Phy Sec Flashcards

1
Q

How system approach can be defined

A

System approach can be defined as a logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you understand by Design Basis Threat

A

The Design Basis Threat (DBT) as the adversary against which the utility must be protected (Patterson, 2007). Determining the DBT required consideration of the threat type, tactics and mode or operations, capabilities, threat level, and likelihood of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define risk management

A

Risk Management is coordinated activities to direct and control an organization with regard to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

After the threats and assets are defined what is generally performed to establish a baseline of PPS effectiveness in meeting goals and objectives

A

Vulnerabilities assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is vulnerability? What are the differences between vulnerability assessment and vulnerability analysis

A

Vulnerability assessment is the process of identifying and quantifying vulnerabilities. The term vulnerability analysis which is a method of identifying the weak points of a facility, entity, venue or person (ASIS, 2012) has also been used to describe this process. Vulnerability has been defined as intrinsic properties of something that create susceptibility to a source of risk that can lead to consequence (ISO/IEC 2009).Garcia. Vulnerability is a weakness that can be exploited by an adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How residual risk is calculated

A

For now it is sufficient to note that risk captures the relationship among threats, asset value, and system effectiveness, and is often shown in this form, R = T x A x VT = threat, a combination of threat definition and like of attack A = assets to be protected V = vulnerability, represented by system effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the goals of a vulnerability assessment

A

The goal of VA is to identify PPS components in the functional areas of detection, delay and response and gather data to estimate their performance against particular threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When the time for assessment is begin

A

Once an alarm is initiated and reported, it is time for assessment to begin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the principle of probability theory

A

It is a principle of probability theory that the larger the number of actual cases or events of the kind that includes the predicted event, the greater the agreement between the predicted pattern and the actual pattern of occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the key concepts must be understood before it is possible to design a system that meets the identified goals and objectives

A

These concepts are
1. System
2. Integration
3. System approach and
4. Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the basis of risk management

A

Informed decision making is the basis of risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As a security professional, when you say that the risk is conditional

A

Where there is no data to support an estimate, another approach is to assume that there will be an attack and then evaluate risk on this basis. In this case, the risk is conditional i.e the condition is that there will be an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

While conducting vulnerability assessment what security systems engineer needs to understand

A

Security systems engineer needs to understand detection, delay and response technologies and security system integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key measures of effectiveness for the detection function

A

Key measures of effectiveness for the detection function are

  1. the probability of sending adversary action
  2. the time required for reporting and assessing the alarm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary job of a vulnerability assessment team

A

The VA teams primary job is to determine security system effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a system and integration

A

A system is a collection of products, process, or both, combined to provide a solution to a problem or goal. Integration is the combination of a variety of components (such as people, procedures and technology) to form a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Write down the difference between compliance based VA and performance based VA

A

Compliance based approaches depend on conformance to specified policies or regulation, the metric for this analysis is the presence of the specified equipment and procedures. Performance bases approaches, on the other hand, actually evaluate how each element of the PPS operates and what it contributes to overall system effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the key to the vulnerability assessment

A

The key to the vulnerability assessment is to thoroughly evaluate the site PPS so that all paths to the assets are equally protected, and to consider what vulnerabilities exist given the defined threats, considering their motivation, tools, competence and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

After the residual risk is calculated and then start the process for establishing PPS goals and objectives. The objective included what are the elements

A

This section described the process for establishing PPS goals and objectives. These objectives include threat definition, asset identification, and establishing acceptable risk levels to facilitate system design or before equipment is purchased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How threat can be defined

A

Threat is combination of adversary capabilities, equipment, motivation or intent and likelihood of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is threat spectrum

A

Threat spectrum is one of the methods of defining threats to a facility which uses categories or labels to describe the threat characteristics for various levels of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do you mean by annualized loss expectancy

A

Annualized loss expectancy, is the product of the potential loss from an event and the likelihood of the event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do you mean by risk

A

In general risk refers to the all the adverse outcomes that an organization wishes to avoid and is a function of the probability that such consequences will occur, the in magnitude, and their imminence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In risk assessment, that analyst attempts to answers what three questions

A
  1. What can go wrong
  2. What is the likelihood that it would go wrong
  3. What are the consequences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How to determine the baseline risk

A

System effectiveness, which is a measure of system vulnerability, is combined with threat and asset value to determine the baseline risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the difference between false acceptance and false rejection

A

The false acceptance rate is the rate at which false identities or credentials are allowed entry, while the false rejection rate is the frequency of denying access to authorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A type of systems approach follows three general steps, what are these steps

A

Assessment of vulnerability, implementation of countermeasures and evaluation of effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When a site is likely to be more vulnerable

A

If a sites PPS deviates from the functional integration of detection, delay and response, the site is likely to be more vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How general risk can be reduced

A

General risk can be reduced in three way
1. preventing an attack by detecting it before it is underway
2. protecting against attack
3. reducing mitigating consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the elements a risk management program should include? What are the approaches of risk management.

A

Risk management programs should include both risk financing (insurance) and risk control tools. Approaches include avoidance, reduction, spreading, transfer and acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What do you mean by system effectivenss

A

System effectiveness is the ability of the PPS to prevent a successful attack once it has been initiated. Vulnerabilities are PPS weaknesses that can be exploited by adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the basis for vulnerability assessment

A

Verifying systems performance against the defined threats is the basis of vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What can be the most useful information kept by an enterprise to determine probability of occurrence

A

Accurate historical information about losses or loss events can be among the most useful information kept by an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A distribution curve based on what elements

A

A distribution curve based on the number of times various kind of events have occurred among other similar events indicates which events have a high probability of occurring again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the ways loss impact can be measures? What is the most way to measure loss impact

A

Loss impact can be measured in a variety of ways. One measure is the effect on employee morale, another is the effect on community relations. The most important measure overall is in dollars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Who are generally included in vulnerability assessment team

A

The team should also include a security systems engineer, response expert, data analyst, operations representatives, and subject matter experts (such as technical writers, locksmiths, explosives personnel, and legal and information systems experts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the biggest mistake made when conducting a vulnerability assessment

A

The biggest mistake made when conducting a vulnerability assessment is to concentrate on individual PPS components and address upgrades only at the level, not at the level of overall system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the foundation of a true analysis of the PPS ability to meet its defined objectives

A

Data collection is essential, as accurate data are the foundation for a true analysis of the PPS ability to meet its defined objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How effectiveness of delay is measured

A

Delay effectiveness is measured by the time required by the adversary (after detection) to bypass each delay element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How effectiveness of response is measured

A

Response effectiveness is measured by the time between receipt of a communication of adversary action and the interruption of the adversary action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How effectiveness of deployment is measured

A

Deployments effectiveness is measured in terms of the probability of deployment to the correct location (the adversary location) and the time required doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is lumen

A

The quantity of light emitted by a lamp is measure in lumens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How to define lamps efficienty

A

The energy efficiency of the lighting is know as a lamps efficacy and is measured by the lamps output in lumens divided by the lamps power draw in watts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How CCT is measured

A

Corrected Color Temperature (CCT) is a measure of the warmth of coolness of a light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What component make a lamp

A

The lamp, also know as a light bulb is the manufactured light source that includes the filament or an arc tube, its glass casing, and its electrical connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What do you mean by illuminance

A

Illuminance is a the concentration of light over a particular area. Illuminance is measured in lux, representing the number of lumens per square meter or in foot candles (fc). the number of lumens per square foot. One foot candle is equal to 10.76 lux (often approximated to a ratio of 1:10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What types of lights fall under the group of high intensity discharge lamps

A

In particular the high intensity discharge (HID) family of lamps (metal halide, mercury vapor and high pressure sodium)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What do you mean by uniformity

A

Achieving a uniform distribution of light, particularly outdoors, is expensive. Some variation in light levels is considered acceptable and is measured as uniformity, the ration between the average light level and the minimum light level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is color rendition

A

The ability of a lamp to faithfully reproduce the colors seen in an object is know an rendition and is measured as a color rendition index (CRI) on a scale of 0 to 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is white balance

A

White balance is the automatic adjustment within a camera for the color temperature of the light source. This parameter can range from 2200 degree K to 7000 degree K

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What do you understand by luminaire

A

The luminaire, also know as the fixture, is the complete lighting unit, consisting of the lamp, its holder, and the reflectors and diffuses used to distribute and focus the light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the secondary function of Physical Protection System (PPS)

