Skip to Content

CompTIA PK0-005: Which of the following is the BEST example of a breach of physical security?

Question

Which of the following is the BEST example of a breach of physical security?

A. System user IDs being used by multiple individuals
B. Printers that do not request user authentication
C. Developers having full access to both development and production environments
D. Project documentation that is only kept on a removable device

Answer

D. Project documentation that is only kept on a removable device

Explanation

The BEST example of a breach of physical security is: D. Project documentation that is only kept on a removable device.

Option D represents a breach of physical security as it involves project documentation being stored on a removable device. Keeping sensitive project documentation on a removable device poses several risks and vulnerabilities that compromise the physical security of the information. Let’s elaborate on why each of the other options is not the BEST example of a breach of physical security:

A. System user IDs being used by multiple individuals:
While using system user IDs by multiple individuals may pose a security risk and may be against security best practices, it is not strictly a breach of physical security. This scenario deals more with access control and user management rather than physical security.

B. Printers that do not request user authentication:
Printers that do not request user authentication can also be a security concern, but it is not primarily related to a breach of physical security. Instead, it falls under the category of access control and network security. Physical security breaches are typically associated with unauthorized access, theft, or unauthorized physical access to critical assets.

C. Developers having full access to both development and production environments:
This option pertains more to logical security concerns and access control rather than a breach of physical security. Although it may be a security issue to have developers with access to both development and production environments, it does not necessarily involve a physical breach.

D. Project documentation that is only kept on a removable device:
This option represents a significant breach of physical security. Storing project documentation exclusively on a removable device poses several risks:

1. Loss or theft: If the removable device is lost or stolen, the sensitive project documentation falls into unauthorized hands, potentially leading to data breaches or exposing confidential information.

2. Lack of access controls: Removable devices are often not as secure as networked storage or centralized document management systems. They may lack proper access controls, encryption, or authentication, making it easier for unauthorized individuals to access the information.

3. Data integrity and availability: Relying solely on a removable device for storing project documentation can result in data integrity issues if the device becomes corrupted or malfunctions. It also creates availability risks if the device is unavailable when needed.

To ensure proper physical security, project documentation should be stored securely in a controlled and protected environment, such as a secure server, document management system, or encrypted storage, where access can be appropriately managed and monitored.

In conclusion, Option D, “Project documentation that is only kept on a removable device,” is the BEST example of a breach of physical security. It highlights the importance of properly securing and managing sensitive project information to prevent unauthorized access, loss, or theft of critical data.

Reference

CompTIA Project+ PK0-005 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the CompTIA Project+ PK0-005 exam and earn CompTIA Project+ PK0-005 certification.