Dump 5 Flashcards

1
Q

What process does a security manager use in establishing priorities in the protection of assets?
a. Audit survey
b. Security survey
c. Risk analysis or assessment
d. Inspection review
e. Both B and C
f. All of the above

A

E – Both B and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The degree of protection desired in any installation is predicated on an analysis of which of the following?
a. Cost and vulnerability
b. Cost and criticality
c. Criticality and vulnerability
d. Vulnerability and environmental conditions
e. None of the above

A

C – Criticality and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A critical on-site examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excesses in determining the protection needed to make recommendations to improve overall security is the definition of a(n):
a. Full-field inspection
b. Inspection review
c. Audit survey
d. Security survey
e. None of the above

A

D – Security survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key consideration in a risk analysis or risk assessment process?
a. Vulnerability to attack
b. Probability of attack
c. Cost
d. Impact to the business if loss occurs
e. Both A and B
f. All of the above

A

F – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

From a security perspective, what is the first factor to be considered in facility construction?
a. The identity of experienced consultants
b. An effective security plan
c. The building site itself
d. An architect with knowledge of physical security
e. None of the above

A

C – The building site itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not correct regarding a security education program?
a. Many people are naïve and trusting
b. All installation personnel must be made aware of the constant threat of breaches of security
c. Structural aids to security are valueless without active support of all personnel
d. Security consciousness is an inherent state of mind
e. None of the above

A

D – Security consciousness is an inherent state of mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most vulnerable link in any identification system is:
a. Poor quality of identification badges
b. Educational background of security officers
c. Not enough security officers assigned to control posts
d. Identification cards are too small
e. Perfunctory performance of duty
f. None of the above

A

E – Perfunctory performance of duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is not true in regard to establishing and identifying personnel to control movement?
a. The identification card should be designed as simply as possible
b. Detailed instructions should be disseminated as to where, when, and how badges should be worn
c. Procedures should be designed to show employees what to do when an identification card or badge is lost
d. The identification card or badge should be designed in a relatively complicated manner to avoid duplication
e. Prerequisites should be devised and disseminated for reissue

A

D – The identification card or badge should be designed in a relatively complicated manner to avoid duplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The use of a simple codeword or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:
a. Code one
b. SOS
c. Security alert
d. Duress code
e. Basic alert

A

D – Duress code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of hanging at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to a sensitive area is referred to as a(n):
a. Two-man access procedure
b. Two-man control rule
c. Two-man rule
d. Controlled access rule
e. Information security rule
f. None of the above

A

C – Two-man rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The designation and establishment of “restricted areas” according to army regulations is performed by the:
a. Joint Chiefs of Staff
b. National Security Agency
c. The Secretary of Defense
d. The Secretary of the Army
e. The military commander of the installation or facility

A

E – The military commander of the installation or facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not a known advantage of the establishment of restricted areas?
a. They provide an increase in security without slowdown in operation
b. They provide increased security through buffer zones
c. They allow for varying degrees of security as required
d. They improve overall security
e. They make it possible to have security compatible with operational requirements

A

A – They provide an increase in security without slowdown in operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A restricted area containing a security interest or other sensitive matter, which uncontrolled movement can permit access to the security interest or sensitive matter, but within which access may be prevented by security escort and other internal restrictions and controls, is canned a(n):
a. Exclusion area
b. Controlled area
c. Limited area
d. Sensitized area
e. None of the above

A

C – Limited area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of fencing is generally used for protection of limited and exclusion areas?
a. Concertina
b. Barbed tape
c. Barbed wire
d. Chain link
e. Wood

A

D – Chain-link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Excluding the top guard, a chain-link fence for general security purposes should be:
a. 6 gauge
b. 7 gauge
c. 8 gauge
d. 9 gauge
e. 10 gauge

A

D – 9 gauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a chain-link fence with mesh openings for general security purposes, the openings should be no larger than:
a. 1 1/5 inches
b. 2 inches
c. 2 ½ inches
d. 4 inches
e. 4 ½ inches

A

B – 2 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Excluding the top guard, standard barbed-wire fencing that is intended to prevent human trespassing should not be less than:
a. 6 feet high
b. 7 feet high
c. 8 feet high
d. 9 feet high
e. 10 feet high

A

B – 7 feet high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The federal specification regarding standard barbed-wire fencing that is twisted and double strand is that it should be:
a. 8 gauge
b. 10 gauge
c. 12 gauge
d. 14 gauge
e. None of the above

