Physical & Logical Security Quiz (#11)
Which of the answers listed below refer(s) to (an) example(s) of physical security token(s)? (Select all that apply)
-RFID badge -Key fob -Smart card
Examples of biometric devices include: (Select all that apply)
-Retina scanner -Fingerprint scanner -Palmprint scanner
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
ACL
Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Which of the following is an example of a soft authentication token?
Authenticator app
Which of the answers listed below refers to a solution that facilitates the enforcement of mobile device policies and procedures?
MDM
Which type of software enables a centralized administration of mobile devices?
MDM
Which of the examples listed below meets the requirement of multifactor authentication?
Password and biometric scan
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.
True
An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g., wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.
True
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.
True
In the context of physical security, a magnetometer is a device used for detecting metal objects.
True