FINALS Second Year Flashcards

1
Q

While keeping people and property safe and secure is serious business, that doesn’t mean a security officer can’t also be friendly and helpful.

A

CUSTOMER RELATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This gives them a sense of personal contact and helps you mention who is coming and going in your building.

A

CUSTOMER CONTACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Being polite and friendly while maintaining professionalism goes a long way toward putting people at ease while still making them feel secure.

A

COMMUNICATION SKILLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Offering assistance when you’re able is an effective method of customer service.

A

ASSISTANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your job likely comes with some specific rules for dealing with many issues, from confrontations to emergencies.

A

FINDING BALANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of security applied to business groups engaged in industries like manufacturing assembling research and development, processing, warehousing and even agriculture.

A

INDUSTRIAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of security applied to hotels where its properties are protected from pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guests themselves. This type of security employs house detectives, uniform guard and supervisor and insures that hotel guests and their personal effects safeguarded.

A

HOTEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel are trained to safeguard and properties as well as the supermarket personnel bank and assets while in storage, in transit and during transaction.

A

BANK SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of security applied for the protection of top-ranking officials of the government of private entity, visiting persons of illustrious standing and foreign dignitaries.

A

VIP SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.

A

SCHOOL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel are trained to detect shoplifter, robbery, and bomb detection and customer relation.

A

SUPERMARKET OR MALL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the total of all physical protection employed or installed to secure assists.

A

PHYSICAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is the sum total of procedures followed, inquiries conducted, and criteria applied to determine the work suitable of a particular applicant or retention or transfer of a particular employee.

A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Complete or partial background investigation is conducted to determine whether the
Applicant should hire or not, or the same investigation is conducted to determine whether the employee should remain in his present position or to be transferred to less or non-sensitive position.

A

PROCEDURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a process of determining the loyalty, honesty, integrity, reputation, and others of a particular applicant or employee.

A

INQUIRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enumerated standard, like education, experience, age, citizenship, and family background, potential is being verified if true or not

A

CRITERIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any classified information or document from compromise or loss.

A

DOCUMENT AND INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security document and information are the responsibility of all concerned.

A

POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anybody found guilty of violating document and information security shall deal with accordingly.

A

REGULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access to information is based on the “need to know” and not by position.

A

DOCTRINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authority to have access to classified information is not permanent but can be withdrawn by the originating authority.

A

PRACTICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Are being used to defined, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.

A

PHYSICAL SECURITY / PHYSICAL SECURITY MEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In most cases espionage, acquisition of information is the ultimate result, and means and form in which information is obtained is merely an operational detail. Normally, information on tapes and film is as usable as the original documents. Therefore, in considering access, one should think not only of current physical access, but also access to the discussion of the matter by the use of clandestine listening device.

A

ENEMY AGENTS MUST HAVE ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In an unfriendly government or organization is willing to devote enough time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build defense in depth by using then one barrier.

A

THERE IS NO IMPENETRABLE BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to neutralize the act of espionage because surreptitious entry is not usually detected.

A

SURREPTITIOUS VS NON-SURREPTITIOUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Since each installation is different each will have different problems to overcome. The security procedures will not be adequate for all installations.

A

EACH INSTALLATION IS DIFFERENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Refers to any physical structure whether natural or manmade capable or restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.

A

BARRIERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Minimum Acceptable Requirements for Fence used as Security Barrier: HEIGHT

A

8 FEET AT MINIMUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Minimum Acceptable Requirements for Fence used as Security Barrier: SLACK AT THE BOTTOM

A

NOT TO EXCEED TWO INCHES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Minimum horizontal dimension of four inches by four inches.

A

WOODEN FENCE POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The round type should be at least two inches in diameter and the H-beam type must measurable no less than two inches at the smallest diameter.

A

STEEL FENCE POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Should be set in concrete or in firm soil using commercial drive anchors, to a depth of three feet; Maximum distance between posts is ten feet.

