Cards 81-118 Flashcards

1
Q
  1. What data goes into an incident management system?

LEH
TFA
S and ALE and
I’m As

A

Loss event history
Threat frequency analysis
single and Annual loss expectancy and;
Impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What tests should be part of a security survey?

S and R
Al
C/S room security
GAC

A

Shipping and receiving;
Alarms;
Computer/server room security
general access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. When performing security system and procedure tests as part of a security survey, you should coordinate with:
A

building Owner/manager/landlord;

Any involved Outside agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. During a security survey test on shipping and receiving, these should be checked:

Co are checked by PO of SS
(In and out) against
B of L of In Re

A

-Controls are checked by physical observation of selected shipments (incoming and outgoing) against bills of lading of inventory records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. During a security survey test on alarms, what is evaluated?
A

the Response as well as the reaction of building occupants and security officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. During a security survey test on a computer room or server room, these should be tested:
A

Security;

Access controls during both working and off hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How are general access controls tested during a security survey?
A

“intruders” should test if they get access to the facility or internal areas during business and off hours;
-do employees challenge the intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. How should areas, items and issues be evaluated during a security survey?

In terms of the Ap for the S,A,O,M as well as the I, A and C with……

A

In terms of the appropriateness for the
Situation, Age, Operability, Maintenance, Interoperability, Aesthetics and Consistency with the current use or space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What four things should be reviewed when assessing key/card security during a security survey?

Ac and Po
RK and In
RP and
App updates…

A

Accountability and policy;
record Keeping and inventory;
Recovery procedures (for keys); and
whether changed when Appropriate, ie people leave, thefts, burglary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Besides windows and doors, what other openings should be assessed during a security survey?
A

Manholes;
Skylights;
Roof hatches;
Ventilator, air conditioning vents/shafts;
-Penthouse; veranda access;
-sidewalk grates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When assessing the protection of utilities during a security survey, what 4 things should be examined?

L and PP
Acc Co
B and Em
Pro of TC and DL

A

Location and physical protection;
Access control;
Backup and emergency
Protection of telecommunications and data lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The first step in a risk assessment is:
A

Identification and valuation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What are the four D’s?
A

Deter

Detect

Delay

Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What are the five risk treatments:
A

Acceptance;
Avoiding
Mitigating
Transferring;
Spreading;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The seven functions of physical security?

AC
Ass
De
De
De
Re and
EG

A

Access control
Assessment
Deterrence
Detection
Delay
Response and
Evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Three factors to consider when selecting a risk mitigation strategy?

AV
AF
Fe

A

Availability;

Affordability; and

Feasibility

17
Q
  1. The effectiveness of countermeasures and the security system depends on?
A

The adversary and the threat

18
Q
  1. As a threat increases in sophistication, what must happen?
A

-the effectiveness of the countermeasures must also increase, or the additional risk that must be managed by other means.

19
Q
  1. What four criteria can be used to rank assets based on criticality?

WF
D
SD
M/O

A

Workforce;
Dependencies
Service delivery; and
Mission/objectives

20
Q
  1. Which risks should be prioritized?
A

-Those with the potential to cause significant mission impact or harm.

21
Q
  1. Repeat
22
Q
  1. Two common measures of vulnerability?
A

Observability and

Exploitability

23
Q
  1. Observability is:
A

The ability of an adversary to see and identify a vulnerability

24
Q
  1. Exploitability is:
A

The ability of an adversary to take advantage of a vulnerability

25
105. When is Observability reversed?
In assessing natural threats
26
106. How is risk calculated?
Risk equals threats x vulnerabilities x impact 1/3
27
107. The cost benefit analysis is…? The C of a SP MEASURED against The I in LR FS AC LCRC and OC
-the cost of a security program measured against: the impact in loss reduction, financial savings, acquisition costs, life cycle replacement costs or other costs
28
108. Metrics are? A ______ based on a ______ that involves at least ____ ______.
-A measure based on a reference that involves at least two points.
29
109. What are the three technical criteria of a security metrics evaluation tool (M E T) ?
Reliability Validity and Generalizability
30
110. What are the three operational criteria of the security metrics evaluation tool (MET) ? Co Ti and Man
Cost; Timeliness; and Manipulation
31
111. What are the strategic criteria of a security metrics evaluation tool (MET)? ROI OR Co
ROI Organizational relevance and Communications
32
112. What are the high-level evaluation criteria for a security metrics evaluation tool (MET)?
Technical criteria Operational criteria and Strategic criteria
33
BONUS - Summary MET criteria: Technical - r v g Operational - c t m Strategic - ROI/ or/ c High-level - tc/ oc / sc
Technical - reliability/validity/generalizability Operational - cost/timeliness/manipulation Strategic - ROI/organizational relevance/communications High-level - technical criteria/operational criteria/ strategic criteria
34
113. Three major physical security metrics?
Systems, personnel, compliance
35
114. Common physical security systems metrics include: FD DHO UAA CF U-D A/A
Forced door; Door held open; Unauthorized access attempts Communications failures; User-defined actions/alarms
36
115. Two measurable physical security personnel metrics include:
Response and training
37
116. What is the first step in asset protection?
Perform a threat and vulnerability analysis
38
117. One potential pitfall in choosing security technology?
An inability to thoroughly evaluate product claims prior to installation.
39
118. What is the primary challenge for security system designers?
-Balance the need for public access against the need to ensure public safety.