Outros Flashcards

1
Q

Case studies examples?

A

Crisis management, use of force, and ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three ideas which enterprise performance framework is based?

A

Effectiveness, efficiency, strategic improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two phases of the assessment to perform in a facility Security assessment (compliance of facilities)?

A

Initial assessment, recurring assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a recurring assessment what are the interval determined by the security level of facility?

A

5y for low security level
3y for high security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At what height should a barbed wire/razor wire be installed to discourage human trespassing?

A

7 ft. (2.1 m) not counting the top guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the assembly components in a mechanical lock?

A

The bolt or latch
The keeper or strike
The tumbler array
The key or unlocking device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the primary types of mechanical locks?

A

Warded
Lever
Pin tumbler
Wafer
Dial combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most difficult vulnerability to identify and measure?

A

Inadvertent threats and
Associated vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the promising commercial technology for explosive detection that uses pulsed low-energy radio waves to determine the presence of nitrogen-rich material?

A

Quadrupole resonance (QR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How explosive detection technology is divided?

A

Bulk and Trace methods

Bulk: X-ray, Computed tomography (CT), nuclear, quadrupole resonance

Trace: ion mobility spectrometry, colorimetric, chemiluminescence, mass spectrometry, fluorescence, canine olfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Learning can be separated into which domains?

A

Cognitive (knowledge-based)
Affective (attitudinal or perceptual)
Psychomotor (physical skills)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four states of a door?

A

Open
Closed
Latched
Locked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of mechanical lock provide more security?

A

Pin tumbler lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of biometric technologies?

A

Eye pattern
Hand or finger geometry
Handwriting
Fingerprints (most reliable)
Voice
Face
Other techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

At this phase the project team develop all the necessary documentation to support the procurement of the PPS.

A

Design and estimation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What consists the procurement package or construction document?

A

Contract information
Bidders’ instructions
System specifications
Statement of work
Drawings
Equipment schedules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some sources of risk a project manager should consider as contingency activity?

A

Construction requirements
Performance expectations
Technology challenges
Changes in priority
Underestimating
Natural and man-made disasters
Lack of coordination w/ other projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How changes are proposed to the project scope, deliverables, or activities?

A

Via change request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some rules of thumb regarding costs for physical protection systems?

A

Design and engineering: 10-15%
Hardware and software: 15-20%
Installation: 40-50%
Training: 3-5%
Contingency: 10%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is included in the detailed examination of risk analysis process?

A

Risk assessment
Vulnerability evaluation
Cost-benefit analysis
Risk management alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a system performance design how much expansion factor should be incorporated to the peak system load?

A

50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When the budgetary estimate is prepared?

A

During the initial planning phase for new PPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the amount of contingency for budgetary estimate?

A

Plus or minus 10 to 20%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When is prepared the preliminary design estimate?