A

FENCE POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

There should be something on the top of the fence to deter persons attempting to go over the fence good example would be the use of barbed wire overhand, holding the stands of barbed wire should be two feet long and should be extended at 45-degree angle in the direction of the expected approach.

A

FENCE TOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The area surrounding the fence should be clear of trees and vegetation and debris or other materials which would offer concealment to the intruder or would aid him in scaling.

A

FENCE AREA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Gates should be limited to the number necessary for efficient and safe operation of the installation.

A

FENCE GATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

All opening in the fence in excess of 96 inches must be lock, barred, or screened in such way that they may only be unlocked and opened from the inside and only by selected personnel.

A

FENCE OPENING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

If used, it should be at least ten feet apart and the overhang on the top of the inner fence should point inward rather than away from the installation maximum distance any two parallel fences should not exceed 150 feet.

A

MULTIPLE FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of the intruder.

A

NATURAL BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Are structural construction like fences walls, floors, roofs, grills, bars, road blocks, or other physical means to deter or impede penetration.

A

MAN-MADE BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

It includes bodies of waters, mountains, marshes, ravines, desert or other terrain that are difficult to traverse.

A

NATURAL BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.

A

STRUCTURAL BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Persons being used in providing a guarding system or by the nature of their employment and location, fulfil security functions. Examples are guards, office personnel, shop workers, etc.

A

HUMAN BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys could also be included.

A

ANIMAL BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lightning, alarm system and any electronic devices used as barriers.

A

ENERGY BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Perimeter fences / barriers.

A

FIRST LINE OF DEFENSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Doors, floors, windows, walls, roofs and grills and other entries to the buildings.

A

SECOND LINE OF DEFENSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Storage system like steel cabinets, safes, vaults and interior files.

A

THIRD LINE OF DEFENSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.

A

PERIMETER BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A line adjacent to protected area, and passing through points of possible entry into the area, such as doors, windows, skylights, tunnel or other points of access.

A

INSIDE PERIMETER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A line of protection surroundings but somewhat removed from a protected area, such as a fence.

A

OUTSIDE PERIMETER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Can be barbed wire, chain link or concertina.

A

WIRE FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Type of wire fence used for permanent structure.

A

CHAIN LINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Type of wire fence used for semi-permanent.

A

BARBED WIRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Type of wire fence used for the least permanent and also can be used as a temporary road block or impediment during strikes and crowd control.

A

CONCERTINA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Are attractive and low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the openings are small to prevent passage of pilfered article.

A

WIRE FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the movements of the guards in the installation.

A

SOLID FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

It prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and concealment.

A

SOLID FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

It is constructed in such a way that visual access is permitted through the fence. Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the installation under observation.

A

FULL-VIEW FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

It allows the intruder to become familiar with the guard patrols thereby allowing him to pick the time that is advantageous on his part.

A

FULL-VIEW FENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Walls, Floors, roof or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing.

A

BUILDING WALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive activity will be done should be given special emphasis in protective walls.

A

WALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier.

A

BODIES OF WATER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

When not in use and controlled by guards, gates and doors in the perimeter should be locked and frequently inspected by guards. Lock should be changed from time to time and should be covered under protective locks and key control.

A

GATES AND DOORS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

These provide access to areas within the perimeter barrier and should be locked and guarded.

A

SIDE-WALK ELEVATORS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.

A

UTILITIES OPENING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may provide seeking unauthorized entry.

A

CLEAR ZONES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

This increases the protective height and prevents easy access.

A

TOP GUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

This is normally provided at main perimeter entrances to secure areas located out-of-doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.

A

GUARD CONTROL STATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

This is a house like structure above the perimeter barriers. The higher the tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or temporary, must have a corresponding support force in the event of need.

A

TOWER GUARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Fencing barriers and protective walls should always be regularly inspected by security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be repaired immediately and guard vigilance should be increased.

A

BARRIER MAINTENANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

In large open areas or ground where fencing or walling is impractical and expensive, warning signs should be conspicuously placed.