A

C – 12 gauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A standard barbed-wire, twisted, double-strand fence has _____ point barbs spaced an equal distance apart.
a. 1
b. 2
c. 3
d. 4
e. 5

A

D – 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The distance in a barbed-wire fence should not exceed:
a. 2 inches
b. 3 inches
c. 4 inches
d. 5 inches
e. 6 inches

A

E – 6 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Top-guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence by at least:
a. 1 foot
b. 1 ½ feet
c. 2 feet
d. 2 ½ feet
e. 3 feet

A

A – 1 foot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A top guard must consist of:
a. Two strands of barbed wire or tape
b. Three stands of barbed wire or tape
c. Four strands of barbed wire or tape
d. Five strands of barbed wire or tape
e. Six strands of barbed wire or tape

A

B – Three strands of barbed wire or tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many inches apart should strands of barbed wire or tape used as a top guard on a fence be spaced?
a. 2
b. 3
c. 4
d. 5
e. 6

A

E – 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Unavoidable drainage ditches, culverts, vents, ducts, and other openings should be protected by security fastened weld-bar grills when they have a cross-section area greater than:
a. 10 square inches
b. 48 square inches
c. 64 square inches
d. 96 square inches
e. 104 square inches

A

D – 96 square inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Between the perimeter barrier and exterior structures should be a clear zone covering:
a. 10 feet
b. 15 feet
c. 20 feet
d. 30 feet
e. 40 feet

A

C – 20 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:
a. 10 feet
b. 20 feet
c. 30 feet
d. 40 feet
e. 50 feet

A

E – 50 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Manhole covers ______ inches or more in diameter should be secured to prevent unauthorized openings:
a. 10
b. 20
c. 30
d. 40
e. 50

A

A – 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following characteristics of protective lighting is incorrect?
a. It may be unnecessary where the perimeter fence is protected by a central alarm system
b. It usually requires less intensity than working light
c. It may also provide personal protection by reducing advantages of concealment
d. It should only be used as a psychological deterrent
e. Such lighting is expensive to maintain

A

E – Such lighting is expensive to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Measured horizontally 6 inches above ground level and at least 30 feet outside the exclusion area or barrier, the perimeter band of lighting must provide a minimum intensity of:
a. 0.2 foot-candle
b. 0.3 foot-candle
c. 0.4 foot-candle
d. 0.6 footy-candle
e. 0.10 foot-candle

A

A – 0.2 foot-candle

30
Q

Which of the following principles of protective lighting is not correct?
a. Lighting should be used with other measures, such as fixed security posts, fences, etc., and not used alone
b. A large amount of light should be focused on security patrol routes
c. Adequate, even light should be used on bordering areas
d. There should be a high brightness contrast between an intruder and the background

A

B – A large amount of light should be focused on security patrol routes

31
Q

Lighting units of four general types are used for protective lighting. Which of the following is not used?
a. Emergency
b. Movable
c. Standby
d. Intermittent
e. Continuous

A

D – Intermittent

32
Q

What is the most common protective lighting system that consists of a series of fixed luminaries arranged to flood a given area during the hours of darkness with overlapping cones of light?
a. Emergency lighting
b. Movable lighting
c. Standby lighting
d. Intermittent lighting
e. Continuous lighting

A

E – Continuous lighting

33
Q

Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
a. 0.5 foot-candle
b. 1.0 foot-candle
c. 1.5 foot-candles
d. 2.0 foot-candles
e. 3.0 foot-candles

A

B – 1.0 foot-candle

34
Q

Water approaches that extend to 100 feet from the pier should be illuminated to at least:
a. 0.5 foot-candle
b. 1.0 foot-candle
c. 1.5 foot-candles
d. 2.0 foot-candles
e. 3.0 foot-candles

A

A – 0.5 foot candle

35
Q

U.S. Army illumination intensity minimums for lighting the perimeter of a restricted area is:
a. 0.15 foot-candle
b. 0.40 foot-candle
c. 1.00 foot-candles
d. 2.15 foot-candles

A

B – 0.40 foot-candle

36
Q

What agency should be consulted before installing protective lighting adjacent to navigable waters?
a. Local law enforcement agencies
b. The Department of Transportation
c. The Bureau of Customs
d. The U.S. Coast Guard
e. Both A and B

