CPP 2012 Domain 5: Physical Security Flashcards

1
Q

What is the difference between a design process based on performance criteria and one based on feature criteria?

A

A design process based on performance criteria will select elements and procedures according to the contribution they make to overall system performance.

A feature criteria approach selects elements or procedures to satisfy requirements that certain items are present.

Source: POA: Physical Security, 2.2, page 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of attacks used to defeat an access-controlled entry point?

A

Deceit, Physical attack, Technical attack.

Source: Facilities Physical Security Measures Guideline, 3.3, page 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CPTED?

A

CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

Source: POA: Physical Security, 3.1, page 37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three types of CPTED solutions?

A

Mechanical measures, Human and organizational measures, Natural measures.

Source: POA: Physical Security, 3.1.1, pages 38-39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is natural territorial reinforcement?

A

Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.

Source: POA: Physical Security, 3.1.1, page 39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the “broken windows” theory?

A

The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.

Source: POA: Physical Security, 3.1.1, page 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Jane Jacobs’ “eyes on the street” theory?

A

A precursor to defensible space theory, it suggested that residential crime could be reduced by orienting buildings toward the street, clearly distinguishing public and private domains, and placing outdoor spaces near intensively used areas.

Source: POA: Physical Security, 3.1.1, page 42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is defensible space?

A

The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behavior from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.

Source: POA: Physical Security, 3.1.2, pages 42-43

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does situational crime prevention differ from CPTED and defensible space?

A

Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.

Source: POA: Physical Security, 3.1.4, page 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What theory underpins situational crime prevention?

A

Rational choice theory.

Source: POA: Physical Security, 3.1.4, page 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four approaches to situational crime prevention?

A

Increase the effort required (e.g. target hardening, access control),Increase the risk of being caught (e.g. entry screening, surveillance),Reduce anticipated rewards (e.g. target removal, property labeling),Remove excuses (e.g. deploy signage stimulating the conscience, rule setting).

Source: POA: Physical Security, 3.1.4, pages 48-49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the preferred glass type for mitigating blast forces?

A

Laminated glass is preferred for mitigating blast forces.

Source: Facilities Physical Security Measures Guideline, 3.2.1.3.4, p. 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four main strategies of second generation CPTED (the four Cs)?

A

Cohesion,Capacity threshold (tipping point),Community culture,Connectivity.

Source: POA: Physical Security, 3.1.4, pages 51-52

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When should security risks be addressed in architectural planning?

A

During the programming phase of design, when the owner describes the purpose and occupants of the building to the architect.
Source: POA: Physical Security, 3.2.1, page 55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three challenges that security design poses for architects?

A

Determining requirements,Knowing the technology,Understanding architectural limitations.

Source: POA: Physical Security, 3.2.1, page 56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who may edit officers’ incident entries in a database log?

A

Higher-level supervisors.

Source: POA: Security Officer Operations, 2.7.2, page 39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How should changes or corrections be made in officers’ written log entries?

A

Under a new event number as a separate item.

Source: POA: Security Officer Operations, 2.7.3, page 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

At what size and how far above the ground should an opening in a building’s shell be protected?

A

Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 square centimeters) and are lower than 18 feet (5.5 meters) above the ground.

Source: POA: Physical Security, 3.2.3, page 66

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who should populate the command center at a special event?

A

Hosting organization, Facility management, Law enforcement, Security, Fire marshal, Medical director, Sponsors, Promoters, Transportation/parking, Accommodations

Source: POA: Applications, 3.4, pages 99-100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What shape columns should be used in new parking facilities?

A

Round columns, because they allow for greater visibility than square or rectangular columns.

Source: POA: Applications, 3.2.4, page 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where should stairwells and elevators be ideally located in parking facilities?

A

In the center, visible from wherever the attendant is posted.

Source: POA: Physical Security, 3.2.4, page 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What kind of gates can be used for driveways where an overhead track would be in the way?

A

Cantilever slide gates.

Source: Facilities Physical Security Measures Guideline, 3.2.1.3.1, p. 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many subjects should a single post order cover?

A

One.