A

PROTECTION IN DEPTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Should be erected where necessary in the management of unauthorized ingress to preclude accidental entry.

A

CONTROL SIGNS / SIGNS AND NOTICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Personal inspection of all guards prior to their starting tour of duty. Periodic checks of guards during their tour by the senior member of each relief or his representative.

A

PERSONAL SUPERVISION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Guard takes with him on his tour of duty a form which must have the time punched on it at each station.

A

RECORDED TOUR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

This is where the guard sends signals to guard headquarters from each station that he checks.

A

SUPERVISORY TOUR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Direct line telephone or in some instances radio.

A

PRIMARY COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

ex. Messengers.

A

EMERGENCY COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.

A

PROTECTIVE LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

The most familiar type of outdoor security lighting, this is designed to provide two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of darkness.

A

CONTINUOUS LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The intensity is focused to the intruder while the observer or guard remained in the comparative darkness, the lighting is toward of the approach of an entrance to an installation.

A

GLARE PROJECTION TYPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

The lighting is focused on the pile of items, rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needs.

A

CONTROLLED LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most useful to selectively light a particular area in an occasional basis.

A

STANDBY LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

This system is manually operated and is usually made up of movable search or floodlights that can be located in selected or special locations which will require lighting only for short period of time.

A

MOVABLE OR PORTABLE LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

This system is used in times of power failure or other emergencies when other system is inoperative.

A

EMERGENCY LIGHTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on.

A

INCANDESCENT LAMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

It is considered more efficient that he incandescent and used widespread in exterior lighting. This emits a purplish white color, caused by an electric current passing through a tube of conducting and luminous gas.

A

MERCURY VAPOR LAMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

It has similar physical appearance to mercury vapour but provides a light source of higher luminous efficiency and better color rendition.

A

METAL HALIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

This provides good color rendition, high lamp efficiency as well as long life. However, it cannot project light over long distance and thus are not desirable as flood type lights.

A

FLUORESCENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

This has gained acceptance for exterior lighting of parking areas, roadways, buildings and commercial interior installations. Constructed on the same principle as mercury vapour lamps, they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.

A

HIGH PRESSURE SODIUM VAPOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

These can be used to accommodate most outdoor security lighting needs, including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.

A

FLOODLIGHTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

This lighting equipment received the most widespread notoriety for its value in reducing crime.

A

STREET LIGHTS

92
Q

These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.

A

SEARCH LIGHTS

93
Q

These are wide beam units, primary used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. It projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

A

FRESNEL LIGHTS

94
Q

Should be lighted about 25 feet on either side of the gate if possible and the range for vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can also be used if glare is strictly controlled.

A

PEDESTRIAN GATE

95
Q

Normally manned by guards inspecting credentials, as well as inspecting for contraband or stolen property, it is critical that the area to be lighted to at least one-foot candle.

A

VEHICULAR GATE

96
Q

This include vital building, storage depots, and vulnerable control points in communication power, light and were distribution system.

A

PARKING AREA

97
Q

Used for pedestrian, vehicles or forklift should be lighted to 0.01 candles for security purpose.

A

THOROUGHFARE

98
Q

Large opened working areas, piers, docks, and other sensitive areas

A

STORAGE

99
Q

Is an aural or visual signal given by the annunciator to security when intruder actuates device in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated circuits.

A

ALARM

100
Q

Are designed to alert security personnel to consummated or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the circuitry, a beam or radiated waves.

A

ALARM SYSTEM

101
Q

It assists the security in detecting, impeding or deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound.

A

PROTECTIVE ALARM

102
Q

It emits the aural or visual signals or both.

A

SENSOR OR TRIGGER DEVICE

103
Q

A circuit which transmit the message to the signaling apparatus.

A

TRANSMISSION LINE

104
Q

It is the signaling system that activates the alarm.

A

ENUNCIATOR

105
Q

A type of alarm where the control station is located outside the plant or installation. When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.

A

CENTRAL STATION SYSTEM

106
Q

Centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; fire fighters, police, an ambulance or a bomb disposal unit.

