Chapter 17 Flashcards
Asset
An employee, contractor, or any
physical, technological, or
intellectual possession.
TDMM.* G-72
DACS
Digital Alarm Communicator System
A system in which signals are
transmitted from a digital alarm
communicator transmitter (DACT)
located at the protected premises
through the public switched telephone
network (PSTN) to a digital alarm
communicator receiver (DACR) so that
it may seize the line to which it is
connected. The seizure disconnects
any private telephone equipment
beyond the DACT’s point of
connection.
TDMM: Page G-57
DARR
Digital Alarm Radio Receiver
A system component composed
of two subcomponents—one
that receives and decodes radio
signals and another that
annunciates the decoded data.
TDMM.* Page G-57
DART
Digital Alarm Radio Transmitter
A system component that is
connected to or an integral part
of a digital alarm communicator
transmitter (DACT) that is used
to provide an alternate radio
transmission channel.
TDMM: Page G-57
EAC
Electronic Access Control
A system composed of computer
software and hardware for
managing access to identified
spaces through the use of
established security levels, issued
credentials, and peripheral
electronic hardware, including door
contacts, request to exit (REX)
devices, card readers, and
electronic locking hardware.
TDMM.* Page G-68
ESS
Electronic Safety and Security
Systems that utilize analog and
digital transmission of data in
addition to mechanical or electrical
methods to enhance the safety and
security of a facility.
TDMM: Page G-68
FACP
Fire Alarm Control Panel
A system component that
receives and monitors inputs
from fire alarm devices and
controls outputs to connected
appliances, transmitters, relays
and devices, and other
control units.
TDMM.* Page G-78
FDAS
Fire Detection and
Alarm System
System involved in the early
detection and notification of life
safety threats.
TDMM.* Page 17-31
Fixed Camera
A camera dedicated to a single
view that does not change
unless the camera is
physically moved.
TDMM.* Page 17-22
Layering
The use of many layers of
barriers, other countermeasures,
or a mixture of both, used to
provide the maximum level of
deterrence and delay.
TDMM.* Page G-707
NAC
Notification Appliance Circuit
A fire alarm circuit used to
connect and operate notification
appliances to the fire
alarm system.
TDMM.* Page G-731
Pan and Tilt
Refers to a camera that allows
for 180-degree or 360-degree
view, which is controlled
electronically from a remote
viewing station.
TDMM.* Page 17-22
Risk
A vulnerability to or potential for
loss from a threat or event.
TDMM.* G-767
Threat
- An indication of the event or
the intent to do harm or
damage. - An agent by which damage,
injury, loss, or death can occur.
TDMM.* Page G-195
Video Surveillance
The extension of human vision
to areas requiring surveillance.
TDMM.* Page 17-21
Name the 6 primary
functions that an ESS
system performs.
1 .Access control
2.Surveillance
3.1ntrusion detection
4.Fire alarm and detection
5.Mass notification
6.Area of rescue communications
TDMM.* Page 17-1
Name 3 independent
components of a
security program.
1 .Electronic
2.Architectural
3.0perational
TDMM.* Page 17-1
Lighting is categorized
as what type of
countermeasure?
Architectural
TDMM.* Page 17-2, Figure 17.1
Access control is
categorized as what type
of countermeasure?
Electronic
TDMM.* Page 17-2, Figure 17.1
Contingency planning is
categorized as what type
of countermeasure?
Operational
TDMM.* Page 17-2, Figure 17.1
What is a fundamental
concept of security design?
The use of layering
TDMM.* Page 17-2
Describe the theory of
concentric circles.
Using multiple points of
detection provides the
greatest opportunity for
evaluation and response
TDMM.* Page 17-2
What principle serves as
the basis of event-based
monitoring?
The principle that electronic
systems can efficiently and
effectively drive operational
response
TDMM.* Page 17-3
What is required to provide
a person with total safety
and security?
Total isolation from their
environment and other people
while maintaining basic
life support
TDMM.* Page 17-4
What is required to provide
objects with total safety
and security?
Isolating the object from access
TDMM.* Page 17-4
Name three steps
performed by a
security consultant.
1 .Assess known and potential
risks.
2.Estimate the likelihood that
threats will occur.
3.Recommend pragmatic
countermeasures.
TDMM.* Page 17-4
List 7 categories of
potential causes for
damage or loss.
1 . Temperature
2.Gases
3.Liquids
4.0rganisms
5.Projectiles
6.Movement
7.Energy anomalies
TDMM.* Page 17-4
What is the key to
mitigating risks?
Identifying the source of a
potential risk
TDMM.* Page 17-5
True or False
The threat analysis
preparation is used as a
basis for the design of the
ACS and other security
systems.
False. The threat analysis
preparation is NOT to be used as
a basis for the design of ACS or
other security systems. It is an
overall assessment and
recommendation for
countermeasures necessary to
protect life and property.