Source: POA: Security Officer Operations, 2.5, page 34

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When should a supervisor visit a security post?

A

Regularly, in an unscheduled manner.

Source: POA: Security Officer Operations, 2.6, page 37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What two values describe sensor effectiveness?

A

Probability of detection,Confidence level.

Source: POA: Physical Security, 4.1.1, page 92

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When is containment a good strategy?

A

When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.

Source: POA: Physical Security, 10.3, page 291

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is “minimum resolvable temperature”?

A

The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.

Source: POA: Physical Security, 4.2.2, page 122

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the five main ways of classifying exterior intrusion sensors?

A

Passive/active,Covert/visible,Line-of-sight/terrain following,Volumetric/line-detection, Application.

Source: POA: Physical Security, 4.3.1, page 97

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

To what stimuli do ported coaxial cable sensors respond?

A

The motion of material with a high dielectric constant or high conductivity. People and metal vehicles are detected.

Source: POA: Physical Security, 4.3.2, page 99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the three types of safes for fire protection?

A

Fire-resistive safes,Insulated filing devices,Containers to protect magnetic media.

Source: POA: Physical Security, 9.4.1, page 277

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the functional tradeoff when using dual-technology motion sensors?

A

Lower false alarm rate, but lower detection sensitivity.

Source: Facilities Physical Security Measures Guideline, 3.5.1, p. 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What do you call the process of testing every alarm point and each automatic function of a new alarm system?

A

Commissioning.

Source: Facilities Physical Security Measures Guideline, 3.5.3, p. 27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the four options for providing security for special events?

A

Use current security capabilities,Provide security staff with training in special event security,Hire a special event security provider, Provide no security for the event.

Source: POA: Applications, 3.2, page 93

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the most common type of electromechanical sensor?

A

A simple mechanical switch, generally used on windows and doors, consisting of a switch unit and a magnetic unit.

Source: POA: Physical Security, 4.4.2, page 118

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Hall effect switch?

A

An electronic switch mounted on a door including a magnet and switch unit that measures magnetic field strength. It provides higher security than balanced magnetic switches.

Source: POA: Physical Security, 4.4.2, page 119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the two most common interior motion sensors?

A

Monostatic microwave,Passive infrared.

Source: POA: Physical Security, 4.4.2, page 120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Where are PIR detectors likely to experience a nuisance alarm?

A

Passive infrared (PIR) detectors are likely to experience a nuisance alarm when placed near heat sources, such as lights.

Source: POA: Physical Security, 4.4.2, pages 122-123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the most common type of wireless sensor?

A

Radio frequency (RF) sensors.

Source: POA: Physical Security, 4.4.2, page 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What problems are inherent with radio frequency (RF) sensors?

A

Collisions,Signal fade, Interference.

Source: POA: Physical Security, 4.4.2, page 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the two-person rule?

A

The two-person rule requires that two knowledgeable people be involved in a situation or activity to prevent the compromise of facility security by a single insider (e.g. handling critical assets).

Source: POA: Physical Security, 4.4.3, page 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the three reasons to use CCTV in security installations?

A

View something that is happening,View something that has already happened,Deter unwanted activities.

Source: POA: Physical Security, 5.2, page 135

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Who are likely or possible members of a physical protection system (PPS) design team?

A

CEO, Chief financial officer,HR manager, IT manager, Facilities manager, Project architect, Construction manager, Security systems designer, Security manager.

Source: POA: Physical Security, 12.5, page 334

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the three main parts of a digital video system?

A

Camera,Digital electronic signal carrier,PC with viewing or recording software.

Source: POA: Physical Security, 5.4, page 139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What three factors should determine selection of a CCTV camera?

A

Sensitivity,Resolution,Features.

Source: POA: Physical Security, 5.5, pages 142-147

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What four measures can be used to evaluate an immediate response to a security event?

A

The time it takes for guards to arrive,The probability of communication (from alarm trigger to officer response),Interruption,Neutralization.

Source: POA: Physical Security, 10.4, page 294

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the six basic application types of exterior security lighting?

