Flashcards 96 - 139

1
Q
  1. The purpose of master keying is….
A

To provide a hierarchy of access to groups of locks from access to only one lock to increasingly larger groups of locks and to all locks in the population.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Primary attack avenues of mechanical locks…..
A

Attack by force
Surreptitious attack
Attack by impression-making and try keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Four major components of lighting systems?
A

Lamp (light bulb)
Luminaire (fixture)
Mounting hardware
Electrical power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What constitutes lighting operating costs?
A

Energy…88%
Capital costs…8%
Maintenance….4%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What lighting considerations must be made for electronic surveillance systems/and or cameras?
A

Color rendering index for accurate Reproduction and identification of colors
Reflectance of materials and
Directionality of the reflected lighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Security Architecture and design is……
A

A discipline that focuses on the design of facilities and buildings so that security features are built in from the start….not later on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Perimeter protection may include these 7 things….
A

Fence line and signs
Security officers and cameras
Vehicle and natural barriers, and
Intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Three types of security zones are…..
A

Perimeter
Non-exclusive zone and
Exclusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The zone of security that usually includes entry control and vehicle barriers is…..
A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. The security zone that usually features less restrictive access and public right of way is…
A

Non-exclusive zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The security zone that usually features controlled entry with highly restrictive access and access control with proximity cards, keypads, passwords or facial recognition CCTV is…..
A

The Exclusive zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What spacing is usually used for signage on boundary fences?
A

50 feet or 15 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Two categories of barriers?
A

Passive (fixed) and

Active (operable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Active barriers are most often used as……
A

-vehicle access control points w/in a perimeter barrier system or at the entry to specific buildings within a site to provide a barrier for vehicle screening or inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. How is a barrier rated?
A

ASTM and the US Dept of State rate barriers according to vehicle weight and speed.

ASTM uses M30, M40, M50
Dept of State uses K4, K8, K12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What barrier rating stops a 15,000 pound (6,800 Kg) vehicle traveling at 30 mph (48 mph)?
A

K4……M30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. How does a fail-safe locking mechanism respond during a fire emergency?
A

It will unlock under any failure condition, such as a loss of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. How does a fail-secure locking mechanism respond to a fire emergency?
A

It remains locked when power is lost or another failure occurs.

19
Q
  1. What is 2nd generation CPTED?
A

It focuses on not only reducing physical opportunities for crime but also creating a sense of neighborliness to help reduce motives that cause crime in the first place.

20
Q
  1. Four main strategies of 2nd generation CPTED?
A

Cohesion
Capacity Threshold
Community culture
Connectivity

21
Q
  1. Five most common types of badges?
A

SMART cards
Proximity
Wiegand wire
Magnetic stripe and
Bar Codes

22
Q
  1. How does magnetic stripe encoding work?
A

Data is encoded in magnetic material on the badge and it gets read as the strip is moved through or inserted into a magnetic reader.

23
Q
  1. What are the 3 ways proximity badges are classified?
A

-By the method of powering the badge
-by the operating frequency range of the badge and by
-whether the badge is read only or has read w/write capability.

24
Q
  1. Six types of electrified locking mechanisms include?
A

Electric latch, lockset,
Electric strike, Deadbolt,
Exit device and
Electromagnetic lock

25
Q
  1. How does a biometric lock function?
A

By verifying a person’s specific physical characteristics; if verified, the device permits access

26
Q
  1. Two error types in biometric technologies?
A

Type 1….False rejection - an authorized person is improperly rejected.

Type 2…False acceptance - an unauthorized person is improperly accepted

27
Q
  1. Two methods that can be used to detect metal?
A

Continuous Wave detectors &
Pulsed field detectors

28
Q
  1. X-ray approaches - 4 - for package search?
A

Single energy transmission x-ray
Multiple energy x-ray
Computed tomography (CT) scan and
Backscatter x-ray

29
Q
  1. Which x-ray can be safely used on people?
A

Low dose backscatter x-ray

30
Q
  1. What 6 methods are used for trace explosives detection?
A

Chemiluminescence
Coloremetric
Canine Olfaction
Mass spectrometry
Ion mobility spectrometry
Fluorescence

31
Q
  1. Two ways biological agent detection differs from chemical detection?
A

Response time is not as critical b/c most biological agents are not immediately lethal; and

-bio detection unusually involves filtering the air for several hours then analyzing the filter. Chemical detectors work quicker and involves sampling the air at several perimeter locations.

32
Q
  1. What is a nuisance alarm?
A

Any alarm not caused by an intrusion

33
Q
  1. Three main characteristics of intrusion sensor performance?
A

Probability of detection;
Nuisance alarm rate and
Vulnerability to defeat

34
Q
  1. The PD depends on…..6 things:
A

Condition of the equipment
Weather conditions
Installation conditions
Sensor hardware design
Sensitivity adjustment
Targets to be detected

35
Q

130.Three ways to defeat a sensor?

A

Bypass
Adversary path exploitation
Spoof

36
Q
  1. Classification of intrusion sensors?
A

Passive or active
Covert or visible
Line of sign or terrain following (exterior only)
Volumetric or line detection
Application

37
Q
  1. The main elements of video surveillance?

Fi____ of vi____
Sc____
Le_____
Ca____
Tr____ me_____
Mo____ &
Re____ eq_____

A

Field of view
Scene
Lens
Camera
Transmission medium
Monitor &
Recording equipment

38
Q
  1. Four uses of video surveillance?

Visual information about:
Something that is happening
Something that has happened
-deter or discourage undesirable activities &
-to use video analytics tools.

A

Yeah

39
Q
  1. Theoretical identification views of a video surveillance system?

Su_________ id
Ac________ id and
Sc________ id

A

Subject
Action
Scene

40
Q
  1. Typical parts of a video surveillance system (VSS)?

-ca____
-tr____ me_____
-po____ over et______ (POE) N__S__
-Re_____ Eq_____

A

Camera
Transmission method
Power over Ethernet network switch
Recording equipment

41
Q
  1. Five main types of camera lenses:

Wi___ an____
St____
Te____ ph____
Zo____
Va_____

A

Wide angle
Standard
Tele-photo
Zoom
Varifocal

42
Q
  1. When should the object occupy at least 10% of the scene’s width?
A

Subject identification

43
Q
  1. Five basic tasks of PPS implementation?

-Pl____ & as___ to determine security requirements;
-developing con____ sol____ for resolving vulnerabilities;
-Prep PPS design & Con__ documentation;
-Soliciting bi____, conducting pr___ and vendor negotiations;
-In___, te____ and co___ the PPS.

A

Planning and assess
Conceptual solutions
Construction
Bids
Price
Installing, testing and commissioning

44
Q
  1. Six elements of the typical integrated PPS project?

Project co____
Project de____
Managing the bi____ process
Managing the imp___process
Accep____ of work and
In____ & ma____ the warranty process.

A

Concept
Design
Bid
Implementation
Acceptance
Initializing and managing