answersLogoWhite

0


Best Answer

Pick one (all are applicable)

1. you should prevent physical access to switches, routers, and servers.

2. you should prevent physical access to access points.

3. you should use lockable enclosures for access points or mount them in physically secure locations, such as locked rooms.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What precautions would be part of a physical access security strategy?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Security measure to stop unauthorized access to documents is?

Physical access restrictions


What precautions are needed for venous access?

There are no major precautions for access during emergency procedures.


What should you do if someone forgets their access badge physical access?

What should you do if someone forgets their access badge (physical access)? a. Loan them your access badgeb. Open the door for themc. Give them your access coded. Alert the security office


What should you do if someone forgets their access badge (physical access)?

What should you do if someone forgets their access badge (physical access)? a. Loan them your access badgeb. Open the door for themc. Give them your access coded. Alert the security office


What are two interrelated aspects that would be involved in the physical security of an organization?

• Infrastructure;• Network access;


What is physical access restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is physical restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What type of security is there in labs at nuclear companies?

There is sophisticated electronic security measures including visual surveillance and electronically limited access. Physical barriers and bright lighting on the perimeters are provided and a security force is on hand.


What is the purpose of a security lock?

The purpose of a security lock is to prevent unauthorized access to a property or object. It is designed to provide a physical barrier and deter potential intruders or thieves. Security locks are commonly used in homes, offices, vehicles, and other places where protection and privacy are desired.


Will business security alarm trigger of if some unauthorized person tries to access the internet files or account of business?

In general, no. The term "business security alarm" generally refers to the physical world, not cyberspace. Your internet security software can send an alert to your IT personnel if there is unauthorized internet access, though. Your alarm system provides security to the physical property of you business. You need to secure your computers with antivirus programs and security. It's best to keep what is most important on computers which can not be accessed externally.


Which component of physical addresses outer level access control?

That would be " Perimeter Security " making a physical location less tempting and less vulnerable as a target. ( It's in the Comptia A+ study , "Understanding Data & Security, pg. 501" Joe Lopez Jr.


What is the evaluation procedure for physical security?

The evaluation procedure for physical security typically involves assessing the effectiveness of measures such as access controls, surveillance systems, security personnel, and perimeter defenses. This often includes conducting security audits, vulnerability assessments, and penetration testing to identify weaknesses and areas for improvement. The results are then used to develop a security plan that addresses identified vulnerabilities and enhances overall protection.