A

The secondary function of PPS is deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the factors can be considered in designing deterrence

A

Certain factors in deterrence which are
1. the perceived likelihood of detection
2. the expected severity of punishment
3. deterrence may same as a first line of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are the characteristics of PPS

A

The characteristics of PPS are
1. protection in depth
2. minimum consequences of component failures
3. balanced protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the primary function of PPS

A

The primary function of PPS is
1. detection
2. delay
3. response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How to measure detection performance

A

Detection performance measure includes

  1. Probability of detection
  2. Time for communication and assessment
  3. Frequency of nuisance alarms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the considerations to be undertaken in designing balance protection

A

Consideration to design balanced protection

  1. minimum time to penetrate each barrier would be equal
  2. minimum probability of detecting penetration should be equal
  3. features design need to provide adequate protection against all threats on all possible paths.
  4. features also need to maintain balance with other consideration such as costs, safety and structural integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How the factors of vulnerabilities are exacerbated in a PPS

A

The factors of vulnerabilities in a PPS design is exacerbated by

  1. improper or limited training of operations or maintenance personnel
  2. ineffective or non existent procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the elements that the PPS design consideration specifically based

A

The physical protection system design consideration specifically based on the treat and asset at a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What are the difference between protection in depth and balance protection

A

In protection in depth an adversary should be required to avoid or defeat a number of protective devices in sequence and an adversary will require a separate and distinct act for moving along the path. Balanced protection means that no matter how an adversary attempts to accomplish the goal, effective elements of the PPS will be encountered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How to measure response performance

A

Response performance measures includes

  1. probability of accurate communication to response force
  2. time to communicate
  3. probability of deployment to adversary location
  4. time to deploy
  5. response force effectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How system effectiveness of PPS can be ensured

A

The importance of system effectiveness are

  1. hardware elements of the system must be installed maintained and operated properly
  2. training of personnel in policies, procedures and operation of equipment
  3. security safety and operational objectives must be accomplished at all times
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the causes of vulnerabilities in PPS

A

The causes of vulnerabilities in physical protection system are

  1. improper component selection and installation
  2. maintenance
  3. operations
  4. system integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are the design principles and concepts are used in physical protection system

A

The design principle and concepts in physical protection system are

  1. deterrence (CPTED)
  2. detection (sensors, video sub systems and alarm assessment, lighting, alarm communication and display, entry control)
  3. delay (barriers)
  4. response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are the elements need to be considered in designing PPS based on performance criteria

A

Considerations on performance criteria which are

  1. select elements and procedures according to the contribution they make to overall system performance
  2. values may be compared for existing (baseline) system and upgraded systems
  3. cost benefit analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the elements an integrated security system consists

A

Integrated system is consisting of

  1. people
  2. procedure
  3. equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are the differences between Type 1 error and Type 2 error in biometric entry control system

A

A Type 1 error also called a false reject, is the improper rejection of a valid user
A Type 2 error or a false accept is the improper acceptance of an unauthorized person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What signature verification can best be used

A

Are best used in applications where signatures are already used to authorize transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the difference between entry control and access conrol

A

Entry control refers to the physical equipment used to control the movement of people or material into an area. Access control refers to the process of managing databases or other records and determining the parameters of authorized entry, such as who or what will be granted access, when they may enter, and where access will occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How the performance of entry control subsystems is measured

A

The performance measures of entry control subsystems include throughput and error rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the difference between coercivity and oersted

A

The coercivity is defined as the magnetic intensity of an applied field required to change the information. The unit of magnetic intensity used to describe the coercivity is the oersted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What are the elements on which the verification of any entry control system are based on

A

This verification decision is usually based on determining whether the person

  1. is carrying a valid credential
  2. .know a valid personal identification number
  3. possesses the proper unique physical characteristic that matches the person characteristic recorded at enrollment (biometrics, such as fingerprint hand geometry, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

When it is relatively easy to duplicate bar code

A

Unless the bar code is covered with an opaque covering. It is relatively easy to duplicate. This opaque covering is becoming more commonplace as the bar code badge moves into the security credential market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the name of the common credential used for personnel entry control

A

The photo identification badge is a common credential used for personnel entry control. But it is not always effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What are the objectives of entry control system

A

The objectives of an entry control system used for physical protection are as follows

  1. to permit only authorized person to enter and exit
  2. to detect and prevent the entry or exit of contraband material (weapons, explosives)
  3. unauthorized tools. or critical assets
  4. to provide information to security personnel to facilitate assessment and response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How proximity badges can be classified

A

Proximity badges can be classified by the method of powering the badge, operating frequency range of the badge, and read only or read/write capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the main advantage of smart card

A

The main advantage of smart card are its large memory and its high degree of resistance to forgery or compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Why 2% of population cannot be enrolled eye pattern recognition system

A

Approximately 2% of the population cannot be enrolled due to blindness or other iris damage, extremely dilated eyes, or very dark irises, so they require another method of granting secure access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

In which places face recognition technology could be used

A

Face technology does have the appeal of non contact, and the potential to provide face in the crowd identification for identifying know or wanted criminals. This latter application could be useful in casinos, shopping malls, or other places where large crowds gather

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are the types of token is used in personnel entry control

A

Many types of tokens also called credentials are used in personnel entry control. They include the following

  1. photo identification badge
  2. exchange badge
  3. stored image badge
  4. coded credential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is throughput

A

Throughput is a measure of the time it takes for an authorized person or material to successfully pass on entry or exit point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Coded credential systems, also called key card systems. Many techniques are available for coding a badge. What are the common techniques exist for coding a badge

A

The most common techniques include magnetic stripe, Wiegand wire, bar codes, proximity and smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

While doing explosive detection why bulk techniques should not be used on people

A

Usually the bulk techniques use ionizing radiation that is not suitable for use on people due to safety considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The lever lock is inherently susceptible to what

A

Although the level lock is inherently susceptible to picking, it can be designed to provide a high degree of lock security through resistance to picking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Why making routine duplication of keys of a high security cylinder lock is quite difficult

A

In both types of high security locks, the keys are specially cut at specific angles, making routine duplication of keys quite difficult, except on special equipment used by the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

While doing package search, which method of search is not safe for use on personnel

A

In general, active interrogation methods are not safe for use on personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the most widely used method of controlling physical access

A

The locks is the most widely used method of controlling physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which technology is most commonly used for package search

A

Using backscatter technologies, people can be safely imaged, although X ray technologies are most commonly used for package searches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Write down the functional assemblies of components of a mechanical lock

A

In such a lock the functional assemblies of components are

  1. The bolt or latch that actually hold the movable part (door, window etc.) to the immovable part (jamb, frame etc.)
  2. The keeper or strike into which the bold or latch fits. the keeper is not an integral part of the lock mechanism that provides a secure housing for the bolt when in a locked position
  3. The tumbler array that constitutes the barrier or labyrinth that must be passed to move the bolt
  4. The key or unlocking device which is specifically designed to pass the barrier and operate the bolt.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is the greatest weakness of warded lock

A

Technologies for standoff detection of explosives are in great demand because of the need to detect explosive devices from a safe distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What are the basic elements of pin tumbler lock

A

The pin tumbler consists of the same basic elements as all mechanical locks, the bolt moving device, the maze or labyrinth and the keyway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What are the elements the locking policy should contain

A

Require that a systematic approach be taken to the use of locks for security purposes
1. Assign specific responsibility for the development of the lock program
2. Make all persons who will use or have access to keys, locks or access devices or combination information, responsible for compliance with program requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is the serious concern when designing an entry control system

A

Serious concern when designing an entry control system is the impact of fire codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

How maintenance of secure entry control can be achieved while addressing the fire code requirements simultaneously

A

An additional method of addressing fire code requirements while maintaining secure control includes the use of delayed exit hardware in which the door can be opened only after short period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What are the differences between a failsafe lock and fail secure lock

A

A fail safe locking mechanism is one that will unlock under any failure condition. The failure mode most commonly considered is loss of power but failure of the mechanism itself and any connected control device need to be considered also. A fail secure lock is one that will remain locked when power is lost of another failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance when selecting a fully integrated locking system