A

Continuous,Glare projection,Standby,Controlled,Portable,Emergency.

Source: Facilities Physical Security Measures Guideline, 3.4.1, page 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the CARVER process?

A

The CARVER (criticality, accessibility, recuperability, vulnerability, effect, recognizability) process is used to evaluate the attractiveness of a target for attack, from the perspective of the adversary.

Source: POA: Physical Security, 11.3.1, pages 305-306

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?

A

Cold galvanized paint containing at least 95 percent zinc by weight.

Source: POA: Physical Security, 12.9.3, page 356

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What kind of freestanding infrared sensors should be used in high-security applications?

A

Multiple-beam sensors should be used in high-security applications because a single beam is easy to defeat.

Source: POA: Physical Security, 4.3.2, page 101

50
Q

What are the four main types of CCTV cameras?

A

Standard analog CCD,IP,Infrared,Thermal

Source: POA: Physical Security, 5.6.1, pages 150-151

51
Q

How do electric field (capacitance) sensors work?

A

They detect a change in capacitive coupling among a set of wires attached to, but electrically isolated from, a fence.

Source: POA: Physical Security, 4.3.2, page 101

52
Q

How do IP cameras measure their resolution?

A

IP camera resolution is measured as a multiple of the Common Intermediate Format (CIF), which is 352 x 240.

Source: POA: Physical Security, 5.6.1, page 150

53
Q

What are general orders?

A

Canons, or bodies of principles, for protection officers (e.g. No smoking on duty).

Source: POA: Security Officer Operations, 2.4, pages 33-34

54
Q

Why are sensor fences less prone to nuisance alarms than fence disturbance sensors?

A

Because the transducers are not sensitive to vibrations and require a force of approximately 25 pounds (11.3 kilograms) on the wire to cause an alarm.

Source: POA: Physical Security, 4.3.2, page 100

55
Q

Where do IP cameras rated as “power over Ethernet” get their operational power?

A

From the digital switching system via the network.

Source: POA: Physical Security, 5.6.1, page 151

56
Q

What are the five main types of CCTV lenses?

A

Wide angle,Standard,Telephoto, Zoom, Varifocal.

Source: POA: Physical Security, 5.6.2, pages 151-152

57
Q

What two factors control how high-rise building stairwells are secured?

A

Local fire and building codes, and whether inter-floor movement by occupants via the stairwells is permitted

Source: POA: Applications, 2.3.5, pages 71-72

58
Q

What four elements determine the resolution of an image?

A

Camera,Transmission method,Weakest link in the video system interface,Reproduction capability of the image storage system.

Source: POA: Physical Security, 5.7, page 155

59
Q

What consideration determines the requirements for CCTV recording?

A

How the stored images will be used: to verify information, to prove information, or to aid in prosecution.

Source: POA: Physical Security, 5.9, page 158

60
Q

What are the three forms of security system procurement?

A

Sole source procurement,Request for proposal (RFP),Invitation for bid (IFB).

Source: POA: Physical Security, 12.8, pages 347-349

61
Q

What should be the primary basis for camera selection?

A

The sensitivity required for a full video output signal in the lighting environment in the area to be assessed.

Source: POA: Physical Security, 5.10, page 161

62
Q

What do UL labels on record safes for fire protection indicate?

A

Whether it is a fire-resistant safe or an insulated records container,The duration of protection,The temperature that the inside of the container can withstand.

Source: POA: Physical Security, 9.4, page 277

63
Q

What are riser diagrams?

A

Riser diagrams are presentations of complete subsystems, such as CCTV or access control, that schematically demonstrate all of the associated devices and components and their interconnecting cables.

Source: POA: Physical Security, 12.6.3, page 343

64
Q

What are three primary functions of security lighting?

A

Deterrence,Life safety,Video lighting.

Source: POA: Physical Security, 6, page 169

65
Q

The amount of light necessary to produce a usable video signal from any video camera is a function of what five factors?

A

The type and brightness of the source, The amount of light energy illuminating the scene of interest, The portion of the light reflected from the scene, The amount of light transmitted by the lens to the imager, The sensitivity of the imaging device itself.