A

D – The U.S. Coast Guard

37
Q

The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as a(n):
a. Capacitance detection system
b. Ultrasonic detection system
c. Vibration detection system
d. Electromechanical detection system
e. Microwave detection system

A

E – Microwave detection System

38
Q

The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electrostatic field around an object to be protected is known as a(n):
a. Capacitance detection system
b. Ultrasonic detection system
c. Contact microphone detection system
d. Microwave detection system
e. Radio frequency detection system

A

A – Capacitance detection system

39
Q

An alarm system in which the installation-owned system is a direct extension of the police or fire alarm system is known as a(n):
a. Central station system
b. Local alarm system
c. Proprietary system
d. Auxiliary system
e. Bell-sound system

A

D – Auxiliary system

40
Q

An alarm system that is monitored by an outside company to provide electric protective services in which they provide the appropriate actions is known as a(n):
a. Central station system
b. Local alarm system
c. Proprietary system
d. Auxiliary system
e. Bell-sound system

A

A – Central station system

41
Q

An alarm system whereby the central station is owned by and located within the installation being protected is known as a(n):
a. Central station system
b. Local alarm system
c. Proprietary system
d. Auxiliary system
e. Bell-sound system

A

C – Proprietary system

42
Q

The principle of the pin-tumbler lock can be traced back historically to:
a. Egyptians more than 4000 years ago
b. The Civil War period
c. The late eighteenth century
d. 1905
e. World War I

A

A – Egyptians more than 4000 years ago

43
Q

Which of the following is not true with regard to lock and key systems?
a. The locking system should be supplemented with other security devices
b. Most key locks can be picked by an expert in a few minutes
c. A high-quality pickproof lock is considered a positive bar to entry
d. The lock is the most accepted and widely used security device of the basic safeguards in protecting installations
e. Locks, regardless of quality or cost, should be considered as delay devices only

A

C – A high-quality pickproof lock is considered a positive bar to entry

44
Q

Of the following locks, which one type is generally considered to have the poorest security value?
a. An interchangeable core system
b. Conventional combination locks
c. Key locks
d. Manipulation-resistant combination locks
e. Both A and D
f. None of the above

A

C – Key locks

45
Q

The number of combinations possible with a lock that has 40 numbers and a 3-number combination is:
a. 12,000
b. 16,000
c. 32,000
d. 64,000
e. 86,000

A

D – 64,000

46
Q

Which lock is generally used on automobiles, desks, and cabinets?
a. Wafer
b. Ward
c. Pin tumbler
d. Combination
e. Cypher

A

A – Wafer

47
Q

Which of the following is not true with regard to door latches?
a. A dead-bolt latch is easy to install and can be used on almost any door
b. Chain latches are highly recommended as effective security measures
c. A dead-bolt latch is very expensive
d. A dead-bolt latch increases the security posture of the facility
e. Both B and C
f. Both A and D

A

E – Both B and C

48
Q

An inventory of key systems should be conducted at least:
a. Weekly
b. Monthly
c. Quarterly
d. Semiannually
e. Annually

A

E – Annually

49
Q

A sentry dog normally does not perform as well as:
a. Radar sites
b. Warehouses
c. Gasoline storage aeras
d. Ammunition storage areas
e. Offices containing classified materials

A

C – Gasoline storage areas

50
Q

Which of the following is more of a probable disadvantage in the use of sentry dogs?
a. A dog is more effective than a human during inclement weather
b. A dog has a keen sense of smell
c. A dog provides a strong psychological deterrent
d. The type of dog best suited for security work is naturally dangerous
e. A dog can detect and apprehend intruders

A

D – The type of dog best suited for security work is naturally dangerous

51
Q

In meeting federal specifications, insulated units must have the following fire-resistant minimum ratings:
a. Class 150: two hours
b. Class 150: four hours
c. Class 350: three hours
d. Class 350: four hours

A

C – Class 350: three hours

52
Q

In meeting minimal federal specifications, non-insulated security containers must satisfactorily pass a drop test of:
a. 15 feet
b. 20 feet
c. 22 feet
d. 25 feet
e. 30 feet

A

E – 30 feet

53
Q

In meeting minimal federal specifications, government security containers must be equipped with a combination lock capable of resisting manipulation and radiological attack for:
a. 10 man-hours
b. 20 man-hours
c. 30 man-hours
d. 40 man-hours
e. 45 man-hours