A

Care must be taken when selecting a fully integrated system to ensure that system AC&D performance is not degraded by the entry control function. This is why system testing under normal, abnormal, and malevolent conditions should be performed to verify system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which type of locks are claimed to be immune from all the typical defeat modes or a regular mechanical combination lock as well as from electrical and magnetic attacks

A

Wafer tumbler lock claimed to be immune from all the typical defeat modes of a regular mechanical combination lock as well as from electrical and magnetic attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Electromagnetic lock is fail safe or fail secure

A

Electromagnetic locks are intrinsically fail safe because removal of power releases the strike plate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What are the major security difficulties are presented by the master key technique

A

Three major security difficulties are presented by the master keying technique

  1. very effective master key accountability must be maintained
  2. in any manipulation of the lock additional positions or possibilities are presented for surreptitious unlocking by the creation of multiple shear liens or gate opening
  3. for cylinder locks the additional parts required in the lock core create the need for additional maintenance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Where are the electric deadbolt lock typically mounted

A

The electric deadbolt is the oldest and simplest of all electrical locking devices. A solenoid (electro magnet) moves a deadbolt, typically mounted on a door frame, either into or out of a strike plate on a door. The mechanism can be either fail safe, automatically unlocking on the removal of power, or fail secure, remaining locked on the removal of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What types of security vulnerabilities exits for mechanical locks

A

Attack by force surreptitious attack and attack by impression making and try keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Locking systems are coordinate arrays of mutually supportive and complimentary locking elements. They are based upon design plans which consider what are the elements

A
  1. The need for different concurrent levels of security control for locked spaces
  2. The likelihood that such levels will change with time. The probability that some or many users will require common access in some spaces and exclusive access in others
  3. The possibility that access devices (keys, cards or tokens) may be lost, compromised or damaged and
  4. The requirement that there be effective means for adapting the system to planned, as well as unanticipated changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is the typical application of the electric strike lock

A

In apartment houses, business offices, commercial installations and occupancies, what type of lock is used? A typical application of the electric strike is to control passage in one or both directions. Such devices have been used for many years in apartment houses, business officers, commercial installations and occupancies in general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

In the path of egress what type of lock may be used

A

As noted above, a fail secure lock may be used on a door in the path of egress provided that free egress is available regardless of the state of the locks power or other control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Why electric latch lock has advantage over the electric deadbolt lock

A

It has an advantage over the deadbolt because the latch does not need to be withdrawn for the door to close.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

When PIR sensors are more effective

A

A PIR is most effective if

  1. if the target is forced to cross the detection pattern
  2. entering and exiting multiple detection segments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Where pyro electric detector is generally used

A

To protect corridors long pyro electric infrared single segment sensors are used. To protect large open areas multi segment pyro electric sensors are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

How microwave sensors can be defeated

A

The vulnerabilities of microwave sensor include

  1. slow moving targets
  2. absorption or reflection of microwave energy
  3. blockage of the field of view (such as by stacking boxes or moving furniture around in room)
  4. motion along the circumstances of the detection pattern
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Where mono static sensors are generally used

A

Mono static microwave sensors are often used in the automatic door openers (supermarket, airports etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

When detection level of microwave sensor is optimum and maximum

A

The detection level of microwave sensor is
1. optimum (when target is moving toward or away from the sensor)
2. maximum (when across the detection zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

How continuity or breaking sensor can be defeated

A

Continuity or breaking sensor can be defeated through

1.the use of a jumper around a cut or
2. by movement of the wire to allow penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Where continuity or breaking sensors generally used

A

Continuity or breaking sensor generally to or enclosed in walls, ceiling or floor to detect penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Describe the working principles of Hall Effect switch function

A

Relying on the Hall Effect, devices in the switch unit measure and monitor the magnetic field strength of the magnetic unit. In a Hall Effect switch, if the Hall Effect devices measure enough magnetic field change, an alarm is generated. A Hall Effect switch is harder to tamper and defeat than a BMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Where generally glass break sensors are mounted

A

Glass break sensors are mounted directly on the glass they are protecting and generate alarm when detect the frequencies associated with break glass (normally above 20 KHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Ceiling, floors of rooms, and walls and doors can be best protected by which type interior intrusion sensors

A

Interior areas such as ceiling, floors of rooms and walls and doors can be best protected by boundary penetration intrusion sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

To detect what free standing infrared sensor often installed

A

Freestanding infrared sensor often installed to detect a human crawling and rolling on the ground across the microwave beam, keeping the body parallel to the beam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

As we know exterior sensors are exposed to electrical storms at most site, as a security practitioner what types of precautions needed to be undertaken to reduce lightning damage

A

Exterior sensors are exposed to electrical storm at most site. The precautions to lightning damage can be

  1. signal cables should be shielded, whether by their internal cable construction or by using metal conduit
  2. a good ground system is need which requires elimination of ground loops and use of grounds at a single point
  3. at the ends of the cables, passive transient suppression devices can be installed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What do you mean by sensor access mode

A

An access mode means the sensor alarms are temporarily masked so that alarms are not display at the alarm monitoring station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is the another name of mono static sensors

A

Mono static microwave devices can serve as point sensors to provide limited coverage of a pencil or area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What is the difference between bypass and spoof

A

Bypass : any sensor can be defeated by going around its detection volume.
Spoof : is a technique that allows the target to pass through the sensors normal detection zone without generating an alarm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

How electric field or capacitance sensors detect an intrudre

A

Electric field or capacitance sensor

  1. active, visible and terrain following
  2. detect, a change in capacitive coupling among a set of wire attached to
  3. may be triggered by lightning, rain, fence motion and small animals
  4. difficult to defeat because the detection volume extends beyond the fence plane
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

How intruder can defeat VMD

A

Very slow movement through the detection zone can defeat most VMDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

The entire volume or a portion of the volume of a room or building can be protected by which type of intrusion detection system

A

Volumetric intrusion detection sensor can protect the entire volume or a portion of the volume of a room or building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Describe working principle of passive infrared sensor

A

The principle of passive infrared sensors are

  1. intruder must through the field of view of detector
  2. sensors can detect changes in the background thermal energy by someone moving through the detector field of view and hiding in the energy emanating from objects in the background
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

How shadow zones and incomplete coverage of microwave sensor occur

A

Shadow zones are incomplete coverage of microwave sensor can be created by metal objects (large bookcases, desk, computer monitor or fencing) in the protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What are the cause of nuisance alarms of freestanding infrared sensors

A

While using freestanding infrared sensors, causes of nuisance alarms are

  1. vegetaion is higher than 1.2 in (2.5 - 5.0 cm)
  2. nearby parallel chain link fence with loose mesh that flexes in the wind
  3. heavy blowing snow
  4. snow accumulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

How sensor can be classified

A

The method of sensor classification are

  1. passive or active
  2. covert or visible
  3. line of sight or terrain following
  4. volumetric or line of detection and
  5. application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is recommended to achieve a high probability of detection at all times and under all expected weather conditions

A

To achieve a high probability of detection (PD) at all times and under all expected weather conditions, it is recommended to use of multiple sensors and to make contingency plan and procedures are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

How nuisance alarm of fence disturbance sensor can be reduced

A

Nuisance alarm of fence disturbance sensor can be reduced by using of rigid posts and tight fence fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What is the difference between bi static and mono static active intrusion sensor

A

Bi static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed separately. Mon static active intrusion sensor is an active sensor installation, when transmitter and the receiver are installed together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Write down the characteristics of intrusion sensor performance

A

The characteristics of Intrusion Sensor Performance are

  1. probability of detection (PD)
  2. nuisance alarm rate
  3. vulnerability to defeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

How ported coaxial cable sensor is affected

A

Ported coaxial cable sensor is affected by

  1. processor settings
  2. orientation of the intruder
  3. soil characteristics and
  4. the presence of meta
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What are the determining factors for the performance of buried seismic sensor

A

For buried seismic sensors the conductivity of the medium is the determining factor. Wet soil generally has good seismic conduction, a characteristics that can lead to nuisance alarms from distant sources of seismic activity. Highly conductive soil reduces the detection volume of the sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Which types of sensor helps to achieve absolute alarm confirmation and a high probability of detection

A

Absolute alarm confirmation and a high probability of detection can be achieved by using dual technology sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What should be the installation procedures of infrared sensor

A

The installation procedures of infrared sensor are

  1. it should be installed away from heat source
  2. an infrared detector should not be mounted over or near radiators, heater, hot pipes or other heating elements
  3. radiant energy from those can produce thermal gradients and could cause nuisance alarms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Passive sensors are likely safer to use in which environment? Why active sensors create fewer nuisance alarms