Source: POA: Physical Security, 6.1, 170

66
Q

What are the three steps in creating an adversary sequence diagram (ASD)?

A

Describe the facility by separating it into adjacent physical areas,Define protection layers and path elements between adjacent areas, Record detection and delay values for each path element.

Source: POA: Physical Security 11.3.3, page 307

67
Q

What is a design basis?

A

The set of security requirements that is used as the basis of the eventual design of the physical protection system. It is the result of the overall planning phase.

Source: POA: Physical Security, 12.3, page 322

68
Q

What is the major benefit of planned overlapping of security officer shifts?

A

To cover peak events such as plant shift changes or office breaks.

Source: POA: Security Officer Operations, 2.3.2, page 32

69
Q

What is color rendition?

A

The ability of a lamp to faithfully reproduce the colors seen in an object.

Source: POA: Physical Security, 6.1, page 173

70
Q

What are the four most significant factors affecting life safety in high rises?

A

Early detection and location of hazards, Reliable communications with outside agencies, Safe escape routes, Prompt application of control measures, such as extinguishing fires.

Source: POA: Applications, 2.2.1, page 53

71
Q

What are the four principal components of a lighting system?

A

Lamp (light bulb), Luminaire (fixture), Mounting hardware, Electrical supply.

Source: POA: Physical Security, 6.2, page 175

72
Q

How do you measure the energy efficiency (efficacy) of a lighting system?

A

Divide the lamp’s output in lumens by the lamp’s power draw in watts.

Source: POA: Physical Security, 6.3, page 176

73
Q

What are the five types of general security lighting equipment?

A

Streetlight,Searchlight, Floodlight,Fresnel,High mast.

Source: Facilities Physical Security Measures Guideline, 3.4.3, page 24

74
Q

What are the three most critical threats in high-rise structures?

A

Fire,Explosion,Contamination of support systems.

Source: POA: Applications, 2.2.1, page 53

75
Q

What is the “necessary human being” concept?

A

The particular characteristics and reactions required at a security post necessitate human capabilities.

Source: POA: Security Officer Operations, 2.1.2, page 24

76
Q

What is the preferred application of exterior security lighting during hours of darkness?

A

Continuous: illumination devices deployed in a series maintain uniform lighting.

Source: Facilities Physical Security Measures Guideline, 3.4.1, page 23

77
Q

What are post orders based on?

A

Standard operating procedures.

Source: POA: Security Officer Operations, 2.1, page 23

78
Q

What are the two critical elements of an alarm communications and display system (AC&D)?

A

Transportation/communication of data,Presentation of that data to a human operator in a meaningful manner.

Source: POA: Physical Security, 7, page 187

79
Q

What are the four main concerns in security communications?

A

Integrity of the communications medium,Integrity of the message,Timeliness of the transmission,Message security.

Source: POA: Physical Security, 7.3, page 191

80
Q

What should a full set of physical protection system (PPS) procurement documents (contract documents) contain?

A

Contractual details, Construction specifications,Construction drawings.

Source: POA: Physical Security, 12.6, pages 335-336

81
Q

In what ways does optical fiber differ from traditional metal wires?

A

Optical fiber:Is not affected by electromagnetic or radio frequency interference, Does not carry electrical current or radiate signals, Can carry many more different multiplexed signals, Is smaller and lighter,Is flexible and can take an irregular course, Can’t be intercepted by acoustical or inductive coupling.

Source: POA: Physical Security, 7.3, page 192

82
Q

What is the significance of the formula PE = PI x PN?

A

A physical protection system’s effectiveness is equal to the probability of interruption (e.g arrival of responders) times the probability of neutralization (e.g. defeat of adversary by responders).

Source: POA: Physical Security, 11.3.2, page 306

83
Q

What types of materials are dispensed in dispensable barriers?

A

Rigid foam, Aqueous foam, Sticky foam, Smoke or fog, Entanglement devices.

Source: POA: Physical Security, 9.3.5, page 274

84
Q

When can video be transmitted on dedicated twisted wire pairs?

