M4 Practice Quiz

Question 1

  1. Jennifer, a facilities manager at Dion Training, wants to prevent unauthorized vehicles from getting too close to the building and ramming into it. Which of the following physical security control measures should they utilize to achieve this?

    Options:

    • Fences
    • Video surveillance
    • Bollards
    • Access control vestibules

    Overall explanation:

    • Bollards are short, sturdy vertical posts designed to control or prevent access by vehicles to an area or structure. Fences are barriers, usually made of posts and wire or boards, erected to enclose a space or separate areas.
    • Fences are unlikely to prevent vehicles from ramming into buildings.
    • Access control vestibules are secured entry points, often a double set of doors, that regulate individuals entering or leaving a facility.
    • Video surveillance involves the use of cameras to monitor and record activities in a particular area for security purposes. Video surveillance won't prevent vehicles from getting too close to the building.

    Tags: Bollard

Question 2

  1. Jacob, a security manager at Dion Training, wants to protect a sensitive server room against unauthorized physical access without relying on electronic locking mechanisms. Which of the following door locks should they utilize to achieve this?

    Options:

    • Biometric lock
    • RFID lock
    • PIN lock
    • Cipher lock

    Overall explanation:

    • A cipher lock is a mechanical locking system that uses push buttons, often numbered, and requires the correct combination to be entered for access.
    • The other options are electronic locking systems.
      • A biometric lock relies on unique physiological or behavioral characteristics, such as fingerprints or retina scans, to authenticate and grant entry.
      • An RFID lock uses radio-frequency identification technology, typically involving a card or token that communicates with the lock wirelessly to enable unlocking.
      • A PIN lock relies on a numerical code, known as a Personal Identification Number, to unlock and grant access.

    Tags: Door Locks

Question 3

  1. Jonni, a security manager at Dion Training, wants to implement a physical security control measure at the main entrance of their new corporate headquarters. Their primary objective is to authenticate individuals in a space between two sets of doors to help prevent tailgating by ensuring that unauthorized persons don't follow authorized individuals inside. Which of the following security controls should he implement to best achieve this?

    Options:

    • Video surveillance
    • Access control vestibule
    • Motion detection sensors
    • Perimeter fencing

    Overall explanation:

    • An access control vestibule is a secured entryway between two sets of doors that prevents unauthorized or tailgated entry.
    • Perimeter fencing is a barrier that encircles a property to deter unauthorized access.
    • Motion detection sensors detect moving objects in a specified area, triggering alerts or actions.
    • Video surveillance uses cameras to monitor and record activities for security and evidence purposes.

    Tags: Access Control Vestibules

Question 4

  1. Sheryl, a penetration tester at Dion Training, wants to break into the RFID-protected server room. She sees Mazen sitting in a coffee shop, so she briefly places her purse near Mazen's backpack. Later, she uses a device from her purse to access the server room.  She receives a message stating, "Welcome, Mazen" when she authenticates with the RFID-based lock using the device. Which of the following types of attacks did she utilize to gain access to the server room?

    Options:

    • Lock picking
    • Password cracking
    • Access badge cloning
    • Brute force attack

    Overall explanation:

    • Access badge cloning involves the creation of a copy of a legitimate badge and using it to grant access. In this case, Sheryl has captured the data from Mazen's badge and created a copy for herself.
    • Lock picking involves manipulating a lock's components to open it without the original key.
    • Password cracking refers to attempts to guess or decipher a system's password to gain unauthorized access.
    • A brute force attack usually involves systematically trying all possible combinations until the correct one is found.

    Tags: Access Badge Cloning

Question 5

  1. Which of the following sensors is used to detect changes in environmental heat that is typically emitted by warm bodies such as humans or animals?

    Options:

    • Pressure sensors
    • Infrared sensors
    • Ultrasonic sensors
    • Microwave sensors

    Overall explanation:

    • Infrared sensors detect changes in infrared radiation, often emitted by warm bodies like humans or animals.
    • Pressure sensors activate when a specified minimum amount of weight is detected and are often embedded in floors or mats.
    • Microwave sensors detect movement by emitting microwave pulses and measuring their reflection off moving objects.
    • Ultrasonic sensors measure the reflection of ultrasonic waves off moving objects and operate similarly to a bat's echolocation capability.

    Tags: Surveillance Systems