A

PROPRIETARY SYSTEM

107
Q

This system consists of ranging up a visual or audible alarm near the object to be protected. When an intruder tries to pry a window, the alarm thereat goes off.

A

LOCAL ALARM

108
Q

Company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is possible. The company maintains the equipment and lines both for the company and those in the police, fire and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or cell phones.

A

AUXILIARY ALARM

109
Q

This is local alarm system in which a bell or siren is sounded with no predictable response. These systems are used in residence or small retail establishment which affords a respond system. The hope is that a neighbor or passing patrol car will reach to the alarm and call for police assistance, but such a call is purely a matter of chance.

A

LOCAL ALARM BY CHANCE SYSTEM

110
Q

This system is set to dial a predetermined number or numbers when the alarm activates. The number selected might be the police or the subscriber’s home number, or both. When the phone is answered, a recording states that an intrusion in progress at the location so alarmed.

A

DIAL ALARM SYSTEM

111
Q

It will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in walls, ceilings and floors of the protected area.

A

AUDIO DETECTION DEVICE

112
Q

It will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected area. This is economical and easily installed, high salvage value, and flexible in application.

A

VIBRATION DETECTION DEVICE

113
Q

It will detect any action that moves that fail or wire. An electrically charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected area. This is consistent trouble-free service, and causes few nuisance alarms.

A

METALLIC FOIL OR WIRE

114
Q

A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated.

A

LASER BEAM ALARM

115
Q

An invisible/visible beam is emitted and when this is disturbed or when an intruder break contact with the beam, it will activate the alarm.

A

PHOTOELECTRIC OR ELECTRIC EYE DEVICE

116
Q

A pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a moving object, they return at a different frequency which results in initiating an alarm signal. Very effective for protection of interior areas. This have a good Coverage, and Not affected by air current noise sound.

A

MICROWAVE MOTION DETECTION DEVICE

117
Q

Are place on the floor in such a position that tellers may activate the alarm by placing the front of their foot to engage the activation bar.

A

FOOT RAIL ACTIVATOR

118
Q

Are usually place in the teller’s cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.

A

BILL TRAPS OR CURRENCY ACTIVATION DEVICES

119
Q

These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from seated position.

A

KNEE OR THIGH BUTTONS

120
Q

Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the robbers.

A

FOOT BUTTON

121
Q

Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.

A

DOUBLE SQUEEZE BUTTON

122
Q

Is one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards if the installation against any possible surreptitious entry.

A

LOCK

123
Q

Defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place.

A

LOCK

124
Q

A term in England for lock picker, safecracker, and penetrator or restricted areas or room.

A

PETERMAN

125
Q

It uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used to align these internal barriers so that the lock may be operated.

A

KEY OPERATED MECHANICAL LOCK

126
Q

Designed for the use of the automobile industry and are in general use in car doors today, because this lock is easy and cheap to be manufactured, its use has expanded to other areas such as desk, files and padlocks. The delay afforded is approximately ten minutes.

A

DISK TUMBLER LOCK

127
Q

Are difficult to define in terms of security, since they vary greatly in their effectiveness. These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these locks are used in desk, lockers and cabinets and are generally less secure than pin tumbler lock.

A

LEVER TUMBLER LOCK

128
Q

Offer very little security, this type of lock must therefore be use only to have privacy, but not to provide a degree of security.

A

WARDED LOCK

129
Q

A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secured.

A

PADLOCK

130
Q

Instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other symbols as reference point which enables an operator to align them manually.

A

COMBINATION LOCK

131
Q

A type of lock that can be opened by pressing a series of numbered button in the proper sequence.

A

CODE-OPERATED LOCK

132
Q

A type of lock that can be opened and closed remotely by electrical means.

A

ELECTRICAL LOCK

133
Q

A type of lock operated by coded card.

A

CARD-OPERATED LOCK

134
Q

A specific key, which operates the lock and has a particular combination cuts, or biting, which match the arrangement of the tumblers in the lock.

