Chapter 4: Physical Security

Ace your homework & exams now with Quizwiz!

Gates

A choke point through which all traffic must enter or exit; gates range from ornamental to those designed for enhanced protective measures

Turnstile

A one-way gate or access control mechanism used to limit traffic and control the flow of people.

Fencing

A visible, physical and psychological deterrent to unwanted access

Although both guards and dogs are good for physical security, which of the following more commonly applies to dogs? A. Liability B. Discernment C. Dual Role D. Multifunction

A. Liability

During an assessment, you discovered that the target company was using a fax machine. Which of the following is the least important? A. The phone number is publicly available B. The fax machine is an open, unsecured area C. Faxes frequently sit in the printer tray D. The fax machine uses a ribbon

A. The phone number is publicly available

Bluejacking

An attack that sends unsolicited messages to Bluetooth-enabled devices.

rogue access point (rogue AP)

An unauthorized wireless access point (WAP) installed in a computer network.

Zeroisation

Associated with cryptographic processes; data is overwritten with zeros

What type of biometric system is frequently found on laptops? A. Retina B. Fingerprint C. Iris D. Voice Recognition

B. Fingerprint

A(n) __________ is used to prevent cars from ramming a building.

Bollard

For a fence to deter a determined intruder, it should be at least ____________ feet tall. A. 4 B. 5 C. 8 D. 10

C. 8

_____________ is a common physical control that can be used as both a detective and reactive tool. A. A fence B. An alarm C. CCTV D. A lock

C. CCTV

What grade of lock would be appropriate to protect a critical business asset? A. Grade 4 B. Grade 2 C. Grade 1 D. Grade 3

C. Grade 1

What do lock pick sets typically contain, at a minimum? A. Tension wrenches and drivers B. A pick C. A pick and driver D. A pick and tension wrench

D. A pick and tension wrench

A type II error is also known as what? A. False rejection rate B. Failure rate C. Crossover error rate D. False acceptance rate

D. False Acceptance Rate

_____________ defines the camera's effectiveness in viewing objects from a horizontal and vertical view. A. Granularity B. Ability to zoom C. Field of view D. Focal length

D. Focal length

____________ is an IDS used exclusively in conjunction with fences. A. Infrared wave patter B. Motion Detector C. RFID D. PIDAS

D. PIDAS

Defense in depth

Deploying multiple layers of security controls to protect assets

Physical security is less important than logical security (T\F)

False

Drive Wiping

Overwriting all information on the drive

Degaussing

Permanently destroys the contents of a hard drive or magnetic media; a magnet penetrates the media and reverses the polarity of the magnetic particles on the tape or hard disk platters

In the field of IT security, the concept of defense in depth is layering more than one control on another. (T\F)

True

Biometrics

a mechanism that authenticates an individual using physical traits, such as fingerprints, facial recognition, voiceprints, or other distinguishing characteristics

False Acceptance Rate (FAR)

a metric used to describe the probability that a biometric system will incorrectly accept an unauthorized user

False Rejection Rate (FRR)

a metric used to describe the probability that a biometric system will incorrectly reject an authorized user

Perimeter Intrusion Detection and Assessment System (PIDAS)

a special fencing that has sensors to detect intruders

Closed-circuit TV (CCTV)

a surveillance system whereby video cameras transmit a signal to a limited number of monitors

Physical Access Control

any mechanism by which an individual can be granted or denied physical access to some asset.

Physical Intrusion Detection

mechanisms put in place to detect when unauthorized individuals access some protected asset

Sniffing

observes traffic on a network

Bollards

physical barriers that can take the form of heavy steel or concrete posts or subtle structures, such as brick and concrete flowerbeds, designed to prevent ramming attacks from motor vehicles.

Bluetooth

short-range wireless technology used to support communication between devices, such as mobile phones, tablets and laptops; and open standard designed to support PAN environments.

Locks

software designed to capture the keystrokes of the user and then be retrieved by an attacker later

Physical Security

the collection of safeguards that limit physical access to assets

Remote Monitoring

the process of using utilities and devices to collect realtime metrics from computers and devices that are connected to a network


Related study sets

Psychology -Unit 1 Lesson 4 Ethics and Bias in Experimental Research

View Set

SHRM - Functional Area 3 Employee Engagement and Retention

View Set

LPNC 103: integumentary disorders and burn questions

View Set

FLUID AND ELECTROLYTE TICKET TO TEST

View Set

Business 1305: Module 4 Computer Concepts Exam

View Set