A

Passive or active sensors may detect vibration, heat sound or capacitance
Active sensor include microwave, infrared and other radio frequency (RF) devices
Passive sensors is likely safer to use in environment containing explosive vapors or materials
Active sensors have the advantages of creating fewer nuisance alarms because of their stronger signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What are the disadvantages of microwave sensors

A

The disadvantages of microware sensor are

  1. can detect someone or something moving outside the protected areas or even outside the building
  2. requirement for completely rigid mounting
  3. susceptibility to pattern drift
  4. tendency to reflect off metallic objects
  5. need for special consideration in areas with light construction (e.g., glass, plasters, board, wood)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Write the defeat method of fence disturbance sensor

A

Defeat Methods of fence disturbance sensors are

tunneling under the fence
crossing above the fence without touching it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

How many electromechanical sensors can be defeated? Where generally this type of sensor installed

A

Electromechanical sensors are passive, visible. The most common type is a simple switch and generally installed on doors and windows. These units can be defeated easily by placing a strong magnet near the switch unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What do you understand by maturity model

A

Maturity model is an approach for the decision makers and designers of security systems to select appropriate security technologies which will provide enhanced security within a finite budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What types of sensor is called application based intrusion detection sensor

A

Application based intrusion detection sensor can be classified as

  1. boundary penetration sensor
  2. interior motions sensor
  3. proximity sensor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What are the common sources of nuisance alarms of microwave sensors

A

Common sources of nuisance alarms of microware sensors are

1. movement of objects (non human) within and outside the detection zone
2. movement of small animals or birds
3. vibration allowed by poor sensors installation and mounting
4. ionized gas is fluorescent lights (60 hz rate of the ionization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What should be importantly done before installing VMD in a facility

A

Before installing VMD in a facility it is important to perform tests on

  1. low profile target such as crawler and faster moving higher profile targets (such as people walking or running)
  2. under the lowest contrast lighting condition expected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What is the limitation of line detection sensor

A

Line detection sensors only detect an intruder if he or she violates a particular entry point of a detection zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Who has the greatest opportunity to compromise sensors or the system

A

Insider among maintenance personnel has the greatest opportunity to compromise sensors or the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

How video motion detectors can be defeated

A

Video motion detectors can be defeated

  1. by taking advantages of poor visibility conditions
  2. blending into the background
  3. increased sensitivity results in increase in the number of nuisance alarms.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

How the probability of sensor fence is affected

A

The probability of detection of sensor fence is affected by

  1. tension of the wires.
  2. wire friction
  3. wire spacing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Which type of sensor and intruder can easily identify

A

Volumetric or line detection sensors

  1. a volumetric sensor generates alarms when an intruder enter the detection volume
  2. the detection zone is of a line detection sensor is usually easy for an intruder to identify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What are the factors that affect the probability of detection of intrusion detection system

A

The factors affect the probability of detection which are

  1. target to be detected
  2. sensor hardware design
  3. installation conditions
  4. sensitivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is the basic building block of an intrusion detection system

A

Sensors are the basic building blocks of an intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What is the most common measurement of the quality or detail in an analog image

A

Horizontal resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What we can refer a camera is megapixel

A

An imager that is made up of millions of pixel points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Based on which ability a lens should be chosed

A

For its ability to produce the desired identification information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

When AGC is extremely useful

A

When the camera swings into an area that is just below minimum light requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What are the revolutions took place at the advent of digital video technology in relation to analog system

A

2:1 interlace was dropped, the real time video is no more 30 frames by second and it no longer held to NTSC or PAL standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What lens formats would be suitable for a camera with chip size of 1/4 inch

A

1/4 inch of larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Define sensitivity, resolution and camera’s feature

A

Sensitivity :Minimum amount of light required by the camera to produce an image
Resolution : Measure of the camera quality, specifically number of horizontal scan lines or digital pixel arrays
Cameras feature : AGC, electronic shuttering backlight compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What is the function of electronic iris

A

It de amplifies the super bright and amplifies the sub blacks, creating an equal 1Vpp video image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

It is common to use different models within the same system. However what is important to verify when using cameras that were produced by different manufacturers within the same system

A

Need to verify compatibility of language and format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is the function of electronic shuttering

A

To compensate for light changes without the use of automatic or manual iris lenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What are the factors should be considered while determining the lens for a camera

A

Camera format, distance from the camera to the scene, and field of view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

When auto iris lens installed properly what it ensures

A

The video image remains at an average of one volt peak to peak (vpp) under optimal lighting conditions and as the video signal increases or decreases, the auto iris lens closes or open in direct proportion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What is the hardest task for a CCTV camera

A

To view a subject in front of a bright background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is the common tool for controlling the brightness of an image focused onto a chip

A

Auto iris lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What is the difference between NTSC and PAL

A

NTSC is 60 fields per second and 525 vertical lines
PAL 50 and 625

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

How is camera sensitivity expressed

A

Full light
Lower light
Low light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What is the function of automatic gain control (AGC)

A

To maintain the video signal at a specific level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

In NTC the viewer sees 30 complete frames each second and all analog CCTC monitors and cameras employ a 2:1 interlace pattern. How many completed frames each person can see while viewing PAL

A

Usually 25 frames per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What is the term given in dividing the CCTV image into a grid, and imposing different activation parameters on each grid

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

When most often phasing and sequencing problems arise

A

When cameras from different manufacturers are used on one system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

The camera should be chosen before what

A

Lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Why good video system is often waylaid

A

By expecting too much from a single unit or installing fewer cameras than are actually needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What basically determines the amount and type of image will ultimately appear on the monitor

A

Lenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

When tunnel vision results occure

A

If the lens format size is too small the lens will not fill the imager with a picture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

In your own way, explain what are the differences between subject, action and scene idenfitication

A

Subject identification is the ability to identify something or someone within the scene beyond a shadow of the doubt where action identification captures of what happens and scene identification recognizes a situation and its localization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

If a camera will be mounted on the side of a building, 40 ft from the ground and the center of the scene is 30 ft from the building, what is the distance from the camera to the scene

A

Explain using the Pythagorean formula. Using Pythagorean theorem which states that A2=B2+C2 where B=40 ft and C=30 Ft, A2=[40x40] + [30x30] = 16000 + 900 = 2500 Sq Ft. A=50ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

In your own words explain the difference between AC/EC (video) or DC/LC lenses. (you may have to cross reference with other sources as the POA is a little confusing in this area)

A

AC/EC (video) : Uses the antiquated auto iris lens design. Auto iris increase cost of lens used for older cameras
DC/LC (lens) : Has no electronics into for the auto iris control but rather depends on the camera to supply it with the necessary positive or negative motor voltages to operate the iris, absence of auto iris reduced cost and enhance efficiency, currently in vogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What basically determine the appropriate focal length for the lens

A

The field of view (height or width of the area being viewed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

For what reason you might use varifocal lens

A

Sometimes it is difficult to determine the exact field of view that a camera/lens match will produce. Other times there may be no standard fixed focal length lens available to get the desired field of view. A varifocal lens is a smaller version of a manual zoom lens that allows the installer to make fine adjustment on site to get the exact field of view. It also means that the installer has to carry around a smaller selection of lenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

If required view is a narrow area at long distance which can be compared to a telescope, as it enables the user to look at objects far away as they are close. Long range considered anything over 50 ft (15.25 m). It is which type of lens

A

Telephoto Lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

It is important to note, that the more area the camera views, the less details it picks up. In that case by using which type of technology larger area of view may be obtained without losing the required details of image

A

Working with megapixel technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

How varifocal lenses differ from zoom lenses

A

They do not cover a full range from wide angle to telephoto but only a slight range on either side of a fixed local length standard lens. They do not have a tracking mechanism and must be refocused each time their range is changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

An auto iris lens use a motor to open or close the iris. The need for more or less light is determined automatically by what

A

By the video sampling circuit in the lens or camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

The final size of the image determined by what

A

By the focal length of the lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

The selection of lens depends on what

A

The selection mainly depends on the size of the scene and the degree of visual identification required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What is the effective and fastest growing compression standard in the digital imaging market

A

H264

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Regardless of the type of camera for transmitting the video signal from the camera to the monitor at distance of 1000 ft (305m) or more, which type of cable best to use