A

Video can be transmitted on dedicated twisted wire pairs when there is no bridging or coupling, and there are no other connections on the wire path between the video transmitter and receiver.

Source: POA: Physical Security, 7.3.1, page 193

85
Q

What is a McCulloh circuit?

A

A McCulloh circuit is one in which, when an open occurs, the circuit is switched to send current from the control unit over both sides of the circuit wires out to the break point.

Source: POA: Physical Security, 7.3.1, page 193

86
Q

What are the three types of line-transmission installations used in electronic protection systems?

A

Loop system,Point-to-point system,Multiplexing system.

Source: POA: Physical Security, 7.3.1, pages 193-197

87
Q

What is the biggest vulnerability of a loop system?

A

All the detectors in an area could be disabled by interrupting the loop at the proper location.

Source: POA: Physical Security, 7.3.1, page 194

88
Q

What is the biggest vulnerability of a multiplexed system?

A

Interruption or destruction of a multiplexed communication link results in the interruption of all signals on that link.

Source: POA: Physical Security, 7.3.1, page 194

89
Q

What are the two general methods of separating individual signals in the multiplexing process?

A

Time separation or time division multiplexing, Frequency separation or frequency division multiplexing

Source: POA: Physical Security, 7.3.1, page 194

90
Q

What are four key considerations in video recording?

A

Resolution, Length of storage, Frames per second, Compression type (codec).

Source: Facilities Physical Security Measures Guideline, 3.6.1.3, p. 30

91
Q

What’s the simplest type of line supervision?

A

An end-of-line resistor installed to introduce a constant, measurable electric current.

Source: POA: Physical Security, 7.4.1, page 206

92
Q

What are the two characteristics of a voice that can be modified to reduce or destroy its intelligibility?

A

Frequency (pitch),Amplitude (loudness).

Source: POA: Physical Security, 7.4.2, page 207

93
Q

What are the benefits and drawbacks of frequency inverters?

A

Benefits:They are inexpensive,They can tolerate poor transmission conditions. Drawbacks:They can be defeated by anyone with a similar scrambler, Trained listeners can understand the scrambled voice.

Source: POA: Physical Security, 7.4.2, page 207

94
Q

On what should the decision of whether to arm an officer be based?

A

Whether there is greater danger to life safety without a weapon,Whether the officer may reasonably be expected to use fatal force

Source: POA: Security Officer Operations, 1.7, page 14

95
Q

What four concerns must be addressed in alarm console design?

A

What information is shown to the operator, How information is presented, How the operator communicates with the system, How to arrange the equipment at the operator’s workstation.

Source: POA: Physical Security, 7.5, page 210

96
Q

What three ergonomic factors must an alarm control/display area include?

A

What the operator needs to see, What the operator needs to hear, What the operator needs to reach and manipulate.

Source: POA: Physical Security, 7.5.1, page 211

97
Q

What are the three key factors that relate to officer behavior?

A

Courtesy,Restraint,Interest.

Source: POA: Security Officer Operations, 1.5.4, page 12

98
Q

Why should color be used sparingly in graphical alarm displays?

A

Because 10 percent of the population has some form of color blindness.

Source: POA: Physical Security, 7.5.2, page 214

99
Q

What are the objectives of an entry control system used for physical protection?

A

To permit only authorized persons to enter and exit, To detect and prevent the entry or exit of contraband material, To provide information to security personnel to facilitate assessment and response.

Source: POA: Physical Security, 8, page 217

100
Q

What is the difference between entry control and access control?

A

Entry control refers to physical equipment used to control the movement of people or material into an area. Access control refers to the process of managing databases or other records and determining the parameters of authorized entry.

Source: POA: Physical Security, 8, page 217

101
Q

What are the measures of effectiveness of an entry control system?

A

Throughput,Error rates.

Source: POA: Physical Security, 8, page 218

102
Q

What are the three ways of verifying personnel entry?

A

What you have (credential),What you know (PIN, password)What you are (biometrics).

Source: POA: Physical Security, 8.1, page 218

103
Q

What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen?