A

CHANGE KEY

135
Q

A key that will open all the lock within a particular area or grouping in a given facility.

A

SUB-MASTER KEY

136
Q

A special key capable of opening a series of lock.

A

MASTER KEY

137
Q

A key that will open everything in a system involving two or more master key groups.

A

GRAND MASTER KEY

138
Q

Once an effective key control has been installed, positive control of all keys must be gained and maintained. This can be accomplished only if it is established in conjunction with installation of new locking devices.

A

KEY CONTROL

139
Q

A well-constructed cabinet will have to be produced. The cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all times.

A

KEY CABINET

140
Q

Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.

A

KEY RECORD

141
Q

Periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.

A

INVENTORIES

142
Q

In addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.

A

AUDITS

143
Q

Should be made to the person responsible for key control from the personnel department indicating all person who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to ensure that the key is covered.

A

DAILY REPORT

144
Q

Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison correctional in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.

A

ARTICLE 304 REVISE PENAL CODE

145
Q

The term “False Key” shall be deemed to include:

a) The tool mentioned in the next proceeding articles.
b) Genuine keys stolen from the owner.
c) Any key other than those intended by the owner for used in the lock forcibly opened by the offender.

A

ARTICLE 305 REVISE PENAL CODE

146
Q

The final line of defense at any facility is in the high security storage where papers, records, plans or cashable instrument, precious metals or other especially valuable assets are protected. These security containers will be of a size and quality, which the nature of the business dictates.

A

SECURITY CABINET

147
Q

A metallic container used for the safekeeping of documents or small items in an office or installation. Can be classified as either robbery or burglary resistance depending upon the use and need.

A

SAFE

148
Q

A safe should not have at any one time a temperature above 350 degrees Fahrenheit.

A

FIRE ENDURANCE

149
Q

Test to determine if sudden rise in temperature will not cause the safe to rupture. If the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed the explosion test.

A

EXPLAINS HAZARD TEST

150
Q

Aimed at determining the strength of a safe to withstand the collapse of a building during fire.

A

FIRE AND IMPACT TEST

151
Q

Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room.

A

VAULT

152
Q

A cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside.

A

FILE ROOM

153
Q

Identification cards, passes, passwords, etc.

A

ARTIFICIAL RECOGNITION

154
Q

The badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates.

A

SINGLE PASS SYSTEM

155
Q

An exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification.

A

PASS EXCHANGE SYSTEM

156
Q

This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.

A

MULTIPLE PASS SYSTEM

157
Q

Are those areas where access is restricted as to entrance or movement by all authorized personnel and vehicles. It should additionally mark by a fence or other barrier, and access to it should limited to as few guests as possible.

A

CONTROLLED AREA

158
Q

Are those within the controlled area where a greater degree of security is required.

A

LIMITED AREA

159
Q

Are used only for handling and storage of high value cargo and classified documents. The number of people authorized to enter this area should be strictly limited, and the area should be under surveillance at all times.

A

EXCLUSION AREA

160
Q

Controlling traffic in and out within a facility is essential to its security program. Perimeter barriers, locked doors and screened windows, prevent or deter the entry of unauthorized visitors, but since some traffic essential to every operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.

A

TRAFFIC CONTROL SYSTEM

161
Q

The most practical and generally accepted system is the use of badges and identification cards. Generally speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a system in cancellation and re-issue of all passes; either as a security review or when a significant number of badges have reported lost or stolen.

A

PERSONNEL IDENTIFICATION

162
Q

Security should establish proper methods of establishing the authority for admission of visitors as well as the limitation thereat.

A

VISITORS MOVEMENT CONTROL

163
Q

All visitors to any facility should be required to identify them and should be given a visitor’s ID by the security. Should be filled up with the named of visitors, nature and duration of visit.

A

VISITOR’S LOGBOOK

164
Q

Taking of photographs should also be considered. Extreme caution must be exercised in areas where classified information is displayed to preclude unauthorized taking of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with corresponding receipt.