TDMM.* Page 17-5
Name 4 factors that affect
a user’s level.
1 .Security clearances
2.Job title
3.Rank
4. Employee type
TDMM.* Page 17-8
Name the 2 primary
components of an EAC.
1 .A computer with EAC software
2.One or more peripheral
devices and/or control panels
TDMM.* Page 77-9
Define the 3 levels
of EAC systems.
*Level 1: Headend processing,
recording, software, or
database
*Level 2: Intelligent field
processing
Level 3: Field devices
TDMM. Page 17-10
What is a credential?
An item that allows
entry to an area
TDMM.* Page 17-10
What type of cables make
up an analog EAC cable?
Four individually shielded pairs
TDMM.* Page 17-10
Name 4 types of cabling
used for communications
in an EAC system.
1 .Balanced twisted-pair
2.Optical fiber
3.Wireless
4.Cellular network connections
TDMM.* Page 17-11
Name 4 types
of basic door locks.
1 .Bored locks
2.Rim locks
3.Mortise locks
4.Vertical rod locks
TDMM.* Page 17-13
Name 4 types of
basic lock functions.
1 .Entrance lock
2.Storeroom lock
3.CIassroom lock
4.Vestibule lock
TDMM.* Page 17-13
How does an
entrance lock function?
When it is pushed in,
an inside button locks the
outside lever.
TDMM.* Page 17-13
How does a
storeroom lock function?
This lock is key-operated from
the outside because the outside
lever is always locked. The
inside lever always allows
free egress.
TDMM.* Page 17-13
What determines if the
outside lever of a vestibule
lock is locked or unlocked?
The outside lever is accessed by
key when the door is locked. A
key in the inside lever
if the outside lever is
locked or unlocked.
TDMM.* Page 17-13
What is probably the most
common type of door
release
Electric strikes
TDMM.* Page 17-14
Name 3 performance
ratings used to describe
electric strikes.
1 .Static strength
2.Dynamic strength
3.Endurance levels
TDMM.* Page 17-14
Name 3 types of optional
monitoring switches for an
electric strike.
1 .Latch bolt monitor
2.Locking cam monitor
3.Dead bolt monitor
TDMM: Page 17-14
What is the typical amount
of unlock time for an
electric strike?
8 to 11 seconds
TDMM.* Page 17-14
Name 2 types of
magnetic locks.
1 .Direct hold (direct-pull)
2.Shear locks
TDMM.* Page 17-76
How many means of
release do AHJs normally
require for magnetic locks?
2
TDMM.* Page 17-16
What replaces the function
of a traditional mechanical
key in an electric lockset?
Actuating solenoids
TDMM.* Page 17-17
Name 2 applications where
electric bolts and latches
may be used.
1 .High-security applications
where normal life-safety issues
may be secondary
2.AppIications where people do
not move in an out of the area
TDMM.* Page 17-18
What is another name for
electrified exit hardware?
Panic hardware
TDMM.* Page 17-19
Where is the use of
electrified exit hardware
Often required?
In the path of egress
TDMM.* Page 17-19
Where is electrified exit
hardware commonly used?
In double-door applications
TDMM.* Page 17-19
Name 5 primary
applications of
video surveillance.
1.lnvestigation
2.Prosecution
4.Observation
5.Intrusion detection
TDMM.* Page 17-21
Name 3 traditional uses of
surveillance systems.
1 .Operational
2.Safety
3.Security
TDMM: Page 17-21
What is a good rule of
thumb regarding the use
video surveillance and
privacy rights?
Do not use video surveillance
in areas where a right to
privacy is expected.
Note: If there is any doubt, seek
and document an informed
legal opinion.
TDMM.* Page 17-21
What does the use of video
surveillance technology
imply about the areas
under surveillance?
That the areas are being
monitored and a response will
be provided if the need arises
TDMM.* Page 17-21
Why are IR cameras
referred to as
“starlight cameras”?
Because of their nighttime
viewing capabilities
TDMM.* Page 17-21
What is the purpose of
thermal cameras?
To capture heat or temperature
values of a scene rather than
light values
TDMM.* Page 17-21
How are the lens for video
surveillance cameras
defined?
By their focal length
TDMM.* Page 17-22
Name the 3 common types
Of Canner a lenses.
1 .Fixed
2.Variable
3.Zoom
TDMM.* Page 17-22
Name the 2 typical types of
camera mounts used in
video surveillance
applications.
1 Fixed
2.Pan and tilt
TDMM.* Page 17-26
Name two factors used to
determine camera
mounting locations.
1 .Available physical infrastructure
2.Required fields of view
TDMM.* Page 17-22
What is the recommended
mounting height for interior
video surveillance
cameras?
-2.4 m (8 ft) AFF
TDMM.* Page 77-23