A

At the 50% design review stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the delay time when using diesel generator?
5 to 10 seconds
26
When is UPS recommended?
Security devices requiring 120 VAC power, such as computer and video monitors
27
What is the minimum time battery backup for security system components is required?
4 hours
28
What is the time required to recharge batteries automatically?
24 hours after discharge
29
When should the occurrence of single fault be indicated?
Within 200 seconds
30
How long should record from people entering the security control center be kept?
12 months
31
What are the tips to reduce nuisance alarm?
Post signs Adjust guard patrol time Check all doors with patrols Routinely maintenance Components inspections
32
What is the equation used to calculate the availability of the system?
OA = Tm/(Tm + Td) x 100 OA: operational availability Tm: total test duration time Td: system down time
33
What are one or multiple factors asset value can be based?
The cost of purchasing or replacing the asset; The operational impact of unavailability of the asset; The effects of harm to the asset; The length of time required to replace the asset; The reputational impact from unavailability of the asset
34
How cost-benefit analysis is based on?
Risk assessment
35
What an organizational strategy should adopt to develop cost-effective and robust approach to 4D and recover from disruptive event?
Defense in depth or layered protection
36
What a PPS should provide?
Protection in depth; Minimum consequence of components failure; Balance protection
37
What functions may be included in the scope of convergence?
Physical security Cybersecurity Information security Business continuity Crisis management Environmental health and safety
38
CPTED approach focused on what?
Manipulating the physical environment; Understanding human behavior in relation to physical environment; Redesigning space or using it differently; Increasing a sense of ownership and territoriality; Reducing conflicts btw buildings
39
To underlie CPTED, All human spaces…
Has some designated purpose; Has social, cultural, legal, or physical definitions; Is designed to support and control the desired and acceptable behaviors
40
What are the zone protections the business design should have?
Public Reception Operations Security High security
41
Providing obstacles to deter, detect, delay, and deny access to a facility, asset, or operation utilizing natural and manufactured means, is referred to what?
Site hardening
42
What is considered in a delay in depth?
The strength of each obstacle in relation to the resources available to an adversary to overcome them. Time afforded by obstacle remaining counts towards the overall time to a response breach
43
What are other considerations in the application of security lighting system?
Avoid lighting of areas not intended for nighttime use; Select a light safe route; prevent climbing opportunities; Use photoelectric cells; Continuous security lighting during hours of darkness
44
How is the success of the response in apprehending the adversary measured?
It is dependent upon the length of time it takes for the response force to become aware of an alarm, assess situation, and respond.
45
How is commonly referred the time of response force awareness?
Time of detection
46
To be effective, what a chain-link fence needs to avoid?
Overly large mesh fabric Undersized wire Lightweight posts and rails Shallow post holes
47
What is the distance a bollard have to be spaced?
3 ft. (1 meter)
48
What are the technical components of IDS?
Alarm sensor Control panel Circuit or sending device Annunciation or sounding device
49
What are the common performance measurements of entry and access control systems?
Throughput and False readings and the measure of acceptance
50
What are the types of system architecture?
Corporate network Security system/technology network Stand alone
51
What are the categories of signal and data transmission?
Physical connectivity Wireless
52
What are the recording methods?
Appliance-based Software-based Edge Cloud-based
53
What are the requirements for recording device?
Picture clarity Length of storage Frames per second (FPS) Compression type (codec) Level of activity
54
What are some methods of viewing in a surveillance system video?
Mobile application Video walls Web-based Computer client (software-based) Directly from recording system
55
What are the three primary components of ESRM?
Context, foundation, and cycle
56
What are the four processes of the ESRM cycle?
Identify and prioritize assets; Identity and prioritize risks; Mitigate prioritized risks; and Continuous improvement
57
What are the security functions that commonly contribute to security program improvement?
Incident response; Investigations and analysis; Information sharing
58
What are the foundations of ESRM?
Holistic risk management; Partnership with stakeholders; Transparency; and Governance
59
What are the two types of transparency?
Risk and process
60
What are the two types of governance?
Organizational and ESRM
61
What are some common terms related to pressure from a blast?
Incendiary thermal effect; Shock or blast wave; Reflective pressure; Overpressure; Fragmentation
62
What is a good way to reduce fragmentation for glazing use?
Using smaller windows and placing them higher off the ground
63
What are the three primary components of physical security?
Structural security; Electronic security system; Human element
64
What are some elements included in structural security?
Structure of buildings and facilities; Physical barriers; Locking system; Lighting
65
What is the first step in upgrading a facility’s resistance to penetration?
Eliminating unnecessary doors, then eliminating unneeded windows, louvers, and knobs and keyways.
66
What is the optimum distance between the roof and the secondary barrier?
10 to 12 in. (25.4 cm to 30.5 cm)
67
What are some enhancement materials for roof?
Quarry screen; Expanded steel bank; Floor grating
68
What are examples of passive barriers?
Fixed bollards; Engineered planters; Jersey barriers; Heavy objects and trees; Water obstacles; Walls and fences
69
What are some features of a bollard?
To reduce visual impact, height no more than 30 in. (0.76); Spacing between 36 and 48 in. (0.9 and 1.2 m); Not exceed a height of 38 in. (1 m); Places as close to the roadway as possible
70
What are the two general categories of safes?
Record safes designed for fire protection; safes designed for protection of valuables against forcible penetration
71
What are the three classes of fire resistant safes?
350-4 350-2 350-1
72
What are some LED lighting features?
Utilizes 24 volt power (instead of typical 120); can be spaced at intervals of 10, 20, or 30 feet (3, 6, or 9 meters)
73
What is considered light pollution?