A

PHOTOGRAPH

165
Q

If possible, visitors should be escorted by the security to monitor their activity within the establishment and guide them where to go.

A

ESCORT

166
Q

Separate access for visitors and employees of the establishment should be provided.

A

VISITOR ENTRANCES

167
Q

If there is a long delay or time lapse between the departure and arrival, the visitors may be required to show cause for the delay.

A

TIME TRAVELED

168
Q

Every facility must establish a system for the control of package entering or leaving the premises. However, desirable it might seem it is simply unrealistic to suppose that a blanket rule.

A

PACKAGE MOVEMENT CONTROL

169
Q

Of the three major aspects of security, this is considered as the most important. This is for the simple reason that security involves people, both an asset to be protected and as source of security threats.

A

PERSONNEL SECURITY

170
Q

This technique is very expensive but necessary in personnel security. It serves to verify information on the application form and to obtain other information pertinent to the decision to employ.

A

BACKGROUND INVESTIGATION

171
Q

Is the process of inspecting or examining with careful thoroughness. Is a personal interview conducted under stress. It is based on information previously given by the applicant. Other information issued during the interview, such as those discovered in the BI, which confirms or denies which given by the applicant.

A

POSITIVE VETTING

172
Q

Is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behaviour, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid Report is an example of honesty test.

A

PROWLING

173
Q

This process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.

A

DECEPTION DETECTION TECHNIQUES

174
Q

This type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning to debt ratio.

A

FINANCIAL AND LIFESTYLE INQUIRY

175
Q

This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.

A

UNDERCOVER INVESTIGATION

176
Q

This a valuable tool because it gives departing employees an opportunity to list grievances. It offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of company issued property and confronting a departing employee of this has resulted in reducing losses of company property. Debriefing an employee is also incorporated into the exit interview to remind employees of their continuing legal obligation to safeguard confidential company information.

A

EXIT INTERVIEW

177
Q

Is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.

A

SECURITY EDUCATION

178
Q

Are to acquaint all the employees the rationale behind the security measures and to insure their cooperation at all times.

A

SECURITY EDUCATION PROGRAM

179
Q

It is the first contact of the prospective employee wherein the interviewer determines the suitability of the applicant for employment through his given answer on the different type of questions being conducted. It is in this stage where; the interviewer may start providing the necessary information as to the overview of company security policies and at the same time on the employee accountability and corresponding penalties that could result from violation there from.

A

INITIAL INTERVIEW

180
Q

It is in this stage where new employees receive detailed presentation of personnel security policy. Usually handouts or employee’s manual are being distributed for reference. New employees also requested to sign acknowledgement that they have been aware of the existing company policies and will abide the same.

A

ORIENTATION AND TRAINING

181
Q

It is design to remind employees of the company about their responsibilities, review the guidelines and policies, introduction of new policies and regulations and a movement of getting employees feedback about the company policies that is being implemented.

A

REFRESHER CONFERENCE

182
Q

This employed as an indirect approach of educating the employees, such as posting security posters and distributing fliers.

A

SECURITY REMINDERS

183
Q

It is the act of emphasizing the importance and role of security achieving the company goals and objectives. It involves security employee cooperation and support.

A

SECURITY PROMOTION

184
Q

Letters, diary and notebooks. These should be treated usually the same with official document.

A

PERSONAL DOCUMENT

185
Q

Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.

A

OFFICIAL DOCUMENT

186
Q

Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes various stages from the time it is created until it is finally disposed.

A

DOCUMENT/INFORMATION CYCLE

187
Q

Is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.

A

TOP SECRET (GREEN COLOR CODE)

188
Q

Is any information and material, the unauthorized disclosure of it would endager national security cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a foreign nation.

A

SECRET (RED COLOR CODE)

189
Q

Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and of advantage to and be of advantage to a foreign country.

A

CONFIDENTIAL (BLUE COLOR CODE)

190
Q

Is any information and material which requires special protection other than those determines confidential, secret and top secret.

A

RESTRICTED (WHITE OR NO COLOR CODE)

191
Q

In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.

A

CLASS I - VITAL DOCUMENTS

192
Q

This includes records the reproduction of which will close considerable expense and labor, or considerable delay.

A

CLASS II - IMPORTANT DOCUMENTS

193
Q

This includes records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present restoration of the business.

A

CLASS III - USEFUL DOCUMENTS

194
Q

This record are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class represent the bulk of records which should not be even attempted to be protected in the event of disasters. They should, however, be kept in ordinary files ready for reference, if needed, and usually discarded after some period of time.

A

CLASS IV - NON-ESSENTIAL DOCUMENTS

195
Q

This consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who don’t know or use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving materials, a pattern for a machine or device, or a list of customers. It differs from other secret information as to single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the business.

A

TRADE SECRETS

196
Q

This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.

A

PATENTS

197
Q

Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of property or disruption of the activity of the installation.

A

SECURITY HAZARD

198
Q

These are hazards which arise from natural phenomena. The following are types of natural hazard or disasters

A

NATURAL HAZARD

199
Q

These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or installation.

A

HUMAN OR MAN-MADE HAZARD

200
Q

Aims to protect people from physical violence, whether from the state or external states, from violent individuals and sub- state actors, from domestic abuse, or from predatory adults. For many people, the greatest source of anxiety is crime, particularly violent crime.

A

VIP SECURITY

201
Q

Very important Person

A

VIP

202
Q

One or more persons accompanying another to give guidance or protection or to pay honor.

A

ESCORT

203
Q

A person or a grouped of persons usually armed and responsible for the physical safety of one or more specific person.

A

BODY GUARD

204
Q

Covers the surrounding areas of engagement. conducts prophylactic (neutralize the area), operations in the area of engagement.

A

AREA SECURITY

205
Q

Secures the immediate areas surrounding the place of engagement. Usually these are the uniformed men.

A

PERIMETER SECURITY

206
Q

This are the advanced security at the place of engagement before the arrival of the VIP. Sanitize the engagement area.

A

ADVANCE SECURITY

207
Q

Accompanies the VIP where ever he goes. Maximum of four (4) persons.

A

CLOSE-IN SECURITY

208
Q

On standby for possible back- up / re- enforcement.

A

RESERVE SECURITY

209
Q

Neutralize the possible route of the VIP party.

A

ROUTINE SECURITY

210
Q

Is a decisive point of a condition, improper handling on which immediately places under threat or danger of one’s life, limbs, freedom and property.

A

CRISIS

211
Q

Is the totality of action of handling or responding to a given crisis situation.

A

CRISIS MANAGEMENT

212
Q

Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property, before, during, and after any given crisis situation.

A

CRISIS MANAGEMENT PLAN

213
Q

Events caused by force of nature

A

NATURAL CRISIS

214
Q

Events caused through instrumentality of men.

A

MAN-MADE CRISIS

215
Q

Is a condition of an enterprise whereby normal work operation is stopped as a result of a strike and lockout.

A

WORK STOPPAGE

216
Q

Is a temporary stoppage of work by concerned action or employees as a result of a current labor industrial dispute.

A

STRIKE

217
Q

Is the temporary refusal of any employer to furnish work.

A

LOCKOUT

218
Q

The transfer of thought from the mind of one person to the mind of another thought a common medium or channel.

A

COMMUNICATION

219
Q

The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written and other forms.

A

CONFERENCE

220
Q

Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.

A

MEDIUM COMMUNICATION

221
Q

Is the common medium of communication in Baguio City

A

ILOCANO

222
Q

Is the process of sending and receiving messages to achieve understanding.

A

COMMUNICATION

223
Q

refers to the equipment’s being used to transfer thoughts or ideas.

A

CHANNEL OF COMMUNICATION

224
Q

Communication on electromagnetic waves transmitted through the space.

A

HAND HELD RADIO OR WALKIE TALKIE

225
Q

For hobby and emergency purposes type of radio.

A

AMATEUR RADIO

226
Q

For business purposes type of radio.

A

COMMERCIAL RADIO