CPP 2022 Domain 5: Physical Security Flashcards

1
Q

What is the purpose of a security survey?

A

Determine and document the current security posture,
Identify deficiencies and excesses in existing security measures,

Compare the current posture with a determination of the appropriate level of security or protection needed,
Recommend improvements in the overall situation.

Source: POA, Physical Security, 3.3.1, pages 37-38

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three physical security assessment methodologies?

A

Outside-Inward Methodology,
Inside-Outward Methodology,

Functional Methodology.

Source: POA, Physical Security, 3.3.2, page 39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are typical areas, items, and issues to consider when conducting a physical security survey?

A

Barriers,
Doors, windows, and other openings,

Locks, 
Safes and containers, 
Signage, 
Lighting, 
Alarm and electronic security systems, 
Security officer services, 
Vehicle, traffic, and parking controls, 
Protection of utilities, 
Visitor management, 
Package and mail handling. 

Source: POA, Physical Security, 3.4.1, pages 43-48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should areas and items be assessed during a physical security survey?

A

In terms of appropriateness for the situation, age, operability, maintenance, interoperability, aesthetics, and consistency with the current use of the space.

Source: POA, Physical Security, 3.4.1, page 43

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are four tests that should be conducted as part of a physical security survey?

A

Shipping and receiving,
Alarms,

Computer/server room security,
General access controls.

Source: POA, Physical Security, 3.4.2, page 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are five criteria of good physical security survey reports?

A

Accuracy,
Clarity,

Conciseness,
Timeliness,
Slant or pitch.

Source: POA, Physical Security, 3.5, pages 48-49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two foundational principles of physical security design?

A

Four Ds,
Layered security or defense-in-depth.

Source: POA, Physical Security, 5.1, page 78

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Four Ds?

A

Deter,
Detect,

Delay,
Deny.

Source: POA, Physical Security, 5.1, page 78

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a defense-in-depth approach?

A

An adversary must avoid or defeat a number of protective devices or features in sequence.

Source: POA, Physical Security, 5.1, page 78

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the different between point and area security?

A

Area security features a significant perimeter protection and entry is tightly controlled at a single portal.
Point security features a loosely controlled perimeter and the primary security focus is at the individual buildings.

Source: POA, Physical Security, 5.1.1, page 79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CPTED?

A

CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

Source: POA, Physical Security, 10.1, pages 211-212

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of CPTED measures?

A

Mechanical measures,
Organizational measures,

Natural measures.

Source: POA, Physical Security, 10.1, page 212

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are five examples of CPTED tools?

A

Natural territorial reinforcement,
Natural surveillance,

Natural access control,
Management and maintenance,
Legitimate activity support.

Source: POA, Physical Security, 10.1, pages 212-214

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This CPTED tool is the process of establishing a sense of ownership, responsibility, and accountability in property owners, manager, or occupants to increase vigilance in identifying trespassers.

A

Natural territorial reinforcement.

Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This CPTED tool states that increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility.

A

Natural surveillance.

Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The idea of this CPTED tool is to employ both real and symbolic barriers - including doors, fences, and shrubbery - to define and limit access to a building or other space

A

Natural access control.

Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This CPTED tool states that for spaces to look well cared for and crime-free, they must be maintained. This tool is also supported by the “broken windows” theory.

A

Management and maintenance.

Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This CPTED tool states that some places are difficult to protect by nature of their location or other geographic feature and space may need to be occupied to prevent it.

A

Legitimate activity support.

Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the capable guardian concept?

A

The presence of a capable guardian may deter crime by reducing the site’s perceived vulnerability and make it less attractive to offenders.

Source: POA, Physical Security, 10.1.1, page 216

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the four main strategies of second generation CPTED (the Four Cs)?

A
Cohesion,
Capacity threshold (tipping point),

Community culture,
Connectivity.

Source: POA, Physical Security, 10.1.2, page 217

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What lenses are added in third generation CPTED and CPTED 3-D?

A

Third generation CPTED introduces environmental sustainability and green technology.
CPTED 3-D incorporates designation of a space, its definition in terms of management and identity, and design as it relates to desired function.