A

An exchange badge system.

Source: POA: Physical Security, 8.1.3, pages 219-220

104
Q

What are the main advantages of a smart card?

A

Large memory,High degree of resistance to forgery or compromise.

Source: POA: Physical Security, 8.1.4, page 222

105
Q

Despite their high cost, when might the use of smart cards be appropriate?

A

In a small population for use at a very high-security facility, or to limit access to certain areas in large facilities

Source: POA: Physical Security, 8.1.4, page 222

106
Q

What is the most important consideration when a security officer deals with a disturbed person?

A

Bringing the person into custody and eliminating immediate danger.

Source: POA: Security Officer Operations, 1.4.7, page 8

107
Q

How does the hand geometry biometric work?

A

It measures three-dimensional features of the hand, such as the widths and lengths of fingers and the thickness of the hand.

Source: POA: Physical Security, 8.1.5, page 224

108
Q

When should security officers be responsible for escorts?

A

To accompany people carrying high-value assets, When physical safety is a concern, When as sick or disabled person needs assistance.

Source: POA: Security Officer Operations, 1.4.3, page 6

109
Q

What two operational issues have hindered the adoption of facial recognition?

A

Wide variations in the presentation of the face (head tilt, glasses, facial hair, etc.), Lighting variations.

Source: POA: Physical Security, 8.1.5, page 227

110
Q

What are the shortcomings of magnetometers?

A

They detect only ferromagnetic materials, so they don’t detect metals such as copper, aluminum, and zinc.

Source: POA: Physical Security, 8.2.2, page 229

111
Q

What are the five main types of mechanical locks?

A

Warded lock,Lever lock,Pin tumbler lock,Wafer tumbler lock, Dial combination lock.

Source: POA: Physical Security, 8.3.1, pages 240-242

112
Q

What are the three main vulnerabilities of master locks?

A

Attack by force,Picking, Milled key blanks.

Source: POA: Physical Security, 8.3.1, page 243

113
Q

What factors affect a dog’s tracking and trailing ability?

A

Ground type, Weather conditions, Temperature, Conflicting odors, Terrain factors.

Source: POA: Applications, 1.5.1, page 37

114
Q

What is the difference between fail safe and fail secure?

A

A fail safe locking mechanism will unlock under any failure condition, such as power loss. A fail secure mechanism will lock under any failure condition.

Source: POA: Physical Security, 8.3.2, pages 244-245

115
Q

When would welded wire fabric be used for fencing?

A

In lower-security applications.

Source: Facilities Physical Security Measures Guideline, 3.2.1.1.3, p. 12

116
Q

For access control purposes, how should high-rise buildings be divided?

A

Public access/common areas,Tenant spaces,Maintenance spaces.

Source: POA: Applications, 2.3.5, page 68

117
Q

According to Fennelly, what are the three key tools in crime prevention programs?

A

Planning,Management,Evaluation.

Source: POA: Security Management, 4.4.2, page 86

118
Q

What is a good practice to make sure a guest wears a badge while on the premises?

A

Explain to the person that the badge permits immediate recognition by and assistance from employees.

Source: POA: Security Management, 10.1.5, page 293

119
Q

What are cost-effective ways to use rolls of barbed tape to enhance intrusion prevention of fences.

A

Attach a roll of barbed tape to the outriggers. Place barbed tape rolls horizontally on the ground or against the fence—inside the outer (perimeter) fence and/or outside the interior fence.

Source: POA: Physical Security, 9.2.1, page 263

120
Q

What are the first steps in upgrading a facility’s resistance to penetration?

A

Eliminating unnecessary doors and windows.

Source: POA: Physical Security 9.3.2, page 269

121
Q

What are the three most common methods of training protection dogs?

A

Positive reinforcement (praise),Compulsion (negative corrections),Inducement (toys, food).

Source: POA: Applications, 1.4.2, page 24

122
Q

What are the main functions of a physical protection system (PPS)?

A

The primary functions are detection, delay, and response.Deterrence is a secondary function.

Source: POA: Physical Security, page 1