Cards 81-118 Flashcards

1
Q
  1. What data goes into an incident management system?
A

Loss event history
Threat frequency analysis
single and Annual loss expectancy and;
Impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What tests should be part of a security survey?
A

Shipping and receiving;
Alarms;
Computer/server room security
general access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. When performing security system and procedure tests as part of a security survey, you should coordinate with:
A

building Owner/manager/landlord;

Any involved Outside agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. During a security survey test on shipping and receiving, these should be checked:
A

-Controls are checked by physical observation of selected shipments (incoming and outgoing) against bills of lading of inventory records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. During a security survey test on alarms, what is evaluated?
A

the Response as well as the reaction of building occupants and security officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. During a security survey test on a computer room or server room, these should be tested:
A

Security;

Access controls during both working and off hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How are general access controls tested during a security survey?
A

“intruders” should test if they get access to the facility or internal areas during business and off hours;
-do employees challenge the intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. How should areas, items and issues be evaluated during a security survey?
A

In terms of the appropriateness for the
Situation, Age, Operability, Maintenance, Interoperability, Aesthetics and Consistency with the current use or space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What four things should be reviewed when assessing key/card security during a security survey?
A

Accountability and policy;
record Keeping and inventory;
Recovery procedures (for keys); and
whether changed when Appropriate, ie people leave, thefts, burglary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Besides windows and doors, what other openings should be assessed during a security survey?
A

Manholes;
Skylights;
Roof hatches;
Ventilator, air conditioning vents/shafts;
-Penthouse; veranda access;
-sidewalk grates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When assessing the protection of utilities during a security survey, what should be examined?
A

Location and physical protection;
Access control;
Backup and emergency
Protection of telecommunications and data lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The first step in a risk assessment is:
A

Identification and valuation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What are the four D’s?
A

Deter

Detect

Delay

Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What are the five risk treatments:
A

Acceptance;
Transfer;
Spreading;
Avoiding;
Mitigating;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The seven functions of physical security?
A

Access control
Deterrence
Detection
Assessment
Delay
Response and
Evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Three factors to consider when selecting a risk mitigation strategy?
A

Availability;

Affordability; and

Feasibility

17
Q
  1. The effectiveness of countermeasures and the security system depends on?
A

The adversary and the threat

18
Q
  1. As a threat increases in sophistication, what must happen?
A

-the effectiveness of the countermeasures must also increase, or the additional risk that must be managed by other means.

19
Q
  1. What four criteria can be used to rank assets based on criticality?
A

Workforce;
Service delivery;
Dependencies and
Mission/objectives

20
Q
  1. Which risks should be prioritized?
A

-Those with the potential to cause significant mission impact or harm.

21
Q
  1. Repeat
A

Repeat

22
Q
  1. Two common measures of vulnerability?
A

Observability and

Exploitability

23
Q
  1. Observability is:
A

The ability of an adversary to see and identify a vulnerability

24
Q
  1. Exploitability is:
A

The ability of an adversary to take advantage of a vulnerability

25
Q
  1. When is Observability reversed?
A

In assessing natural threats

26
Q
  1. How is risk calculated?
A

Risk equals threats x vulnerabilities x impact 1/3

27
Q
  1. The cost benefit analysis is…?
A

-the cost of a security program against the impact in loss reduction, financial savings, acquisition or life cycle replacement or other costs

28
Q
  1. Metrics are?
A

-A measure based on a reference that involves at least two points.

29
Q
  1. What are the three technical criteria of a security metrics evaluation tool (M E T) ?
A

Reliability

Validity and

Generalizability

30
Q
  1. What are the three operational criteria of the security metrics evaluation tool (MET) ?
A

Cost;

Timeliness; and

Manipulation

31
Q
  1. What are the strategic criteria of a security metrics evaluation tool (MET)?
A

ROI

Organizational relevance and

Communications

32
Q
  1. What are the high-level evaluation criteria for a security metrics evaluation tool (MET)?

-Te_____ criteria;
-Op_____criteria; and
-St______criteria

A

Technical criteria

Operational criteria and

Strategic criteria

33
Q

BONUS - Summary MET criteria:

Technical - r v g
Operational - c t m
Strategic - ROI/ or/ c
High-level - tc/ oc / sc

A

Technical - reliability/validity/generalizability

Operational - cost/timeliness/manipulation

Strategic - ROI/organizational relevance/communications

High-level - technical criteria/operational criteria/ strategic criteria

34
Q
  1. Three major physical security metrics?
A

Systems, personnel compliance

35
Q
  1. Common physical security systems metrics include:
A

Forced door;
Door held open;
Unauthorized access attempts
User-defined actions/alarms
Communications failures

36
Q
  1. Two measurable physical security personnel metrics include:
A

Response and training

37
Q
  1. What is the first step in asset protection?
A

Perform a threat and vulnerability analysis

38
Q
  1. One potential pitfall in choosing security technology?
A

An inability to thoroughly evaluate product claims prior to installation.

39
Q
  1. What is the primary challenge for security system designers?
A

-Balance the need for public access against the need to ensure public safety.