Source: POA, Physical Security, 10.1.2, page 217

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the six tasks of technical security projects?

A

Risk analysis,
Conceptual (schematic),

Design development,
Construction documents,
Bidding,
Construction.

Source: POA, Physical Security, 14.1, page 481

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are two important outcomes of the initial phases of a design project?

A

A security basis of design, focusing on the specific project requirements and a conceptual design solution based on those requirements;
A business case to support the project.

Source: POA, Physical Security, 14.2, pages 481-482

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The level of protection for a group of assets must meet the protection needs of what?

A

The most critical asset in the group.

Source: POA, Physical Security, 14.2, page 483

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are nine design criteria?

A

Codes and standards,
Quality,

Capacity, 
Performance, 
Features, 
Cost, 
Operations, 
Culture and image, 
Monitoring and response. 

Source: POA, Physical Security, 14.3.1, pages 485-488

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of the design concept?

A

The design concept incorporates the basis of design; documents the findings, conclusions, and recommendations from any initial surveys, and is the first opportunity to document the project’s design.

Source: POA, Physical Security, 14.3.3, page 489

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is included in the typical construction documents (CD) phase package?

A

CD drawings,
Specifications,

Bill of quantities,
Refined system budgets,
Contract terms and conditions.

Source: POA, Physical Security, 14.3.4, page 493

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

System security drawings usually consist of what 5 items?

A

Plans,
Elevations,

Details,
Risers,
Hardware schedules.

Source: POA, Physical Security, 14.3.6, page 495

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What two types of costs should be considered in the estimate?

A

Capital projects and service projects and recurring costs.

Source: POA, Physical Security, 14.4.2, page 503

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are three types of cost estimates?

A

Budgetary estimates,
Preliminary design estimates,

Final design estimates.

Source: POA, Physical Security, 14.4.3, pages 504-506

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This types of cost estimate is prepared during the initial planning phase and the goal is to arrive at a cost figure that can be used for getting the new security system into the budget cycle.

A

Budgetary estimate.

Source: POA, Physical Security, 14.4.3, page 504

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This type of cost estimate is prepared when the security system is part of a larger construction project and should include a contingency of plus or minus 10%.

A

Preliminary design estimate.

Source: POA, Physical Security, 14.4.3, page 504

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This type of cost estimate is developed using the completed documents, drawings, and schedules and should have a contingency of plus or minus 5%.

A

Final design estimate.

Source: POA, Physical Security, 14.4.3, page 506

34
Q

What are components of life-cycle cost?

A

Engineering and design costs,
Hardware,

Software, 
Installation costs, 
Operating costs, 
Maintenance costs, 
Other costs, 
Adjustments. 

Source: POA, Physical Security, 14.4.4, page 506

35
Q

What are three forms of security systems procurement?

A

Sole source,
Request for proposal (RFP),

Invitation to bid (IFB).

Source: POA, Physical Security, 14.8.1, page 529

36
Q

In this procurement method, the organization prequalifies a reputable security system contracts, works with the contractor to design the system, and negotiates the cost of the equipment, installation, and service.

A

Sole source procurement.

Source: POA, Physical Security, 14.8.1, page 530

37
Q

This procurement method is the most common and is based on a set of detailed design and construction documents that form the basis of the organization’s functional requirements.

A

Request for proposal.

Source: POA, Physical Security, 14.8.1, page 530

38
Q

This procurement method is commonly used by government agencies and other organizations whose procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder.

A

Invitation for bid.

Source: POA, Physical Security, 14.8.1, page 531

39
Q

The type of procurement process has a direct impact on what preparation?

A

The procurement affects the level of detail required in the construction documents.

Source: POA, Physical Security, 14.8.1, page 529

40
Q

What is a pre-bid conference?

A

Each contractor is invited to meet with the owner or the owner’s consulting engineer for a complete review of the bid documents and a walk-through of the site.

Source: POA, Physical Security, 14.8.2, page 531

41
Q

Why should life-cycle and warranty costs be calculated during proposal review?

A

Calculating those figures can reveal whether the low bidder has priced the system at a low profit margin but plans to make up the difference in high charges for maintenance.