A

Fiber optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is the primary difference between a standard lens and megapixel lens

A

Megapixel lens is considered to be much higher quality lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

For an average scene at medium distance, a standard lens is needed. If you were sing a 1/3 inch lens with a 1/3 inch chip. what would be the focal length of the lends (measured in mm)

A

8.333 mm rounded down to 8 mm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

The field of view is the final size of the viewing area as measured in width and height. analog systems create rectangular images that are four parts wide by three parts high (4*3). If the range is 12ft and then what must be height of the image

A

9ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

How IP cameras measure their resolution

A

As a multiple of the Common Intermediate Format (CIF), which is solution of 350*240. This means 352 pixels on a horizontal basis with 240 pixels on a vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What do you mean by 4 CIF

A

4 CIF means the user will have twice as many horizontal and twice as many vertical pixels to a single image or 707*480

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

After choosing a camera, what is the second most important decision of the video subsystem project

A

Choosing a lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

What is the primary factor in determining the resolution of an image

A

By the camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

The resolution of image can be determined by what

A

By the camera, by the transmission method, by the weakest link in the video system interface, by the reproduction capability of the image storage system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

How a digital image can be made smaller in both bandwidth and storage requirements

A

Through compression algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Which type of camera work well in all indoor applications

A

Standard analog CCD cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What is basically IP camera

A

An IP camera is an IP addressable internet protocol digital camera, in effect a true digital camera that leverages the advantages of building a CCTV system around IT architecture. It can typically transmit also in analog format. It is a smart camera that performs multi functions such as digital video motion detection, facial recognition, privacy blocking and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

If the video information is to be used in the courtroom, its admissibility may be determined by what

A

Quality of the recorded information, the way it was obtained, proof of originality, number of images per second/per camera that are best for the situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Where manufacturers equipment documentation should be preserved

A

At the using site as well as at a central document storage location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

What are the parameters determine the effectiveness of a video assessment subsystem

A
  1. Minimum time between sensor alarm and video display to complete video coverage of the detection zone
  2. Ability to classify a 1ft target at the far edge of the assessment zone
  3. Vertical field of view at the far edge of exterior detection zone to account for the height of a fence and a person climbing on top of it
  4. Continuous operation, 24/7
  5. Minimal sensitivity to environmental conditions of minimal obstruction of the assessment zone
  6. Camera field of view and video recording system integration that display the alarm source to an operator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Camera selection primarily based on what

A

Sensitivity required for a full video output signal in the lighting environment in the area to be assessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

What is the important consideration in the camera selection process

A

Camera format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

What affect the field of view, which dictates the number of lenses available in a variety of focal lengths

A

Camera format size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

To support resting of video subsystem test targets can be used to verify video image quality. What should be geometric shapes of the target

A

That included a 1ft (0.3 m) diameter circle, a 1ft, square, and a 1ft high triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

What is the use of simple method of checking for camera resolution

A

To use appropriately sized targets in the assessment zones and verify that they can be classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

What is test bench

A

Camera performance can also be verified in a laboratory using a test bench. This allows measurement of resolution, focus and sensitivity and can be more cost effective than performing testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

BSK-W Solutions

A

Provide support to CPP, through systematic mentoring with help of Question Bank, Flashcards and Important notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

When it can be considered that a safe within a safe passes the test

A

The safe passe the test if the information loss after the fire does not exceed 1 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

What can downfall the best designed vaults

A

Inadequate policies and procedures for opening and closing vaults are often the downfall of even the best designed vaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

How the fire and impact endurance test is carried out the safe within a safe

A

In the fire endurance test, the container is loaded with recorded tapes, discs, and microfilm. Two temperature limits are employed, 150 deg F (66 deg C) for magnetic tape and microfilm, and 125 deg F (52 deg C) for diskettes. The container is placed in a test furnace that starts with an interior temperature of 70 deg F (21 deg C). During the cooling cycle, the interior temperature and relative humidity are recorded until a temperature of 120 deg F(49 deg C) is reached. A second unit is also subjected to the fire impact test - a 30 ft (9 m) drop after heating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

BSK W What is lifeblood of every organization

A

Records are the lifeblood of every organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Where more often wire glass is used

A

Wire glass is used often in fire doors and fire windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

What is the time to penetrate most unenhanced windows with and tools

A

Most unenhanced windows can be penetrated with hand tools in less than 30 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

How to upgrade a panic bar equipped door

A

One way to upgrade the panic bar equipped door is to install a bent metal plate with a drill resistant steel sections fastened to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

How the penetration resistance of windows and utility ports may be increased

A

The penetration resistance of windows and utility ports may be increased with grilles, a bards, expanded metal mesh or screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Glass/polycarbonate composite glazing contains a tough core of polycarbonate between two layers of a glass. Where can glazing be used?

A

Glass/polycarbonate composite glazing contains a tough core or polycarbonate between two layers of glass. The glazing was developed for use in prisons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

How to define laminate glass

A

Laminated glass is made of two or more panes of annealed float, sheet or place glass bonded to a layer or layers of plastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

What is the optimum distance between the roof and secondary barrier

A

The optimum distance between the roof and the secondary barrier is 10 to 12 in (254 mm to 305 mm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Where dispensable barriers are usually deployed

A

Dispensable barriers are usually deployed very near the assets being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Which type of safe is not burglary resistant

A

A safe on wheels is not burglary resistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

By which organization a labelling service has been established to define the level of protection each safe can be expected to provide

A

A labelling service has been established by Underwriters Laboratories Inc (UL) to define the level of protection each safe can be expected to provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

What can be best path of an adversary to achieve forcible entry

A

In fact as wall may be an adversary’s path for forcible entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

When are picking tools and pipe wrench is used by a penetrator to open a lock

A

Picking tools work only if a keyway is available and a pipe wrench works only on exposed locking hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

What is the average picking time for a skilled locksmith to pick a lock

A

The packing time depends on the type and condition of the lock but averages about one minute for a skilled locksmith.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

Why light gauge vertical reinforcement channels are sometimes used inside hollow core doors

A

Light gauge vertical reinforcement channels are sometimes used inside hollow core doors to add strength and rigidity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

What are the elements that the delay provided by barriers greatly depends

A

The delay they provide depends greatly on the adversary’s tools and techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

How the tasks of adversary can be made complicated

A

Delay in depth is analogous to protection in depth for detection systems. Placing several layers of varying barrier types along all possible path the adversary could take complicates the adversary task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

How to determine the barriers ultimate value

A

The weakest portion of a barrier determines the barriers ultimate value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

When a barrier is considered to be penetrated

A

A barrier is considered penetrated when a person passed through, over, under or around it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

What is the first step in upgrading a facility’s resistance to penetration

A

Eliminated unnecessary door is the first step in upgrading a facility’s resistance to penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

The penetration time depend on what? What types of attach tool can be used to penetrate a barrier

A

Barrier penetration time depends in part on the method of attack, including the necessary equipment. Attack tools considered in this chapter are

  1. Hand tools
  2. Power hand tools
  3. Abrasive water jets
  4. Vehicles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

How response time can be shortened

A

Response time can be shortened by minimizing the time needed to assess the situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

On what element the selection and placement of barriers depends

A

The selection and placement of barriers depends on the adversarys objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

What is the disadvantage of using rolls of barbed tapes

A

Rolls of barbed tape tend to obscure CCTV views in the clear zone, thereby increasing assessment time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

What concepts eyes on the street speaks about

A

Urban planner, Jane Jacobs developed concepts about eyes on the street, and proper land use to the creation of defensible space theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

How defensible space can be designed

A

Defensible space design link territoriality and surveillance by created design that leads people

  1. to consider the area as being within their sphere of influence
  2. a place where they have a responsibility to prevent crime.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

According to the CPTED approach, when a design can be considered proper

A

In the CPTED approach, a design is proper if

  1. it recognized the designated use of the space
  2. defines the crime problem incidental
  3. defines the solution to problem compatible with the designated use
  4. incorporates the crime prevention strategies that enhance the effective use of the space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

What do you understand by Capacity Threshold Theory

A

Capacity Threshold theory is also known as tipping point theory. This strategy balance land uses and urban. For example

  1. too many abandoned properties can tip an area into crime
  2. whereas balance of legitimate commercial properties can enhance livability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

According to the CPTED approach, when a design can be considered proper

A

In the CPTED approach, a design is proper if

  1. it recognizes the designated use of the space
  2. defines the crime problem incidental
  3. defines the solution to problem compatible with the designated use
  4. incorporates the crime prevention strategies that enhance the effective use of the space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

How CPTED strategies can be implemented

A

CPTED strategies can be implemented through

  1. organized method (staffing)
  2. mechanical methods (technology products)
  3. natural methods (site planning, design, landscaping and signage)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

What is the most vulnerable asset to be protected

A

People are the most vulnerable asset to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

What approaches are adopted in situational crime prevention

A

Approaches to situational crime prevention are

  1. increasing the effort
  2. increasing the risks
  3. reducing anticipated rewards
  4. removing excuses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

What are the purposes of security zoning

A

Purposes of security zoning are

  1. to allow employees, visitors, vendors and other to reach their destination
  2. to prevent them from entering areas whereas they have no business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

Define natural access control, natural surveillance and natural territorial reinforcement

A

Natural access control means the idea is to employ both real and symbolic barriers including doors, fences and bushes to define and limit access to a building or other space. Natural surveillance means increasing visibility by occupants and casual observers increases the detection of trespassers or misconduct at a facility, Natural Territorial reinforcement means this is the process of establishing a sense of ownership, responsibility and accountability in property owners, managers or occupants to increase vigilance in identifying tress passers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Basing on what categories architects and engineers are called to implement security measures

A

The standards call on architects and engineers to implement security measures in four different categories which are

  1. perimeter and exterior security
  2. entry security
  3. interior security
  4. security planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

To apply CPTED what needs to be understood

A

Applying CPTED requires an understanding of basis crime prevention theory practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

What do you understand by crime prevention assumptions

A

Crime prevention assumption emphasis must be given to the environment of the potential victim rather than that of the potential criminal, crime prevention is practical, not moralistic, reducing criminal motivation by reducing opportunities to commit crime and crime prevention strategies should focus on the act not the perpetrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

According to the CPTED theory what do you mean by natural measures

A

Natural measures include such as

  1. good space planning
  2. well defined building entrance
  3. arranging courtyards, patios and porches for unobstructed lines of sight
  4. provide specific guidance for the use of space
  5. provide architectural landscaping
  6. enhance visibility actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

What are the strategies included in situational crime prevention approaches

A

Situational crime prevention includes strategies

  1. to reduce crime motives and opportunities
  2. simulating the conscience of potential offenders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

When likelihood of crime increase

A

The likelihood of crime increase when a potential criminal feels that

  1. the chances of detection and identification are low
  2. the chances of escape are high
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Write down the components of Newmans study

A

The four components of Newman’s study were to

  1. define perceived zones of territorial influence
  2. provide surveillance opportunities for residents and their guests
  3. place residential structures close to safe areas
  4. design sites and buildings to these occupants are not perceived as stigmatized or vulnerable
253
Q

According to the exploration of Newman, by implementing what are the elements crimes can be reduced

A

Newman explored human territoriality, natural surveillance and the modification of existing structures to reduce crime

254
Q

What are the components in 3 D concepts

A

CPTED strategy is also now as 3 D concepts which are

defined
designated
designed

255
Q

What is the ultimate purpose of CPTED

A

To reduce crime opportunity and fear of crime

256
Q

What is important to choose first for the right physical security measures and apply them appropriately?

A

To choose the right physical security measures and apply them appropriately, it is important to first conduct a risk assessment

257
Q

CPTED relies on what?

A

Crime prevention design solutions should be integrated into the design and function of the buildings, or at least the location where they are being implemented. CPTED relies on an awareness of how people use space for legitimate and illegitimate purpose

258
Q

What is building envelope and what it serve?

A

Building envelope: The separation between the interior and the exterior environments of a building. It serves as the outer shell to protect the indoor environment as well as to facilitate its climate control.

259
Q

What is risk assessment?

A

The process of assessing security‐related risks from internal and external threats‐to an entity, its assets, or personnel

260
Q

What is risk management

A

A business discipline consisting of three major functions: loss prevention, loss control and loss indemnificatory

261
Q

What routine activity theory suggests

A

Routinely activity theory suggests that a suitable guardian will prevent criminal activity from occurring. Criminals will generally avoid targets or victims when police, security, door staff, neighbors or others are in position to observe and react

262
Q

What is CCT rating

A

Corrected Colour Temperature (CCT) is a measure of the warmth or coolness of a light. It is measured in degrees Kelvin which is the Centigrade (Celsius) absolute temperature scale where 0OK is approximately 272OC

263
Q

What is security survey

A

A thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies and gauge of protection needed

264
Q

What is stand‐off distance or set back

A

Stand‐off distance/ set back: The distance between the asset and the threat, typically regarding an explosive threat.

265
Q

What is tailgating

A

To follow closely. In access control, the attempt by more than one individual to enter a controlled area by immediately follows an individual with proper access. Also called piggybacking.

266
Q

When a space will naturally have less opportunity for criminal activity

A

Natural or Architectural measures Designing of space to ensure the overall environment works more effectively for the intended users; while at the same time deterring crime. A space will naturally have less opportunity for criminal activity when it is effectively used. Poor layout reduces the ability of intended users to apply appropriate measures.

267
Q

Explain progressive collapse

A

Progressive collapse: Occurs when the failure of a primary structural element results in the failure of adjoining structural elements, which in turn causes further structural failure. The resulting damage progresses to other parts of the structure, resulting in a partial or total collapse of the building.

268
Q

What is risk

A

The likelihood of loss resulting from a threat, security incident, or event

269
Q

What is threat

A

An action or event that could result in a loss; an indication that such an action or event might take place.

270
Q

What is throughput

A

The average rate of flow of people or vehicles through an access point

271
Q

What is token

A

An electronically encoded device (i.e. a card, key‐fob, etc.) that contains information being read by electronic devices placed within or at the entry and exit points of a protected facility.

272
Q

Based on CPTED, explain organizational measures

A

Focus on policies activities that encourage observation, reporting and where appropriate intervention this would include education for individuals and groups of strategies they can take to protect themselves and the space they occupy. It would also entail routine patrol and enforcement by security, law enforcement or others.

273
Q

Explain natural territorial reinforcement boundary definition

A

Natural territorial reinforcement boundary definition: Establishing a sense of ownership by facility owners or building occupants to define territory to potential aggressors and to assist legitimate occupants or users to increase vigilance in identifying who belongs on the property and who does not. The theory holds that people will pay more attention to and defend a particular space or territory from trespass if they feel a form of “psychological ownership” in the area. Thus, it is possible‐through real or symbolic markers‐to encourage tenants or employees to defend property from incursion

274
Q

Wooden fences are used for(a)……………………..Wooden fence’s effectiveness can be enhanced by adding(b)………………………… When utilizing a wood and fence to delay entry, the vertical picket sections must be (c)……………………. and the horizontal sections should be (d),…………………….. located on the(e)………………………..

A

(a) low‐security applications,
(b) barbed wire, razor wire, or metal spikes,
(c) no wider than 1‐3/4 inches,
(d) 50 inches apart
(e) protected side of the building.

275
Q

The width of the clear zone depends on what? When exception can be made in relation to the clear zone

A

Wherever possible and practical, a clear zone should separate a perimeter barrier from structures inside the protected area. The width of the clear zone will depend upon the threat that is being protected against. An exception can be made when a building wall constitutes part of the perimeter barrier

276
Q

Explain four design features of chain‐link fence

A

1‐Height: The higher the barrier, the more difficult and time‐ consuming it is to breach. For low security requirements, a 5‐6 ft. (1.5‐1.8 meter) fence may be sufficient; for medium security, a 7 ft. (2.1meter) fence may be appropriate; and for high security (such as a prison), an 18‐20 ft. (5.4‐6.0 meter) fence maybe required,
2-Barbed wire: Barbed wires vary in gauge, coating weight, number of barbs, and spacing of barbs. If chain link or expanded metal fences are intended to discourage human trespassing, barbed wire should be installed atop the fence on an outward facing top guard at a45 degree angle,
3‐Bottom rail: Properly anchored, this prevents an intruder from forcing the mesh up to crawl under it,
4‐ Top rail: A horizontal member of a fence top to which fabric is attached with ties or clips at intervals not exceeding two feet. A top rail generally improves the appearance of a fence, but it also offers a handhold to those installed.

277
Q

What broken windows theory speaks about

A

The “broken windows” theory suggests that an abandoned building or car can remain Unmolested indefinitely, but once the first window is broken, the building or car is quickly vandalized. Maintenance of building and its physical elements (such as lighting, landscaping, paint, signage, fencing and walkways) is critical for defining territoriality

278
Q

In relation to chain‐link fence what prevents an intruder from forcing the mesh up?

A

Burying / Mow strip: Burying or installing a mow strip (concrete), in addition to a chain‐ link fabric 1 ft. (0.3 meters) or more, prevents an intruder from forcing the mesh up.

279
Q

What fence or wall can do?

A

Fence or wall can do the following:
1‐Give notice of the legal boundary of the premises,
2-Help channel entry through a secured area by deterring entry elsewhere along the boundary,
3‐Provide a zone for installing intrusion detection equipment and video surveillance system,
4‐Deter casual intruders from penetrating a secured area,
5‐’Force an intruder to demonstrate his or her intent to enter the property,
6‐ Cause a delay in access, thereby increasing the possibility of detection,
7‐Create a psychological deterrent,
8‐ Reduce the number of security officers required,
9‐Demonstrate a facility’s concern for security

280
Q

Explain the concept of compartmentalization

A

One of the basic CPTED strategies is to design multiple or concentric layers of security measures so that highly protected assets are behind multiple barriers. Layers of security strategies or elements start from the outer perimeter and move inward to the area of the building with the greatest need for protection. Each layer is designed to delay an attacker as much as possible. This strategy is also known as protection‐in‐depth (Fay, 1993, p672). If properly planned, the delay should either discourage a penetration or assist in controlling it by providing time for an adequate response

281
Q

Explain double fencing

A

An additional line of security fencing a minimum of10 ft. to 20 ft. (3 meters to 6 meters) inside the perimeter fence creates a controlled area and room for sensors or a perimeter patrol road between the fences

282
Q

Where welded wire fabric is generally used

A

Welded wire fabric, which is cheaper than expanded metal, is generally used for lower risk applications.

283
Q

What affects the amount of protection required

A

The value of an asset being protected affects the amount of protection required.

284
Q

Which strategy should be used while selecting physical barriers and the barriers designed to address the specific threats?

A

A threat basis design strategy should be used when selecting physical barriers and the barriers designed to address the specific threats.

285
Q

What is the most common perimeter barrier

A

The most common perimeter barriers are fencing and walls. However, fences and walls usually only deter or delay entry‐they do not prevent it entirely

286
Q

Against what Chain‐link fence effective

A

Chain‐link fences are quick to install, can be effective against pedestrian trespassers and animals and provide visibility to both sides of the fence.

287
Q

By using which types of tools chain‐link fence can be breached easily?

A

Chain‐link fence fabric is made from steel or aluminum wire (which may be coated), which is wound and interwoven to provide a continuous mesh. It can be breached easily with a blanket, wire cutter, or bolt cutter.

288
Q

What types of protection window film can provide

A

Window film can be designed, tested, and applied to:
1‐Provide varying degrees of protection from intrusion or “smash and grab”. It can generally be defeated with repeated attacks,
2‐Reduce injury from projectile shards of glass in case of an explosion or blast force,
3‐Reduceinjury form projectile penetration in case of extreme weather (i.e., hurricane or tornado

289
Q

Electric security fences consist of (a)……………… supported by posts fitted with insulators. These fences can be (b) ………………for wall top security, or (c) ………….. for high security sites. Most industrial applications are 8ft (2.4m) high with (d) ………

A

a) a close wire grid,
(b) simple 5 wire systems,
(c) multi‐zoned systems with up to 50 wires,
(d) 20 wires and are fitted to the inside of the chain link perimeter fence.

290
Q

What is the difference between deterrent fence and monitored fence

A

Electric security fences come in two forms:
1) the all live wire “deterrent” fence that relies on the human fear of electric shock; or more commonly
2) the “monitored” fence, where in addition to the fear factor, the fence will detect cutting or climbing of the wires and trigger an alarm. Monitored fences are usually integrated with intruder alarm or access control systems and‐increasingly‐with surveillance cameras

291
Q

Most building intrusions are effected through what.

A

Most building intrusions are effected through doors and windows

292
Q

Annealed or plate glass has been manufactured to control (a) ……………. such that it can be subjected to fabrication. Regular plate, float, sheet, rolled, and some patterned surface glasses are examples of (b)…………………… Annealed glass breaks into large shards that can cause (c)…………………..and building codes may restrict its use in places where (d) ……………………………………….such as door panels and fire exits.

A

(a) residual stresses
(b) annealed glass.
(c) serious injury,
(d) there is a high risk of breakage and injury

293
Q

What types of measures can be taken to strengthen the doors

A

Measures can be taken to strengthen the doors by adding steel plate for reinforcement anchoring frames, and adding kick plates, using set screws in hinges or spot welding hinges.

294
Q

(a) ……………. is composed of two sheets of ordinary glass bonded to a middle layer or layers of plastic sheeting material. When laminated glass is stressed or struck, it may crack and break but the pieces of glass tend to adhere to the plastic materials. It is also the preferred glass type (b) …………………………. It will aid in the protection of building occupants from (c) …………………………………. in the event of an explosion.

A

(a) Laminated glass,
(b) for mitigating blast forces,
(c) glass shattering

295
Q

(a)……………….. or burglar resistant provides stronger resistance to attack. It is laminated and consists of multiple plies of glass, polycarbonate, and other plastic films to provide (b) ……………………

A

(a) Bullet‐resistant
(b) many levels of ballistic resistance

296
Q

Describe working principle of credential‐operated locks

A

Credential‐operated locks rely on a unique card or other device being presented to a card reader at a location where the access is being controlled. The system electronically checks the information (including the identification of the cardholder and the time period when access is permitted) on the card and compares it with the information already entry or denies access.

297
Q

What are the key factors to be considered in hardening a facility

A

Key factors in hardening a facility include:
1‐ stand‐off distance,
2‐structural integrity of the premises against attack,
3‐ prevention of progressive collapse,
4‐ redundancy of operating systems.

298
Q

………………………. , a single key operates a series of mechanical locks, and each of those locks is also operated with another key specific to that lock. Since the compromise of a master key can compromise an entire facility, the use of any master key must be strictly controlled.

A

In a master key system

299
Q

What type of curtains provides protection from flying materials in an explosion?

A

Blast curtains are made of reinforced fabrics that provide protection from flying materials in an explosion.

300
Q

What are the measures needed to consider to decide whom to let into a facility and whom to keep out, it is necessary to?

A

Measures such as:

1‐Tokens or other items in the person’s possession(such as a metal key; a proximity, insertion, or swipe card or a photo identification card),
2‐Private information known by the individual (such as a password or personal identification number,
3‐ Biometric features of the person (such as fingerprint, hand geometry, iris and retinal patterns, signatures or speech patterns)

301
Q

What types of attack an adversary might adopt to defeat an access control point?

A

An adversary may use several types of attacks to defeat an access control point:
1‐Deceit: employee to permit entry,
2‐ Direct physical attack: The adversary uses tools to force entry into an area,
3‐Technicalattack: The adversary forges a credential, guesses a personal identification number, or obtains another person’s credential.

302
Q

Typically what are the purposes of security lighting

A

Typically, the purposes of security lighting‐discouraging unauthorized entry, protecting employees and visitors on site, and detecting intruders‐are served both outdoor and indoor

303
Q

Electronic access control systems validate (a) ……………………….. which can be in the form of something you know, (b) ……………………… or something you carry. Components of central database, software, supplementary interfaces to external systems, and (d)…………………………………

A

(a) one or more credentials
(b) something that is inherent to you,
(c) communication cabling distributed processor,
(d) applications for request‐to‐exit devices for applicable doors.

304
Q

How progressive collapse can be prevented?

A

Prevention of progressive collapse, accomplished by structural design that prevents the loss a primary structural member from causing the further failure of primary structural members beyond the local damage zone.

305
Q

Mechanical locks – such as door locks, cabinet locks and padlock use an arrangement of physical parts to prevent the opening of the bolt or latch. The two major components in most mechanical locks are the……………………………………….

A

a) architecturally significant
b) mechanical latching otherwise ©with safety codes.

306
Q

Which types of lamps are the least efficient, the most expensive to operate, and have a short life span?