Light spillage: overshoots its interested area or spills beyond the limit where it’s needed. Light trespass: when light spillage extends into a neighbor’s property or an area where it interferes another person or activity.
74
What is the necessary amount of foot-candles to represent a full daylight?
1,000 fc
75
What is the upper limit of visual tolerance measured in foot-candles?
50,000 fc
76
One foot-candle is equal how much lux?
10.76 (aprox. Ratio 1:10)
77
How much output a typical household bulb rated at 100 watts represents?
1,700 lumens
78
What is corrected color temperature (CCT)?
A measure of the warmth or coolness of a light
79
What materials have more reflectance?
Snow 95% Old concrete and grass 40% New concrete and red brick 25% Asphalt 5%
80
The ability of a lamp to discriminate, grade, and faithfully reproduce the colors seen in a object is known as what?
Color rendition Measured as a color rendition index (CRI) on a scale of 0 to 100
81
What is the best CRI?
70 to 80 good Above 80 excellent 100 daylight
82
What lamps have the lowest color rendition?
Mercury vapor 50 High pressure sodium 20 Low pressure sodium 5
83
Where high color rendition may be important?
Retail, restaurant, and precision manual work
84
What are some economic considerations for lighting?
Maintenance includes the labor to replace and clean the lamps; Cleaning intervals of 3y; In a very dirt environment luminaire could emit only 80%; By the end of lamp life, it produces only 80%
85
What lamps have the highest start and restrike time?
Metal halide and Mercury vapor: 5-8 and 10-20 High pressure sodium: 2-5 and 1-20 Low pressure sodium: 5-8 and 0-8
86
What is the most basic tool for territoriality?
Effective training and awareness program
87
What categories of considerations affect the use of security signage and graphics?
Architectural design considerations; System considerations; Procedural considerations
88
What are the means of defeating access control points?
Deceit; Direct physical attack; Technical attack
89
What are the types of credentials?
Photo identification badges; Exchange badges; Stored-image badges; Coded credentials
90
What printers may include?
Bulk card printing; Dye sublimation printing; Overlays; On-board encoding
91
What are the temperature for operating conditions of physical intrusion detection systems?
Indoor 0° to 49° C Outdoor -34° to 66°C
92
What are three application classes for interior sensors?
Boundary-penetration sensors; Interior motion sensors; Proximity sensors
93
What are the four types of interior sensors defined by UL 681?
Trap detection Spot detection Channel detection Volumetric detection
94
What are the most common interior motion sensors?
Monostatic microwave and PIR
95
What are the four types of installations used in electronic protection systems?
Loop, point-to-point, multiplex, and wireless
96
What are the two methods for separating individual signals in the multiplexing process?
Time separation or time division multiplexing (TDM) Frequency separation or frequency division multiplexing (FDM)
97
How PIR sensors respond?
To infrared energy in the wavelength Band between 8 and 14 nanometers (nm)
98
How is called the detection based in the difference in temperature between the intruder and the background?
Minimum resolvable temperature (MRT)
99
The choice of a camera should be based on what?
Sensitivity, resolution, and features
100
What are other parts of digital video system?
Switcher Lens Video transmitter/receiver Amplifier Video recorder
101
What is the transmission medium used in multiplexing?
Wire Radio frequency Microwave Optical fiber
102
What are the types of satellite communications?
Geostationary earth orbit (GEO) - high altitudes - 36,000 km - television, digital voice, fax, data, and email Medium earth orbit (MEO) - 10,300 km - handheld, dual mode telephones, cellular and fixed telephones Low earth orbit (LEO)
103
What are the types of LEO satellites?
28 LEO - 770 km - data message service for individual and industries 66 LEO - 675 km - telephones, paging, fax 48 LEO - 1,220 km - mobile and fixed telephone 840 LEO - 700 km - optical finder and coaxial cable characteristics
104
What are the two characteristics that may be modified to reduce or destroy its intelligibility?
Frequency (the pitch of the voice) Amplitude (its loudness)
105
What is the advantage of frequency inverters?
Low cost and tolerance for poor communication channel conditions. However a trained listener can understand the scrambler voice.
106
What are the three important factors relate to security officers behavior?
Courtesy Restraint Interest
107
What are the generations that are still in use in alarm and access control systems?
The first, fourth, and fifth
108
What are some installation considerations for Electric door strikes or bolts?
Direct current (DC) End-of-line Resistor Solenoids Signal switches Tamper resistance Size and weight Mounting method
109
To justify the replacement cost, what factors should be considered?
Maintenance Lack of spare parts Obsoleteness of hardware and software Operating costs Unreliability
110
What is a high-rise structure?
One that extends higher than the maximum reach of available fire-fighting equipment. Between 75 ft. (23 m) and 100 ft. (30 m), or approx 7 to 10 stories.
111
The ability to mitigate threats for high-rise structures depends on what?
Structural design; and use of technology to deter and detect a threat, to communicate its nature and location, and to initiate automatic or organizational responses.
112
From a life safety perspective, what are the most critical threats in high-rise structures?
Fire, explosion, and contamination of life support system such as air and portable water supplies.
113
What are the most significant factors affecting life safety in high-rise structures?
Early detection and precise Location; Reliable communications; Safe escape routes; Appropriate control measures
114
What is the first step in assuring life safety for high rise buildings?
Comply with local local building and fire codes applicable to the structure.
115
What are the two basic approaches to restrict the spread of fire and smoke throughout a building or area?
The HVAC system can be shut down and the fire area isolated or compartmented. Allow fans to continue to run, using the air duct system for emergency smoke control.
116
How to divide the high rise structure for access control purpose?
Public access or common area; Rented or assigned occupancies; Maintenance space
117
What are the most prominent management systems standards?
ISO 9001 on quality management system and ISO 14001 on environmental management system
118
Regarding low-dose backscatter X-ray, what are some features to be considered?
A person must be scanned two times; The radiation dose is about 10 microrem; Personnel must not receive a radiation dose above 100 milirem/year