4.1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the primary benefit of CCTV?

A primary benefit of CCTV is that it expands the area visible by security guards. This helps few guards oversee and monitor a larger area. CCTV does not reduce the need for locks and sensors on doors. CCTV does not provide a corrective control (it is a preventative, deterrent, or detective control). CCTV does not increase security protection throughout an environment; it only does so over those environments where the CCTV is aimed.

You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?

500 resolution, 50mm, .05 LUX When you select cameras, be aware of the following characteristics: The resolution is rated in the number of lines included in the image. In general, the higher the resolution, the sharper the image. The focal length measures the magnification power of a lens. The focal length controls the distance that the camera can see, as well as how much detail can be seen at a specific range. A higher focal length lets you see more detail at a greater distance. LUX is a measure of the sensitivity to light. The lower the number, the less light is necessary for a clear image.

You want to use CCTV to increase your physical security. You want the ability to remotely control the camera position. Which camera type should you choose?

A Pan Tilt Zoom (PTZ) camera lets you dynamically move the camera and zoom in on specific areas (cameras without PTZ capabilities are set looking a specific direction). Automatic PTZ mode automatically moves the camera between several preset locations. Manual PTZ lets an operator remotely control the position of the camera. A bullet camera has a built-in lens and is long and round in shape. Most bullet cameras can be used indoors or outdoors. A c-mount camera has interchangeable lenses, is typically rectangle in shape, and carries the lens on its end. Most c-mount cameras require a special housing to be used outdoors. A dome camera is a camera protected with a plastic or glass dome. These cameras are more vandal-resistant than other cameras. Bullet, c-mount, or dome cameras can also be PTZ cameras.

Which of the following is not an example of a physical barrier access control mechanism?

A one-time password is a logical or technical access control mechanism, not a physical barrier access control mechanism. A biometric lock is an entryway security device that keeps a door or gate locked until an authorized individual provides a valid biometric, such as a hand scan. A mantrap is a small room with two doors. Authorized users must authenticate to enter the room and then further authenticate to exit the room into the secured environment. If the second authentication fails, the intruder is retained in the room until authorities respond. A fence is a perimeter protection device designed to deter intruders and define the boundary of protection employed by an organization.

Which of the following CCTV camera types lets you adjust the distance that the camera can see ( in other words, zoom in or out)?

A varifocal camera lens lets you adjust the focus (zoom). A fixed lens camera has a set focal length. Infrared cameras can record images in little or no light. A c-mount camera has interchangeable lenses, is typically rectangle in shape, and carries the lens on its end. You can change the focal length of a c-mount camera by changing the lens, but you can't change the focus unless the lens is a varifocal lens.

You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. You've hired a third-party security consultant to review your organization's security measures. She has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you provide employees with access badges and implement access badge readers to prevent this from happening in the future. Click on the office locations where access badge readers would be most appropriate.

Access badge readers are typically implemented at building entrances to control access to a facility. Only individuals who have an authorized access badge are allowed to enter the facility. Individuals who do not have an access badge must be cleared and admitted by security personnel. Additional access badge readers can be implemented within the facility to further restrict access to sensitive areas, such as the server room.

You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. You've hired a third-party security consultant to review your organization's security measures. She has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you implement mantraps to prevent this from happening in the future. Click on the office location where a mantrap would be most appropriate.

By implementing a mantrap at the lobby entrance, two doors must be unlocked in sequence for an individual to gain access to this facility. A mantrap allows both doors to lock, detaining a suspicious individual between doors.

Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smart cards to gain entry?

Deploy a mantrap Piggybacking is when an authorized or unauthorized individual gains entry into a secured area by exploiting the credentials of a prior person. Often, the first person will authenticate, unlock the door, and then hold it open for the next person to enter without forcing them to authenticate separately. Piggybacking can be stopped by a mantrap. A mantrap is a single-person room with two doors. It often includes a scale to prevent piggybacking. Mantraps requires proper authentication before the inner door unlocks to allow authorized personal into a secured area. Those who fail to properly authenticate are held captive until authorities respond. A security camera may deter piggybacking, but it does not directly stop piggybacking. Using weight scales inside a mantrap will stop piggybacking, but they are not useful or effective without the mantrap. The use of conventional keys as opposed to electronic locks has little effect on preventing piggybacking and may actually make piggybacking more prevalent.

You are about to enter your office building through a back entrance. A man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?

Direct him to the front entrance and instruct him to check in with the receptionist. You should direct him to the front entrance, where he can check in with the proper people at your organization. Letting him in without knowing if he should be there can compromise security. Turning him away would be unprofessional.

Which of the following controls is an example of a physical access control method?

Locks on doors are an example of a physical access control method. Physical controls restrict or control physical access. Passwords, access control lists, and smart cards are all examples of technical controls. Even though the smart card is a physical object, the card by itself is part of a technical implementation. Requiring background checks for hiring is an example of a policy or an administrative control.

Which of the following are solutions that address physical security? (Select two.)

Physical security controls physical access to the network or its components. Physical security controls include: Requiring identification or key cards before entry is permitted Escorting visitors at all times Keeping doors and windows locked Keeping devices with sensitive information out of view of public users Keeping the server room locked (locking computers to racks or tables to prevent theft)

Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two.)

Turnstile Double-entry door A double-entry door has two doors that are locked from the outside and have crash bars on the inside, which make it easy to exit. Double-entry doors are typically used only for emergency exits, and alarms sound when the doors are opened. A turnstile is a barrier that permits entry in only one direction. Turnstiles are often used to permit easy exit from a secure area. Entry is controlled through a mantrap or other system that requires authentication for entry. A mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas. Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided. This may include visual identification and identification credentials. An anti-passback system is used when a physical access token is required for entry and prevents a card holder from passing their card back to someone else. A Pan Tilt Zoom (PTZ) camera lets you dynamically move the camera and zoom in on specific areas.

Which option is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment while actively preventing re-entrance through the exit portal?

Turnstiles allow easy egress from a secured environment but actively prevent re-entrance through the exit portal. Turnstiles are a common exit portal used in conjunction with entrance portal mantraps. A turnstile cannot be used to enter into a secured facility, as it only functions in one direction. Egress mantraps are not easy egress portals. Plus, they are a tremendous unnecessary expense and administrative burden. Any form of door, including self-locking doors with push bars or credential readers, can be hijacked to allow an outsider to enter.

You are the security administrator for a small business. The floor plan for your organization is shown in the figure below. You've hired a third-party security consultant to review your organization's security measures. She has discovered multiple instances where unauthorized individuals have gained access to your facility, even to very sensitive areas. She recommends that you implement closed-circuit TV (CCTV) surveillance cameras to prevent this from happening in the future. Click on the office locations where surveillance cameras would be most appropriate.

Video surveillance cameras are typically implemented at building entrances to monitor access to a facility. If a security breach occurs, video recordings can be reviewed to identify the individual(s) involved. Additional video surveillance cameras can be implemented within the facility to further monitor access to sensitive areas, such as the server room.


Ensembles d'études connexes

AD Banker AL P&C CH 9 Commercial General Liability Coverage

View Set

Principles of Marketing Final Exam

View Set

Biology 12. Protein Synthesis Multiple Choice

View Set

Midterm II: Study Module (Newton's Third Law and Applications)

View Set