Cards 81-118 Flashcards

1
Q
  1. What data goes into an incident management system?

-lo ____ ev____ history;
-th_____fr____ analysis;
- Single and an____ lo____expectancy; and
- im ____as______

A

Loss event;
Threat frequency;
Annual loss;
Impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What tests should be part of a security survey?

-sh_____ and re_____;
-al_____;
-co____/se____ room security;
-General ac_____ co______

A

Shipping and receiving;
Alarms;
Computer/server
Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. When performing security system and procedure tests as part of a security survey, you should coordinate with:
  • building ow___/ma___/la___;
  • Any involved ou___ ag____
A

Owner/manager/landlord;

Outside agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. During a security survey test on shipping and receiving, these should be checked:

-Controls are checked by ph____ ob_____ of selected shipments (incoming and outgoing) against bi____ of la_____ of inventory records.

A

Physical observation;

Bills of lading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. During a security survey test on alarms, what is evaluated?

-the re____ as well as the re____ of building occupants and security officers

A

Response

Reaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. During a security survey test on a computer room or server room, these should be tested:

-Se______;
-ac_____ co_____ during both working and off hours

A

Security;

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How are general access controls tested during a security survey?

-“intruders” should test if they get access to the fa_____ or in___ areas during business and off hours;
-do employees ch____ the inTruders

A

Facility or internal;

Challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. How should areas, items and issues be evaluated during a security survey?

In terms of the ap________ for the
Si
Ag
Op
Ma
Inter
Ae and
Con with the current use of space

A

Appropriateness

Situation
Age
Operability
Maintenance
Interoperability
Aesthetics
Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What should be reviewed when assessing key/card security during a security survey?

-acc_____ and po______;
-record ke____ and in_____;
-re_____pro_____ (for keys)
-changed when ap____, ie people leave, thefts, burglary

A

Accountability and policy;
Keeping and inventory;
Recovery procedures;
Appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Besides windows and doors, what other openings should be assessed during a security survey?

-ma
-sk
-r______ ha______;
-ve____, air co_____ ve___/sh____;
-Pe_____ roof; ve____ ac____;
-si______ grates

A

Manholes;
Skylights;
Roof hatches;
Ventilator, air conditioning vents/shafts;
-Penthouse; veranda access;
-sidewalk grates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When assessing the protection of utilities during a security survey, what should be examined?

-lo____ & ph______ protection;
-acc_____ con______;
- ba____ and em_____ sources;
- pro____ of tele_____ and da___lines.

A

Location and physical protection;
Access control;
Backup and emergency
Protection of telecommunications and data lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The first step in a risk assessment is:

-id______ and va______ of assets

A

Identification and valuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What are the four D’s?
A

Deter

Detect

Delay

Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What are the five risk treatments:

-ac
-tr
-sp
-av
-mi

A

Acceptance;
Transfer;
Spreading;
Avoiding;
Mitigating;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The seven functions of physical security?

-ac ____ c_____
-de____
-de____
-as___
-de____
-Re___ and
-ev_____ ga_____

A

Access control
Deterrence
Detection
Assessment
Delay
Response and
Evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Three factors to consider when selecting a risk mitigation strategy?

-av______
-af______ and
-fe_____

A

Availability;

Affordability; and

Feasibility

17
Q
  1. The effectiveness of countermeasures and the security system depends on?

-the ad_______ and the th_____

A

The adversary and the threat

18
Q
  1. As a threat increases in sophistication, what must happen?

-the ef_____ of the cou_____ must also increase, or the additional risk that must be ma____ by other means.

A

Effectiveness of the countermeasures

Managed

19
Q
  1. What four criteria can be used to rank assets based on criticality?

-Wo_____;
-se_____ del_______;
-dep_______ and
-MI________/ob________

A

Workforce;
Service delivery;
Dependencies;
Mission/objectives

20
Q
  1. Which risks should be prioritized?

-Those with the potential to cause sig_____ m____ im____ or harm.

A

Significant
Mission
Impact or harm

21
Q
  1. Repeat
A

Repeat

22
Q
  1. Two common measures of vulnerability?

-ob_________ and ex_______

A

Observability and

Exploitability

23
Q
  1. Observability is:

The ability of an ad_____ to see and identify a vu_______

A

Adversary……

Vulnerability

24
Q
  1. Exploitability is:

The ability of an adversary to ta____ ad_____ of a vu_____

A

Take advantage of

A vulnerability

25
Q
  1. When is Observability reversed?

In assessing na______ threats

A

Natural

26
Q
  1. How is risk calculated?

-Risk = (t x v x im)/3

A

Risk equals threats x vulnerabilities x impact /3

27
Q
  1. The cost benefit analysis is…?

-the cost of a se____pr___ against the impact in loss reduction, fi___ sa ____, ac_____, li____cy____ replacement or other costs

A

Security program

Financial savings
Acquisition or
Life cycle

28
Q
  1. Metrics are?

-A measure based on a re____that involves at least tw____ points.

A

Reference

Two

29
Q
  1. What are the three technical criteria of a security metrics evaluation tool (M E T) ?

-Re_____;
-Va_____; and
-Ge________

A

Reliability

Validity and

Generalizability

30
Q
  1. What are the three operational criteria of the security metrics evaluation tool (MET) ?
  • Co______;
    -ti_______;
    -ma______
A

Cost;

Timeliness; and

Manipulation

31
Q
  1. What are the strategic criteria of a security metrics evaluation tool (MET)?

-ROI;
-or______ re______; and
-co________

A

ROI

Organizational relevance and

Communications

32
Q
  1. What are the high-level evaluation criteria for a security metrics evaluation tool (MET)?

-Te_____ criteria;
-Op_____criteria; and
-St______criteria

A

Technical

Operational and

Strategic

33
Q

BONUS - Summary MET criteria:

Technical - r v g
Operational - c t m
Strategic - ROI/ or/ c
High-level - tc/ oc / sc

A

Technical - reliability/validity/generalizability

Operational - cost/timeliness/manipulation

Strategic - ROI/organizational relevance/communications

High-level - technical criteria/operational criteria/ strategic criteria

34
Q
  1. Three major physical security metrics?

Sy_____; per______; com______

A

Systems, personnel compliance

35
Q
  1. Common physical security systems metrics include:

-fo_____do___;
-do____ he_____ op____;
-un_____ access at____;
-User-de_____act__/al_____
-comm____fa_____

A

Forced door;
Door held open;
Unauthorized access;
User-defined actions/alarms
Communications failures

36
Q
  1. Two measurable physical security personnel metrics include:

Re_______ and tr________

A

Response and training

37
Q
  1. What is the first step in asset protection?

-Perform a th_____ and vu____ analysis

A

Threat and vulnerability analysis

38
Q
  1. One potential pitfall in choosing security technology?

An inability to thoroughly ev___pr___ cl_____ prior to installation

A

Evaluate product claims

39
Q
  1. What is the primary challenge for security system designers?

-Balance the need for pu___ac____ against the need to ensure pu_____sa_________

A

Public access

Public safety