A plus 1002 Sub-objective 2.1 – Dumps4shared

A plus 1002 Sub-objective 2.1

A plus 1002 Sub-objective 2.1 – Summarize the importance of physical security measures.

Welcome to ExamNotes by Dumps4shared! This section will cover the content addressed in A+ 220-1002 objective 2.1 “Summarize the importance of physical security measures.” We will examine attack prevention for both the digital and physical environments. In addition to the standard protection method, we will also look at securing transmissions, ports, devices, and privilege configurations that enhance security. Off we go, enjoy!

Go back to A+ 220-1002 Domain 2.0 table of content

Physical security

The first area we will look at is physical security. Often marginalized or considered common knowledge, physical security is one of the primary defenses in the workplace. Enforcing locked entry points to secure areas is fundamental to overall security.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002


A mantrap, in simplest terms, is an area of controlled access
between two secure areas. For example, consider a small room, with two doors, that
is between two controlled access areas. The first door possesses a simple level
of security allowing easy entrance into the space. The second door however has a
higher level of security or different authentication method compared to the first
door. Furthermore to prevent or at least minimize tailgating, the first door
needs to be secured (closed) before the access mechanism(s) on the second door
can be used.  The second more secure door may require multifactor
authentication. Optimally, each mantrap would be monitored by a security guard.

Badge reader

Access is provided through security badges that contain coded
data that identifies users to the security system. These badges include a
current picture in order to satisfy personal security challenges. User data can
be stored on a magnetic strip or NFC contactless storage. The card should also
have the company logo and be tamperproof.

Smart cards

Smart cards are another
way to deliver security tokens to the system. Smart cards may or may not be
combined with badge technology. One thing that separates many Smart Cards from
others is its ability to both send and receive data. This enables mutual
authentication allowing each component to trust each other.


Door Locks

Locking doors seem like a simple task, but let’s look deeper and
see what level of security can be achieved. First is the lock and key. This
method to secure a single server by itself is unacceptable. Keys can be copied
if left unattended. Locks can be picked granting unauthorized access. It is
best to combine this method with others in order to create a secure area.

Door lock

Biometric locks

Using a person’s unique personal attributes such as their Iris, Fingerprint, or Voice to authenticate is known as biometrics. Biometric security is quite tough to fool. When setting up biometric locks, a sample of the attribute to be tested is provided. This is then stored in a database for comparison to any future access attempts. Often, a fingerprint scanner and a keyboard are combined in order to provide multifactor authentication.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

Hardware Tokens

Tokens are a security component necessary for devices to
communicate and provide the holder of the token the appropriate access level. Tokens
are passed across connections to a card reader, a magnetic swipe, or via wireless

Cable locks

Cable locks are used to secure valuable items, such as laptops,
that can easily be removed from the workplace. Combination or key locks are attached
to a cable which is solidly secured to the laptop and the desk.

Laptop Kensington lock

Server Locks

A server lock is used to prevent unauthorized
users from opening the server case.

USB locks

USB locks prevent access to a device through the USB port. USB
locks are small plastic plugs which are placed in the port(s). A USB drive can be
used to access data or install malware. Consider any physical port a potential

Key fob

Key fobs are frequently used in contactless authentication. The
key fob contains a security token that changes at predetermined intervals to
synchronize with the master security system. This guarantees that the user has
possession of the key fob. Possession of the key fob can be verified by
entering the number displayed into the system.

Hardware token


Privacy filters are employed by users who work in close proximity to others and require security from shoulder surfing. The screen filter narrows the monitor’s viewable angle to direct the output only to the desired user.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002

control roster

An entry control roster is a list of people with valid credentials
that is used by security personnel to log these parties.
This covers 220-1002 objective 2.1! Keep
pushing! Good luck on the test.

Pass Your IT Certification Exams With Free Real Exam Dumps and Questions

Full Version 220-1002 Dumps