CompTIA Security+ Question L-21

Due to issues with building keys being duplicated and distributed, a security administrator wishes to change to a different security control regarding a restricted area. The goal is to provide access based upon facial recognition. Which of the following will address this requirement?

A. Set up mantraps to avoid tailgating of approved users.
B. Place a guard at the entrance to approve access.
C. Install a fingerprint scanner at the entrance.
D. Implement proximity readers to scan users’ badges.

Answer: B

Explanation:
A guard can be instructed to deny access until authentication has occurred will address the situation adequately.

CompTIA Security+ Question I-20

A company is installing a new security measure that would allow one person at a time to be authenticated to an area without human interaction. Which of the following does this describe?

A. Fencing
B. Mantrap
C. A guard
D. Video surveillance

Answer: B

Explanation:
Mantraps make use of electronic locks and are designed to allow you to limit the amount of individual allowed access to an area at any one time.

CompTIA Security+ Question C-73

Which of the following are examples of detective controls?

A. Biometrics, motion sensors and mantraps.
B. Audit, firewall, anti-virus and biometrics.
C. Motion sensors, intruder alarm and audit.
D. Intruder alarm, mantraps and firewall.

Answer: C

Explanation:
Detective controls are those that operate afterward so as to discover that has happened. Detective controls include security guards, motion detectors, recording and reviewing of events captured by security cameras or CCTV, job rotation, mandatory vacations, audit trails, honeypots or honeynets, IDSs, violation reports, supervision and reviews of users, and incident investigations.

CompTIA Security+ Question C-50

Peter, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?

A. Sign in and sign out logs
B. Mantrap
C. Video surveillance
D. HVAC

Answer: B

Explanation:
Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open. Mantraps are in most cases also combined with guards. This is the most physical protection any one measure will provide.

CompTIA Security+ Question A-88

Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described?

A. Tailgating
B. Fencing
C. Screening
D. Mantrap

Answer: D

Explanation:
Mantraps are designed to contain an unauthorized, potentially hostile person/individual physically until authorities arrive. Mantraps are typically manufactured with bulletproof glass, high-strength doors, and locks and to allow the minimal amount of individuals depending on its size. Some mantraps even include scales that will weigh the person. The doors are designed in such a way as to open only when the mantrap is occupied or empty and not in-between. This means that the backdoor must first close before the front door will open; exactly what is required in this scenario.

CompTIA Security+ Simulation 10

Drag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used.

Correct Answer:

Mobile Device Security
GPS tracking
Remote wipe
Device Encryption
Strong password

Server in Data Center Security
FM-200
Biometrics
Proximity Badges
Mantrap

CompTIA Security+ Simulation 1

DRAG DROP
You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.

Instructions:All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.

Correct Answer:


1) Unsecured computer lab – Cable lock, proximity badges, biometric, CCTV, safe, cabinet lock
2) Office work place – safe, proximity, cable lock
3) Datacenter – biometric, proximity, mantrap, cipher lock
4) Offsite computer – cable lock, mantrap, CCTV

Cable locks – Adding a cable lock between a laptop and a desk prevents someone from picking it up and walking away Proximity badge + reader

Safe is a hardware/physical security measure

Mantrap can be used to control access to sensitive areas.

CCTV can be used as video surveillance.

Biometric reader can be used to control and prevent unauthorized access.

Locking cabinets can be used to protect backup media, documentation and other physical
artefacts.

References:
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,

CompTIA Network+ Question B-40

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?

A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups

Correct Answer: A

Explanation:
Fire suppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different
ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the server room is to fill the server room with an inert gas such as carbon dioxide.

CompTIA Network+ Question A-64

A facility would like to verify each individual’s identity prior to allowing access to the datacenter. Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of the following would BEST meet these goals?

A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap
B. Implement a security guard at the facility entrance and a keypad on the datacenter entrance
C. Implement a CCTV camera and a proximity reader on the datacenter entrance
D. Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance

Correct Answer: A