Physical Security Flashcards

(25 cards)

1
Q

Structure that encloses an area using interconnected panels or posts

A

Fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides a visual deterrent by defining a boundary that should not be violated by unauthorized personnel

A

1
Purposes of fencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Establishes a physical barrier against unauthorized entry

A

Purposes of fencing 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delays intruders, which helps provide security personnel with longer window of time to react

A

Purposes of Fencing 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Robust, short vertical posts, made of steel or concrete, that are designed to manage or redirect vehicular traffic

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves manipulating security devices to create new vulnerabilities that can be exploited

A

Tampering with security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Involves the direct confrontation or attack of security personnel

A

Confronting Security Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force attack that uses a car, truck, or other motorized vehicle to ram into the organization’s physical security barrier

A

Ramming a Barrier with a Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maintain the security and safety of facilities, including business, home, or commonly used public areas

A

Surveillance Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flexible and adaptable form of surveillance that organizations use

A

Security Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proper lighting is crucial for conducting effective surveillance using both voice and security gurads

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Devices that detect and respond to external changes in the environment and convert the information into readable signals or data

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Activate when a specified minimum amount of weight is detected on the sensor that is embedded into the floor or a mat

A

Pressure Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Blocking the camera’s line of sight (paint on camera, etc)

A

Visual obstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time

A

Blind the sensor or camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jamming or playing loud music to disrupt the microphone’s functionality

A

Accoustic Interference

17
Q

Jamming the signals that surveillance systems rely on to monitor the environment

18
Q

Exploring the environment around the surveillance equipment to compromise its functionality

A

Physical Environment Attack

19
Q

Double-door system that is designed with 2 doors that are electronically controlled to ensure that only one door can be opened at a given time

A

Access Control Vestibules

20
Q

Person with legitimate access intentionally allows another person without authorization to enter a secure area with them

21
Q

Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property

22
Q

The rate that the system authenticates a user as valid, even though that person should not have been granted access to the system

A

False Acceptance Rate (FAR)

23
Q

Occurrs any time the biometrics system denies a user who should have been allowed access to the system

A

False Rejection Rate (FRR)

24
Q

More commonly called Crossover Error Rate (CER), which uses a measure of the effectiveness of a given biometric system to achieve a balance

A

Equal Error Rate (EER)

25
Refers to copying the data from an RFID or NFC card or badge onto another card or device
Access Bage Cloning