A

B – 20 man-hours

54
Q

Which of the following is not an approved UL safe classification?
a. 350-1
b. 350-2
c. 350-3
d. 350-4
e. None of the above

A

C – 350-3

55
Q

Underwriters Laboratories does independent testing on security containers that simulate a major fire where the heat builds up gradually to:
a. 7500p
b. 10000p
c. 20000p
d. 25000p
e. 30000p

A

C – 20000P

56
Q

The acceptable vault construction of insulated doors has a minimal reinforced concrete wall, floor, and ceiling of:
a. 4 feet
b. 6 feet
c. 8 feet
d. 10 feet
e. 12 feet

A

B – 6 feet

57
Q

Which of the following would be a UL computer media storage classification?
a. 100-4
b. 150-4
c. 250-4
d. 350-4
e. 450-4

A

B – 150-4

58
Q

Safes that are UL classified must be anchored to the floor or must weigh at least:
a. 750 lbs
b. 1000 lbs
c. 1500 lbs
d. 2000 lbs
e. 3000 lbs

A

A – 750 lbs

59
Q

Which of the following is not generally true regarding money safes?
a. Those manufactured prior to 1960 have round doors
b. They provide good protection against fire
c. They always have wheels
d. Today, money safes have square doors
e. Both B and C
f. All of the above

A

E – Both B and C

60
Q

A “re-lock” on a vault door will automatically prevent the bolt mechanism from operating when:
a. A timer is used
b. A switch is flipped
c. There is an attack on the door or the combination lock
d. It is locked by remote control
e. All of the above

A

C – There is an attack on the door or the combination lock

61
Q

Money safes are classified by both Underwriters Laboratories and:
a. The Bureau of Standards
b. The American Society for Industrial Security
c. The Federal Deposit Insurance Corporation
d. The Insurance Services Office

A

D – The Insurance Services Office

62
Q

Security vaults differ from safes in that:
a. They do not have both fire and burglary resistant properties
b. Steel is used
c. They are tested by UL for burglary resistance
d. They are permanently affixed to the building
e. None of the above

A

D – They are permanently affixed to the building

63
Q

Most theft is committed by:
a. Professionals
b. Organized crime
c. Amateurs
d. Maladjusted criminals
e. Semiprofessionals

A

C – Amateurs

64
Q

An experienced safecracker will ordinarily use which of the following methods?
a. Trying the maintenance standard combination
b. Trying the day combination
c. Trying the handle
d. All of the above
e. None of the above

A

D – All of the above

65
Q

Which of the following methods has not been used in recent years to crack open record and money safes?
a. Punching
b. Core drilling
c. Using a fluoroscope
d. Torching
e. Using a laser beam

A

E – Using a laser beam

66
Q

The weakness of the burning bar as a burglar tool is that:
a. It will not burn through concrete
b. Its actual heat is not intense enough
c. It requires hydrogen tanks
d. It produces a large volume of smoke
e. All of the above

A

D – It produces a large volume of smoke

67
Q

A 50 percent insurance discount is generally allowed to protect a safe it:
a. The premises are guarded by security guards
b. The premises are open 24 hours a day
c. Multiple coverage is purchased
d. The safe is UL tested
e. The safe has wheels

A

B – The premises are open 24 hours a day

68
Q

Which of the following is not correct with regards to safes?
a. Money safes do not have accredited fire resistance
b. UL classification labels are removed from all safes exposed to fires
c. Record safes are designed to resist fires only
d. Quality equipment should be purchased only from reputable dealers
e. Insulation in record safes more than 30 years old may negate fire-resistant qualities
f. None of the above

A

F – None of the above

69
Q

The UL symbol “TRTL” indicates:
a. The type of locking device used
b. That the safe is resistant to both torches and tools
c. That the safe is resistant to torches
d. That the safe is resistant to tools
e. None of the above

A

B – That the safe is resistant to both torches and tools

70
Q

Vaults are designed to meet most fire protection standards that are specified by the:
a. Local fire department
b. American Society for Industrial Security
c. National Fire Protection Association
d. All of the above
e. None of the above

A

C – National Fire Protection Association

71
Q

Fire-resistant safes must pass which of the following tests?
a. Explosion
b. Impact
c. Fire exposure
d. All of the above
e. None of the above

A

D – All of the above

72
Q

Which of the following methods of attacking newer-model safes is considered to be impractical?
a. Peel
b. Punch
c. Burn
d. Manipulation
e. Explosion

A

D - Manipulation