardware or Software tokens work?

A
  • Physical token itself or Software Generates pseudo-random authentication codes often displayed on the token itself after generating it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of Guards and Access lists as a form of security?

A
  • an example of a guard would be a physical Security guard( Physical protection) validates indentification of existing employees.
  • Provides guest access.
  • ID badge( showing picture, name, other details) must be worn at all times.
  • Access list is a physical list of names enforced by a security guard.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When it comes to Security what are biometrics?

A
  • Biometric authentication
  • This is a fingerprint, retina, voiceprint etc.
  • Your actual fingerprint isn’t usually saved.
  • Due to the nature of biometrics its usually very difficult to change. ( You can change your password you can’t change your fingerprint)
  • Used in very specific situations( Not foolproof)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a physical security method used to lock a laptop or other mobile system?

A
  • Cable locks( Temporary security) connect your hardware to something solid
  • Cable works almost anywhere( Useful when mobile)
  • Most devices have a standard connector w/ a reinforced notch.
  • Not designed for long-term protection( those cables are pretty thin)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is commonly used in data centers to prevent unauthorized access to data center hardware?

A
  • Locking cabinets
  • Data center hardware is often managed by different groups of people. Responsibility lies with the owner.
  • Data center racks can be installed together( Side to side)
  • You will usually find enclosed cabinets with locks and ventilation on front, back, top and bottom.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is commonly used to prevent access to a USB port?

A
  • USB locks. Prevents access to a USB port. Physical lock inside of the interface.
  • A Secondary security option after disabling the interface in BIOS and or OS. There’s always a way around security controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does defense in depth mean?

A
  • It means by combining several different types of security methods together we can make hardware and data more secure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be used to prevent people around you viewing what is on your laptop screen?

A
  • Privacy Filters
  • Control your input( Be aware of your surroundings)
  • Privacy filters restrict the viewing angle of seeing a screen to dead center so anyone beside you won’t be able to view what’s being displayed on your screen.
  • It’s amazing how they work.
  • As an extra measure it’s always a good idea to keep your monitor out of sight and away from windows and hallways.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly