Implementation of Physical Security Measures Flashcards

1
Q

What document describes the company’s requirements for qualification of the bidders, such as licenses, labor affiliations, experience, and bonds?

A

Bidders’ instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What enables bidders to understand exactly what they are expected to supply and install?

A

Specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What party should clearly state what its evaluation criteria are, how each criterion is weighted, and what the method of evaluating proposals will be?

A

The purchasing organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the invitation for bid (IFB)?

A

When a system is already designed, the IFB is used to obtain the lowest cost for the equipment, software, and installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should the company be prepared to use to defend its selection of qualified contractors?

A

Written selection criteria and results documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The output of the project design phase is called what?

A

Bid package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components of the bid package?

A

Bidders’ instructions,
Specifications,
Drawings and schedules,
Hardware schedules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which component of the bid package supplies the security system requirements in sufficient detail that bidders have a common understanding of what is needed?

A

Specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the most commonly supplied drawings within the bid package?

A

Plan drawings,
Elevation drawings,
Detail drawings,
Riser diagrams,
Conduit and cable lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What hardware schedules are included in the bid package to aid in understanding the specific components to be provided?

A

Data panel schedule,
Door hardware schedule,
CCTV camera schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What group carries out the security system procurement activities?

A

The procurement committee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What brings all potential bidders together in a room so the project manager can explain the procurement requirements to all of them at the same time?

A

Bidders’ conference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should a bidders’ conference include?

A

Opening remarks;
Introductions of evaluation team and bidders ;
Overview of project and key objectives ;
Explanation of procurement process ;
Discussion of purpose, timeline, evaluation, criteria, etc. ;
Tour of the site ;
Opportunity for vendors to submit questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should the company consider giving a bidder to resolve a minor informality or irregularity in the bid?

A

A chance to cure any minor deficiency, such as missing information or attachments, wrong number of copies, or missing signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the six phases of the physical protection system (PPS) lifecycle process?

A

Planning;
Design and estimation;
Procurement;
Installation, operation, and training;
Testing and warranty;
Maintenance, evaluation, and replacement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How long can the typical physical protection system (PPS) implementation process take?

A

18 to 24 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the most important phase of the physical protection system (PPS) lifecycle?

A

Planning phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The procurement process is included in which physical protection system (PPS) lifecycle phase?

A

Phase 3, procurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three common types of procurement actions?

A

Sole source,
Request for proposals (RFP),
Invitation for bids (IFB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three major components of the physical protection system (PPS) procurement phase?

A

Form a procurement committee,
Prepare bid package,
Prequalified contractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Conducting a bidders’ conference, reviewing technical and cost evaluations, and interview and due diligence results are part of which physical protection system (PPS) lifecycle phase?

A

The procurement phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What has evolved for the purpose of planning, coordinating, and controlling the complex and diverse activities of modern security projects?

A

Project management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the documentation called that is prepared during the planning stage of project management?

A

Project scope document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a good practice for project managers in ensuring the comprehensiveness and appropriateness of a physical security system (PPS)?

A

Divide the project into several stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are two key reminders for project managers?

A

Determine and sequence activities and keep the project on schedule and under control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When is a project complete?

A

When there is proof that all objectives have been achieved at the necessary transfer of knowledge from the project team to operations personnel has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are some risks involved in security system procurement?

A

The system may be delivered late or over budget,
The system may not work as required,
The system may adversely affect existing systems or processes,
The organization may be unable to recover losses after a contract breach,
Third-party subcontractors may make claims against the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some steps in the security system procurement process?

A

Forming a procurement committee,
Specifying hardware and software requirements,
Identifying potential integrators,
Launching a competitive tender program,
Selecting a successful bidder,
Issuing a purchase order,
Receiving and installing the products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When should a project manager schedule a bidders’ conference?

A

About two weeks after the request for proposals (RFP) is issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In selecting contractors, what must be accomplished?

A

Qualifications reviewed,
References, checked,
Interviews held with the people who will perform the work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What skills and characteristics must a good project manager possess?

A

Process management skills (organized, logical, analytical, self-disciplined),
People management skills (leadership, supervision, team-building, and communication abilities).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Considering the techniques of project management, what approach is considered to provide a pathway to success?

A

A standardized approach, with repeatable and documented work practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Over the length of a project, what consumes the greatest amount of project management time, day in and day out?

A

The control effort, which includes gathering information, reviewing progress, documenting issues and decisions, and managing the overall work plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How often should the project manager require status meetings of a project?

A

Weekly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which physical protection system (PPS) lifecycle phase includes developing a punchlist and taking next necessary actions to formally accept and commission the system?

A

The installation, operation, and training phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the process of ensuring that all systems and components of a system are designed, installed, tested, operated, and maintained according to the operational requirements of the owner?

A

Commissioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a contract document used in the architecture and building trades to organize the completion of a construction project?

A

Punch list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Who must receive end-user training of the physical protection system (PPS)?

A

All personnel involved in operating, updating, and maintaining the PPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When commissioning a physical protection system (PPS), what are the three types of tests that should be conducted?

A

Factory acceptance,
Site acceptance,
Availability or reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What should testing simulate in the physical protection system (PPS) commissioning process?

A

Realistic conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Within testing and commissioning, when should a certificate of completion be issued and a contract considered complete?

A

After successful completion of all prescribed testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does equipment performance testing determine?

A

Weather equipment is functional,
Whether it has adequate sensitivity,
Whether it meets design and performance objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does personal performance testing determine?

A

Whether procedures are effective,
Whether personnel know and follow procedures,
Whether personnel and equipment interact effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does the contractor perform pre-delivery or factory acceptance testing?

A

Assemble a test system including some or all of the system components,
Conduct tests to demonstrate that system performance complies with specified requirements in accordance with approved factory test procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does a contractor perform site acceptance testing?

A

Develop a plan to calibrate and test all components,
Verify, data transmission system operation,
Install the system,
Place the system in service,
Test the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How long should reliability testing be conducted?

A

24 hours per day for 15 consecutive calendar days, including holidays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are six types of post-implementation tests?

A

Operational tests,
Performance tests,
Post-maintenance tests,
Subsystem tests,
Limited scope tests,
Evaluation tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Reliability testing is performed in what four phases?

A

Phase I testing,
Phase I assessment,
Phase II testing,
Phase II assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What type of post-implementation test is performed periodically to prove correct system operation but does not involve verification of equipment operating specifications?

A

Operational tests.

50
Q

What type of post-implementation test is conducted after preventive or remedial maintenance has been performed on a security system to make sure the systems are working properly?

A

Post-maintenance test.

51
Q

What type of post-implementation test is used to test a complex system that is broken down into several subsystems or segments that are tested separately?

A

Limited scope tests.

52
Q

What type of post-implementation test verifies that equipment conforms with equipment or system specifications, thereby demonstrating effectiveness.

A

Performance tests.

53
Q

What type of post-implementation test ensures that large parts of the system are all working together as originally designed?

A

Subsystem tests.

54
Q

What type of post-implementation test is a periodic, independent test of the security system to validate the vulnerability analysis and ensure that overall effectiveness is being maintained.

A

Evaluation tests.

55
Q

What are the deliverables during the commissioning and warranty of the implementation phase?

A

Testing of the system to demonstrate its effectiveness and reliability,
Correction of any problems, free of charge, by the installation contractor during the warranty period.

56
Q

Maintenance, evaluation, and replacement fall under which project stage?

A

Stage four, closeout.

57
Q

How often should evaluation tests be performed?

A

At least once a year.

58
Q

What tests checks peoples’ or objects’ tolerance to abuse or misuse under deliberately introduced stress?

A

Stress tests.

59
Q

What are regression tests?

A

Tests that apply to subsystems, systems, or procedures that have been altered to perform a new function and must still perform some of their original functions.

60
Q

What should a training manual for a physical protection system (PPS) include?

A

An agenda,
Defined objectives for each lesson,
A detailed description of the subject matter for each lesson.

61
Q

When should approval of the planned training content and schedule be obtained from the customer?

A

At least 30 days before the training.

62
Q

What should system troubleshooting and maintenance training cover?

A

Physical layout of each piece of hardware,
Troubleshooting and diagnostic procedures,
Repair instructions,
Preventive maintenance procedures and schedules,
Calibration procedures.

63
Q

How many site acceptance tests (SAT) are normally conducted for each physical location where system components are being installed?

A

One.

64
Q

What are the goals of preventive maintenance?

A

Keep equipment and software, operating efficiently,
Extend the operational life of equipment,
Identify equipment issues before a failure occurs.

65
Q

What type of maintenance corrects faults and returns the system to operation after a hardware or software component fails?

A

Remedial maintenance.

66
Q

What is the major goal of system maintenance agreements?

A

To ensure that the security system operates at its optimum capability with minimum downtime.

67
Q

What is standards compliance testing (SCT)?

A

SCT evaluates the system compliance with both in-house company standards and industry standards.

68
Q

What is the common time for the contractor to report to the job site to address a warranty issue?

A

Within four hours.

69
Q

What results can be expected from preventive maintenance?

A

Correct operation of electromechanical equipment,
Replacement of hardware to keep equipment updated,
Updates of system and application software,
Problem detection through testing and analysis of system reports,
Maintenance of system documentation.

70
Q

Most security system failures occur in the first year due to what two issues?

A

“Infant mortality” of system components,
Improper installation.

71
Q

How often should maintenance logs be provided to the security department for analysis?

A

On a quarterly basis.

72
Q

What type of records identify problems operators have with certain subsystems or components?

A

System operator records.

73
Q

As a rule of thumb, how much of the capital cost of the physical protection system (PPS) equipment for a location should be allocated each year for spare parts purchases?

A

5%.

74
Q

What are two benefits of in-house maintenance?

A

In-house systems expertise is built and maintained, reducing reliance on outside contractors,
Management retains control over resource priorities.

75
Q

What are three benefits of outsourcing maintenance?

A

Technicians keep current on products and systems,
Supervision and control is transferred to other company,
Backup resources are available.

76
Q

How long does it take before most security systems are considered obsolete due to advancements in technology?

A

Five years or less.

77
Q

What should be included in a service report for a warranty repair?

A

Date and time the fault was reported,
Nature of the reported fault,
Date and time of the service visit,
Actual fault identified,
Remedial work carried out.

78
Q

What is the purpose of a warranty?

A

To repair, correct, or replace any defect for a period of time (usually 12 months) from the date of issue of the certificate of practical completion.

79
Q

What qualifications should personnel have for conducting training on the new system?

A

All personnel giving instruction should be certified by the equipment manufacturer for the hardware and software.
Trainers should have experience in conducting similar training .
The customer should approve the trainers.

80
Q

What are seven training topics for new systems?

A

System administration,
System monitoring,
Alarm assessment and dispatch,
Incident response,
System troubleshooting, and maintenance,
IT functions,
System overview.

81
Q

What is the goal of system administration training?

A

System administrators will learn to use all system functions, including:
ID badge design and production,
Cardholder set up and access level assignment,
Access door programming,
Alarm set up and implementation,
Data storage and retrieval through reports,
System database backups.

82
Q

What is the goal of alarm assessment and dispatch training?

A

Security system operators will learn to assess the cause of different alarm conditions and properly deal with them.

83
Q

What are some functions, other than protection, that security officers may be asked to assist in?

A

Communications,
Customer service,
Transportation.

84
Q

What is a continuing challenge when procuring services within the contract security industry?

A

During procurement, companies overemphasize low price, which leads to disappointing and compromised service quality.

85
Q

The need for security personnel can be analyzed using which concept?

A

The “necessary human being” concept.

86
Q

What are the two categories of patrols for security officers?

A

Foot patrols and mobile patrols.

87
Q

Regardless of the patrol method, how should security officers patrol their assigned area?

A

Systematically,
Frequently backtracking,
Taking unexpected routes.

88
Q

What is the goal when dealing with mentally ill or incapacitated people?

A

Prevent harm from the person’s acts and to control the person without injury, discomfort, or embarrassment.

89
Q

What positive impact can security officers have in a security awareness program?

A

Encouraging employees to report or decrease security risks.

90
Q

To be successful in an intelligence role, what should security officers be trained in?

A

Fundamentals of investigations,
Interviewing techniques,
Investigative report writing.

91
Q

What should be reviewed before an organization purchases security uniforms and equipment?

A

State and local statutes and regulations to ensure that any proposed purchases of uniforms and equipment to comply with the law.

92
Q

The decision to arm an officer should be based on the existence of what conditions?

A

There is a greater danger to life safety without the weapon.
The officer may reasonably be expected to use fatal force.

93
Q

What guideline is used for standards for private security officers?

A

ASIS Private Security Officer Selection and Training Guideline, which was updated in 2019.

94
Q

Which organization promulgated a code of ethics for security officers?

A

The International Foundation for Protection Officers.

95
Q

Affective learning helps a person change the way here she views a situation. What are some types of affective training for security officers?

A

Understanding various cultures,
Dealing with disabled persons,
Practicing safety compliance,
Exploring methods used by adversaries to acquire information.

