2.1 Physical Access Security Flashcards

(15 cards)

1
Q

What are electronic credentials in physical access control?

A

Digital access methods such as RFID-enabled badges or key fobs used to unlock doors.

These credentials enhance security and streamline access management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technology is commonly used in access badges for proximity-based entry?

A

RFID (Radio Frequency Identification)

RFID technology allows for contactless access to secured areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What enhancement can be added to access badges for improved security?

A

Cryptographic certificates for stronger identity verification.

This helps prevent unauthorized access by ensuring the authenticity of the badge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are mobile digital keys in physical security?

A

Digital access credentials stored on smartphones used to unlock doors.

They provide convenience and can be managed remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do mobile digital keys increase security?

A

They leverage the phone’s built-in authentication methods (e.g., device unlock via PIN, biometrics).

This adds an additional layer of security beyond just the key itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are traditional physical keys still used in modern environments?

A

They provide fail-safe access during power outages and are used for low-traffic or high-security areas.

Physical keys are reliable and do not depend on electronic systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are physical keys typically managed in organizations?

A

Using controlled checkout systems or key cabinets to track usage.

This helps maintain accountability and security over key distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is biometric authentication?

A

A method of verifying identity using unique physical or behavioral characteristics.

This includes methods like fingerprint, facial recognition, and iris scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a retina scanner used for?

A

To identify individuals based on the unique patterns of their retina.

Retina scanning is highly secure due to the uniqueness of retinal patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is fingerprint scanning used for in access control?

A

To verify identity using unique fingerprint patterns.

Fingerprint scanners are commonly used in various security applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a palm print scanner measure?

A

The unique patterns of veins and lines in a person’s palm.

This method is similar to fingerprint scanning but uses palm characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is facial recognition technology (FRT)?

A

A system that identifies individuals by analyzing facial features.

FRT is increasingly used in security systems for access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is voice recognition used for?

A

Identifying individuals based on unique vocal characteristics.

This technology can be used for secure access to systems and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is proper lighting important in physical security?

A

It improves surveillance camera effectiveness and helps deter unauthorized activity.

Good lighting is essential for effective monitoring and crime prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a magnetometer used for in physical security?

A

A metal detector used to screen individuals for concealed metallic objects.

Magnetometers are commonly used in security checkpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly