Flashcards 47 - 95

1
Q
  1. Budgetary estimates are?

A cost estimate of each security so_____ for budgeting and planning purposes.

A

Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Three types of project estimates?
A

Budgetary estimates
Preliminary Design estimates
And Life cycle cost estimates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The 7 procedures to be covered when creating a detailed estimate?

S, CL, EC, Subs,
OIA, IC, PR

A

S – Spreadsheet format (Use a spreadsheet format)
• C – Components list (Develop a list of components and their prices)
• E – Equipment costs (Identify special equipment and prices/rates)
• S – Subsystems (PPS) (Identify PPS subsystems)
• P – Preparation for install (Identify other installation activities)
• I – Installation crews (Form installation crews)
• P – Productivity rates (Establish productivity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The 7 procedures to be covered when creating a detailed estimate?

S, CL, EC,
IDSS, IDOIA, FIC, and EPR

A

S – Use a spreadsheet
CL - components list
EC - equipment costs
IDSS – Identify PPS subsystems
OIA – Identify other installation activities
IC – Form installation crews
PR – Establish productivity rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The four stages of a project?

Project F__ D___ E___& C____

A

Feasibility
Development
Execution and
Closeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. In what stage of the project should any changes in scope, deliverables or activities be subject to a more systematic change process & submitted to the change review board (CRB)?
A

Stage 3…Project execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. The seven deliverables of the planning stage?

PM, PT, RA, PM, BE, DC and C and LR

A

PM→ Selection of Project Manager
PT → Selection of Project Team
RA → Risk Assessment Report
PM → Procurement Method
BE → Budgetary Estimates
DC→ Design Criteria
C and LR → Contracting and Legal Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Two types of physical barriers?
A

Natural and Structural barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. This type of barrier includes fields, rivers, cliffs, marshes & deserts?
A

Natural barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. This type of barrier includes berms, ditches, trees and shrubs, fences doors and glazing materials?
A

Structural barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Three common means of preventing trespassing?
A

Walls
Chain link fences
Moats and other barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Six considerations when erecting a chain link fence?

People build fences for good territory

A

• People → Posts
• Build → Bracing
• Fences → Fabric
• For → Fence top treatment
• Good → Gates
• Territory → Turnstiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. When should barbed wire be installed atop a fence?
A

If the fence is intended to deter human trespassing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A cement apron under a fence is installed to….
A

Prevent individuals or objects from going under the fence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The 8 considerations when placing physical barriers and site hardening?
A

Target attractiveness and overall risks to the site
Nearby perimeter and adjacencies
Perimeter options & outer and inner security systems
Cost effectiveness
Response directives & operational procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. When are planters an effective vehicle barrier?
A

When properly anchored to the ground.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Sturdy and short cylindrical posts meant to divert traffic or absorb vehicular impact?

Bo______

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. The purpose of a turnstile?
A

Control pedestrian traffic and

Minimizing tailgating or (piggybacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Five measures to strengthen doors are?

SP, KP, AF, SS & SW

A

• Strength → Steel plates
• Keeps → Kick plates
• All → Anchoring frames
• Structures → Set screws (in hinges)
• Secure → Spot welding (hinges)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. 5 types of window glass?

A or P
T
W
L
B/B-r

A

• A or P→ Annealed or plate
• T→ Tempered glass
• W→ Wired glass
• L→ Laminated glass
• B/B-r→ Bullet/Burglar resistant glass

21
Q
  1. Four window-related security materials?

WB
BC
WF
SS

A

WB→ Window Bars
BC → Blast Curtains
WF → Window Film
SS → Security Shutters

22
Q
  1. At what dimension should opening be fortified?
A

96 square inches

619 square centimeters

23
Q
  1. Four key factors in hardening a facility?

SOD,
SI
P PC
R of OS

A

• Some → Stand-off distance
• Strong → Structural integrity of the premises
• Protections → Prevention of progressive collapse
• Required → Redundancy of operating systems

24
Q
  1. Four typical objectives of an access control system?

P AAA to
D, M & P
PRO
PRO

A

-Permit authorized assets access to controlled areas;
-Detect, minimize & prevent access or exit of unauthorized assets from controlled areas.
-Provide information to security personnel for the assessment and response to unauthorized entry
-provide a record of who, what, when, where and how accesss to controlled areas was granted.

25
Q
  1. Three types of credentials that can be validated in an electronic access control system?
A

-Something an asset has - key or credential
-something and asset knows - id# or code;
-something an asset is - biometric id of inherent traits

26
Q
  1. Six types of locks:

M
E
Em
CO
C
B

A

• M→ Mechanical
• E→ Electrified
• EM→ Electromagnetic
• CO→ Credential operated
• C→ Combination
• B → Biometric

27
Q
  1. The time required to defeat a lock should approximate the ___ of the rest of the secured barrier.
A

Penetration delay time

28
Q
  1. Four methods of contraband detection?

MPEC&B

A

Metal detectors
Package search
Explosive detection &
Chemical & biological agent detection

29
Q
  1. What is stand off distance?
A

The distance between a critical asset and the nearest point of attack.

30
Q
  1. The 5 advantages of security lighting include:

Safe people observe risky wrongdoers

A

Safe People Observe Risky Wrongdoers”
• Safe – Sense of security for users
• People – Provides deterrence for bad people
• Observe – Observation, surveillance, and response
• Risky – Reduces liability from trips/falls and negligence
• Wrongdoers – Witness potential to suspicious/criminal acts

31
Q
  1. 6 application types of security lighting?
A

Continuous
Glare Projection
Standby
Controlled
Portable (Movable)
Emergency

32
Q
  1. How is light intensity measured?
A

Lux and foot-candles

33
Q
  1. Incandescent - lamps that are :

_____ efficient;
_____Expensive and
Have a _______ life span

A

Least efficient
Most expensive and
Have a short Life span

34
Q
  1. Fluorescent lamps….

More _____ than ______
Only used outdoors for__, __ and ___

A

-more efficient than incandescent lamps
-not used extensively outdoors except for in underpasses, tunnels and Signs

35
Q
  1. What lamps provide about 25% better efficiency and life than ordinary incandescent bulbs?
A

Halogen & Quartz halogen

36
Q
  1. Mercury Vapor….

LL;
Several….
Poor….

A

-long life;
-take several minutes to produce full light output
-poor color rendition for video surveillance

37
Q
  1. Metal Halide:

Best ____ of _____;
Provides _____color ____;
Ideal for ______

A

-Best imitation of daylight;
-Provide accurate color rendition;
-ideal for video surveillance

38
Q
  1. High Pressure sodium….

Ee & LL
PCR
FOG

A

-Energy efficient and long life span;
-poor color rendition for video surveillance
-often used on streets and in parking lots b/c people can see more detail at greater distances in fog.

39
Q
  1. Low pressure sodium….

More _____ than _______;
______ to maintain;
Provide ___________

A

-More efficient than high pressure sodium;
- expensive to maintain
-provide poor color rendition

40
Q
  1. LED (light emitting diodes):
A

-a cost-effective alternative that lasts longer w/out sacrificing illumination

41
Q
  1. Induction lamps:

1) LL; and
2) mainly _____

A

-Long life
-mainly used indoors

42
Q
  1. Ten types of devices to detect intrusions are?

P, M, S
V, I, G
T, H,
CD
D/PA

A

“Powerful Motion Signals Vibrate In Glass, Triggering Hot Capacitance Disturbances.”

•	Powerful → Position detector
•	Motion → Motion detector
•	Signals → Sound detector
•	Vibrate → Vibration sensor
•	In → Impact sensor
•	Glass → Glass breakage sensor
•	Triggering → Temperature sensor
•	Hot → Heat sensor
•	Capacitance → Capacitance devices
•	Disturbances → Duress/panic alarms
43
Q
  1. Video surveillance cameras provide:
A

Scene and action identification
general observation and recognition
Automation through analytics

44
Q
  1. Thermal cameras:
A

Monitor the temperatures of objects in the field of view & and use a grayscale to represent temperatures in black & white; color may be artificially assigned.

45
Q
  1. Vault….
A

A specially constructed room or area intended to limit access or provide protection to the assets in the space.

46
Q
  1. A safe weighing less than ____ (340 kg) is required to be anchored?
47
Q
  1. What org has an established protocol for testing & rating safes & protective containers?
A

Underwriters Laboratories

48
Q
  1. Underwriters laboratories designates what three classes of records protection equipment?
    L
A

Class 350 - Paper records & products;
Class 150 - Magnetic media, tapes, discs & photographic material;
Class 125 - Floppy discs and similar flexible computer media

•	Oldest storage method (paper, handwritten) = 350
•	Middle-era storage (tapes, photographic, discs) = 150
•	Early computer era (floppy discs) = 125
49
Q
  1. Differentiation between high-security locks from other mechanical locks?
A

High-security locks rely on precisely cut keys that raise the tumbler array to the shear line while simultaneously rotating pins to align the interlocking mechanism with a groove in the plug base, allowing rotation and bolt movement.”