Source: POA, Physical Security, 14.8.2, page 532

42
Q

What three things should be determined when checking references for contractors?

A

Is there good chemistry with the contractor’s representatives?
Do they have the experience and power of personality to work well with the other trades on the project?

How have they resolved problems that occurred on other projects?

Source: POA, Physical Security, 14.8.2, pages 532-533

43
Q

What is the challenge of project management?

A

To achieve all the project goals and objectives while living within the project’s time and budget constraints.

Source: POA, Physical Security, Chapter 13, page 471

44
Q

What are four constraints of all security projects?

A

Scope,
Schedule,

Budget,
Quality.

Source: POA, Physical Security, Chapter 13, page 472

45
Q

What are the five phases of a project?

A

Conception,
Planning,

Design management,
Bid process management (or participation),
Construction (or construction review).

Source: POA, Physical Security, Chapter 13, page 474

46
Q

What are seven types of barriers?

A

Walls,
Floors,

Ceilings, 
Roofs, 
Doors, 
Windows, 
Other structures, such as symbolic and natural barriers. 

Source: POA, Physical Security, 9.1, page 135

47
Q

What are two categories of safes?

A

Safes designed for fire protection,
Safes designed for protection of valuables against forcible penetration.

Source: POA, Physical Security, 9.2.1, page 163

48
Q

What is a vault?

A

Specially constructed rooms or areas intended to limit access and provide protection to the assets in the space.
The term vault also applies to specially constructed rooms or areas that are designed to protect the contents from fire, but not necessarily theft.

Source: POA, Physical Security, 9.2.2, page 171

49
Q

What are two general classes of locks?

A

Mechanical,
Electrical.

Source: POA, Physical Security, 9.3.1, page 177

50
Q

This type of lock uses an arrangement of physical parts to prevent the opening of a bolt or latch.

A

Mechanical lock.

Source: POA, Physical Security, 9.3.1, page 177

51
Q

This type of lock can be locked or unlocked by a remote device.

A

Electrical lock.

Source: POA, Physical Security, 9.3.2, page 181

52
Q

What are common design or planning criteria for lock systems?

A

Total number of locks,
Major categories of sectors of the system,

Security objectives,
Size and turnover of the population,
Related or supportive security subsystems,
Intelligence or information requirements,
Criticality of asset exposure.

Source: POA, Physical Security, 9.3.3, page 189

53
Q

What are five categories of general security lighting equipment?

A

Streetlight,
Searchlight,

Floodlight,
Fresnel,
High mast lighting.

Source: POA, Physical Security, 9.4.1, page 191

54
Q

What are the three major security purposes of lighting?

A

To create a psychological deterrent,
To enable detection,

To enhance the capabilities of video surveillance systems.

Source: POA, Physical Security, 9.4.2, page 195

55
Q

What are the four components of lighting systems?

A

Lamp,
Luminaire,

Mounting hardware,
Electrical power.

Source: POA, Physical Security, 9.4.4, pages 201-202

56
Q

What is intrusion detection?

A

The process of detecting a person or vehicle attempting to gain unauthorized entry into an area.

Source: POA, Physical Security, 11.3, page 294

57
Q

What are the basic building blocks of an intrusion detection system?

A

Sensors.

Source: POA, Physical Security, 11.3, page 294

58
Q

What are the three main characteristics of intrusion sensor performance?

A

Probability of detection,
Nuisance alarm rate,

Vulnerability to defeat.

Source: POA, Physical Security, 11.3.1, page 294

59
Q

What are three ways to defeat a sensor?

A

Bypass,
Adversary path exploitation,

Spoof.

Source: POA, Physical Security, 11.3, page 297

60
Q

What are five ways to classify intrusion sensors?

A

Passive or active,
Covert or visible,

Line-of-sight or terrain-following (for exterior sensors only),
Volumetric or line detection,
Application.

Source: POA, Physical Security, 11.3.3, page 304

61
Q

What are the seven main elements of a video surveillance system?