96
Q

Psychomotor training offers hands-on experiences. What are some examples of psychomotor learning for security officers?

A

Equipment operation,
Defensive driving tactics,
Firearms training,
Fire extinguisher training,
First aid skills,
Emergency response skills.

97
Q

What is training?

A

The acquisition of the knowledge, skills, and abilities directly related to job performance.

98
Q

What method of training is useful for guiding the learner in any topic where discretionary judgment is necessary?

A

Case studies.

99
Q

What are post orders based on?

A

Standard operating procedures (SOPs).

100
Q

Besides a list of procedures for the security group to follow in day-to-day operations, what else might standard operating procedures (SOPs) include?

A

Emergency response procedures.

101
Q

“Officers will maintain a professional or military bearing” is an example of which type of order?

A

General order.

102
Q

What should post orders convey for the security force?

A

Express the policies of the protected enterprise,
Summarize required officer duties,
Avoid the problems of word-of-mouth instructions,
Provide a basis for site-specific training.

103
Q

What may be included in personnel databases that hold a skills inventory list of security officers?

A

Special training,
Certifications,
Qualifications.

104
Q

Aside from post hours and shift time, what else must be considered and calculated into the work schedule for a proprietary security officer?

A

Paid holidays,
Sick time,
Other absences, such as jury duty, family illnesses, or emergencies.

105
Q

Contract security agencies have a broad personnel base from which they can draw additional officers when necessary.
What can be major disadvantages to this approach?

A

Officers may never have been assigned before to the particular client location. Such a security officer cannot become familiar with post requirements in one or two hours, and an inexperienced officer may cause more harm than good.

106
Q

Why is it important for security officers to log their meal and break periods?

A

If an incident occurs, the log may allow verification of whether an officer was on a break or should have been at the post.

107
Q

When do experienced supervisors provide continuous training?

A

They provide feedback to an officer in response to observed situations that were not handled correctly.
They provide training when new material is introduced that requires familiarization by the officer .

108
Q

What can a supervisor do to ensure that post orders are read and to reinforce training?

A

Ask one or more specific questions about the new order.
Observe the officer in an actual situation involving its application.
Set up a hypothetical situation requiring the officer to show a working knowledge of the order.

109
Q

What are some items that can be evaluated during regular assessments of security officer performance?

A

Personal appearance and condition of the officer,
Condition of the post,
Availability and condition of required, personnel and post equipment,
Quality of officer response to training questions or simulations,
Quality of officer response to real-life situations.

110
Q

Regular assessments and recordings of officer performance by supervisors after every post visit can be used for what?

A

To identify trends and additional training needs.

111
Q

In the context of security officer operations, what is the focus of quality assurance (QA) programs?

A

To test, inspect, or identify problems in order to correct them and to maintain and improve service, as well as prevent problems before they happen.

112
Q

What is the outcome of effectiveness assessments?

A

Maintain service quality, as well as to continuously improve security officer performance and operation.

113
Q

Aside from on-site supervisors, contract security companies can use “independent” inspectors for what type of inspections?

A

Quality control inspections.

114
Q

What can quality control inspections of security officers identify?

A

Substandard performance,
Subject areas requiring supplemental training,
Procedures needed clarification.

115
Q

What are some cost-effective and practical ideas to increase organization-wide security awareness?

A

Incorporating security awareness training into new-hire orientation, special luncheons, and regular business meetings.

116
Q

What is the strategy of the Business Watch program?

A

Connecting designated police officers with business leaders who jointly assist businesses in reporting and preventing crime.

117
Q

What is a security policy?

A

A security policy establishes strategic security objectives and priorities for the organization, identifies the organization representatives primarily accountable for physical security, and sets forth responsibilities and expectations for managers, employees, and others in the organization.

118
Q

What is a security procedure?

A

Procedures should describe how the organization will take proactive steps to protect its assets by establishing architectural, administrative, design, operational, and technological approaches to avoid, eliminate, or reduce the likelihood that risks will materialize.

119
Q

What is a post order?

A

Post orders are the most important written instructions for the security force. Orders:
Express the policies of the protected enterprise,
Summarize required officer duties,
Avoid the problems of word-of-mouth instructions,
Provide a basis for site-specific training.

120
Q

What considerations should be given to security officer ID badges?

A

The badge normally provides the officer with proper identification and access to areas that he or she tours regularly or may need to enter during an emergency.