A

Field of view,
Scene,

Lens, 
Camera, 
Transmission medium, 
Workstation, 
Recording equipment. 

Source: POA, Physical Security, 11.4, page 344

62
Q

What questions can be asked to determine a camera system’s functional requirements?

A

What is the purpose of the system?
What specifically is each camera supposed to view?

What are the requirements for proactive risk reduction, real-time monitoring, or recorded video?

Source: POA, Physical Security, 11.4.1, page 346

63
Q

What are four reasons to have cameras in security applications?

A

To obtain visual information about something that is happening,
To obtain visual information about something that has happened,

To deter or discourage undesirable activities,
To use video analytics tools.

Source: POA, Physical Security, 11.4.2, page 347

64
Q

For which three components of a physical security program can metrics be produced?

A

Systems,
Personnel,

Compliance.

Source: POA, Physical Security, 4.2, page 58

65
Q

What is the goal of establishing metrics for physical security systems?

A

To reduce the amount of noise on the operator’s screen, thereby enabling the systems to operate efficiently.

Source: POA, Physical Security, 4.2.1, page 59

66
Q

What are common types of alarms reported in physical security system metrics?

A

Forced door,
Door held open,

Unauthorized access attempts,
User-defined actions/alarms,
Communications failure.

Source: POA, Physical Security, 4.2.1, pages 59 - 61

67
Q

What is the purpose of tracking metrics for physical security personnel?

A

Provides an understanding of the appropriate expenditures and number and type of personnel required for effective physical security operations.

Source: POA, Physical Security, 4.2.2, page 65

68
Q

What are two measurable performance categories for physical security personnel?

A

Response,
Training.

Source: POA, Physical Security, 4.2.2, page 65

69
Q

What is the purpose of equipment performance testing?

A

Determine whether equipment is functional, has adequate sensitivity, and will meet its design and performance objectives.

Source: POA, Physical Security, 15.4, page 550

70
Q

What is the purpose of personnel performance testing?

A

Determine whether procedures are effective, whether personnel know and follow procedures, and whether personnel and equipment interact effectively.

Source: POA, Physical Security, 15.4, page 550

71
Q

What are four types of equipment tests?

A

Predelivery or factory acceptance tests,
Site acceptance tests,

Reliability or availability tests,
Post-implementation tests.

Source: POA, Physical Security, 15.4, page 550

72
Q

This type of testing is conducted to demonstrate that system performance complies with specified requirements in accordance with approved factory test procedures.

A

Predelivery or factory acceptance testing.

Source: POA, Physical Security, 15.4.1, page 551

73
Q

This type of test tests all components and verifies data transmission system operation after the system has been installed and placed into service.

A

Site acceptance testing.

Source: POA, Physical Security, 15.4.2, page 552

74
Q

This type of test is conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions.

A

Reliability or availability testing.

Source: POA, Physical Security, 15.4.3, page 554

75
Q

What are six types of post-implementation tests?

A

Operational tests,
Performance tests,

Post-maintenance tests,
Subsystem tests,
Limited scope tests,
Evaluation tests.

Source: POA, Physical Security, 15.4.4, pages 555-556

76
Q

What requirements should be outlined in a warranty?

A

The contractor should be required to repair, correct, or replace any defect for a period of 12 months from the date of issue of the certificate of practical completion.

Source: POA, Physical Security, 15.4.5, page 556

77
Q

What are two main types of physical protection system maintenance?

A

Remedial maintenance or service contracts,
Preventative maintenance.

Source: POA, Physical Security, 16.1, pages 562-563

78
Q

This type of maintenance corrects faults and returns the system to operation in the event that a hardware or software component fails.

A

Remedial maintenance.

Source: POA, Physical Security, 16.1, page 562

79
Q

This type of maintenance is scheduled to keep the hardware and software in good operating condition.

A

Preventative maintenance.

Source: POA, Physical Security, 16.1, page 563

80
Q

What factors should be considered when justifying the cost of a replacement physical security system?

A

Cost of maintenance,
Lack of spare parts,

Obsoleteness of hardware and software,
Operating costs,
Unreliability.

Source: POA, Physical Security, 16.2, page 571