A

Incandescent lamps are the least efficient, the most expensive to operate, and have a short life span

307
Q

The quality of IDS and its components greatly affects its usefulness. How deficiencies in IDS can harm a security program?

A

The quality of IDS and its components greatly affects its usefulness. Deficiencies can harm a security program by causing the system to:
1‐Fail to detect an intruder,
2‐Falsely report breaches(nuisance and unintentional) which generate costly and repeated deployment of security or law enforcement and maintenance personnel,
3‐Create excessive false activations so that alarms are ignored or security and law enforcement officers are called unnecessarily. (Many jurisdictions levy fines for excessive numbers of false alarm calls to police,
4‐Provide a false sense of security

308
Q

The right level or intensity of lighting depends on what?

A

How intensity of lighting can be measured? The right level or intensity of lighting depends on a site’s overall security requirements. Lighting intensity can be measured within instruments in lux and foot‐candles

309
Q

Which light projects a downward circular pattern illumination?

A

Streetlight

310
Q

Where generally floodlights are used

A

Floodlight projects a medium to wide beam on a larger area. It is used in a variety of setting including the perimeters of commercial, industrial, and residential areas

311
Q

What are the advantages of dual technology motion detectors?

A

Dual technology motion detectors are selectable to employ or both micro waves and inferred technologies in a single package. Selecting both technologies reduces the false alarm rate and detection sensitivity

312
Q

Which type of lamps are energy efficient and have a long life span, but poor colour rendition for video surveillance system. They are often applied on streets and parking lots, and their particular quality of light enables people to see more detail at greater distances in fog?

A

High‐pressure sodium

313
Q

Fresnel: This lighting typically projects a narrow, horizontal beam. Unlike a floodlight, which illuminates a large area, the Fresnel can be used to (a) …………………….. while leaving security personnel concealed. It is often used(b)……………………………

A

(a) illuminate potential intruders
(b) at the perimeters of industrial sites.

314
Q

Where capacitance devices generally are used

A

Capacitance devices are often used with various metallic products such as safes and vaults, these devices detect changes in electrical capacitance) low voltage is applied to the protected items. If an object or person approaches or touched the protected item, the voltage (non‐harmful) discharges, altering the capacitance level and causing an alarm

315
Q

Which type of lamps are more efficient than incandescent lamps but are not used extensively outdoors, except for underpasses, tunnels, and signs?

A

Fluorescent

316
Q

Which type of lamps take several minutes to produce full light output and have poor colour rendition for video surveillance, but they have a long life?

A

Colour rendition for video surveillance, but they have a long life

317
Q

Which type of lamp used at sport stadium, work well with video surveillance and can provide accurate colour rendition?

A

Metal halide

318
Q

Which types of lamps have a long life and, similar to fluorescent lamps, are utilized mainly indoors, except for parking structures underpasses, and tunnels?

A

Induction lamps

319
Q

Name the different types of duress/panic alarms? When these alarms should be used?

A

Wired switches, person‐down devices, wireless pushbutton transmitters, “Lack of Motion” devices, emergency notification call boxes, etc., are some of the device types which are employed to protect personnel by transmitting assistance alarms. These alarms should be of the highest priority level

320
Q

What should be the functional requirements for a camera?

A

Different functions require different fields of view. For camera functional requirement one most considers three factors:
1‐ target,
2‐activity,
3‐ purpose

321
Q

What are the functions of network video recorders

A

A NVR is an internet protocol based device that sits on a network. Because they are IP based, NVR scan be managed remotely via a LAN WAN, GAN, or over the Internet

322
Q

By using which type of lens it is possible to expand or narrow the field of view providing enhanced viewing flexibility?

A

A motorized vari‐focal lens is used to expand or narrow the field of view providing enhanced viewing flexibility

323
Q

Define time‐lapse (analog) recorder

A

These recorders are designed to make a two‐hour cassette record up to 900 hours by allowing‐time to lapse between recorded images. Instead of a full 25 frames (FAL) or 30frames (NTSC) of video information being recorded each second, a time‐lapse recorder may capture only a fraction as many frames. The strongest market for the time‐lapse machine is retail, industrial, and long-term surveillance.

324
Q

What is the potential drawback to PTZ camera applications?

A

A potential drawback to PTZ camera applications is that the camera is out of position, unable to capture an event as it is happening. Most PTZ camera applications are used for assessment or video patrol purpose

325
Q

Coaxial cable is generally sufficient (a)……………. , but it does not work for IP‐based systems (B)………………….

A

(a) for analog cameras
(b) without media transformer

326
Q

Where intelligent video analytics are used?

A

Intelligent video analytics can used for the the recognition of certain events and conditions, such as an unattended package or vehicle, or movement by an animal versus a human being

327
Q

When selecting video surveillance system equipment, it is important to use a systems approach as opposed to a components approach. What do you mean by system approach?

A

Approach as opposed to a components approach. A systems approach examines how equipment will work with other elements of the video surveillance system, with other workplace systems, and with the environment in which it is needed. This approach results in a video surveillance system that operates effectively and satisfies a facility’s needs

328
Q

What are the elements affect the image quality?

A

Image quality is also affected by excessive shadows (light to dark ratio), lens glare and backlighting

329
Q

What is the fundamental tool to most security officer positions

A

Keys.
Care should be taken to ensure that all keys are accounted for at the beginning and end of shift. Additionally, proper care should be taken so that damage to keys does not occur

330
Q

What do you mean by frames per seconds

A

Recorders may discard image frames to save storage space. If too many are discarded – that is, if the system records only one or two frames per second then fast moving action may not be captured or items in the scene may seem simply to appear or disappear.

331
Q

Explain focal length of a lens

A

The focal length of the lens determines the size (width and height) of the scene viewed measured in millimeters and are characterized as telephoto standard or wide angle Varifocal lenses are often used in applications that require a zoom capability. The lens’s iris, which opens and close to controls the quantity of light that reaches the camera’s sensing element, may be manual or automatic.

332
Q

Name the major types of video surveillance cameras

A

The major types of video surveillance cameras are:
1‐ analog,
2‐IP (Internet protocol),
3‐ Infrared,
4‐ thermal.

333
Q

What can greatly affect a video surveillance system budget

A

The availability of power can greatly affect a video surveillance system budget

334
Q

What do you mean by security convergence

A

It is recognized that many security systems are increasingly being equipped with network connectivity to enable them to share a facility’s network infrastructure. Planning for, implementation, and management of converged security solutions often requires partnerships between physical security, IT security, IT, and other corporate or organizational stakeholders.

335
Q

A concerted effort to address security issues on policy level shows ……………. and that management was aware of such issues and attempted to address them

A

due‐diligence

336
Q

In a broad sense, (a) ………………. should be considered part of the security program. Through a (b)……………………… employees should be taught to understand the relationship between security and the organization’s success, learn their obligations under the security program, understand how various security measures support security program objectives, and become familiar with available resources to help with security concerns.

A

(a) every employee
(b) security awareness program

337
Q

What is post orders

A

Post orders, which are sometimes called standard operating procedures, state the essential elements of security officers’ work assignment

338
Q

What form the basis for corrective action in the event of inappropriate behavior or underperformance

A

Policies and procedures can also form the basis for corrective action in the event of inappropriate behavior or underperformance.

339
Q

Policies are generally reviewed, approved, and issued (a) ……………………. of an organization. Once established, they tend to remain in place for an extended period. Therefore they should be aligned with the (b)…………………. of the organization.

A

(a) at the executive level
(b) overall business objectives

340
Q

What are the differences between compliance based vulnerability assessment and performance‐ based vulnerability assessment?

A

Compliance‐based approaches depend on conformance to specified policies or regulations; the metric for this analysis is the presence of specified equipment and procedures. Performance‐based approaches, on the other hand, evaluate how each element of the PPS operates and what it contributes to overall system effectiveness. The use of compliance‐based (or feature‐based) systems is only effective against low threats, when assets have a low consequence of loss, or when cost‐benefit analyses show that physical protection measures are not the most cost‐effective risk management alternative. A compliance‐based analysis is easier to perform because the measure of system effectiveness is the presence of prescribed PPS equipment, procedures, and people

341
Q

System effectiveness is a result of proper implementation of principles of physical security. What are these principles

A

System effectiveness is a result of proper implementation of these principles:
1‐Detect an adversary attack while there is still enough time to respond as desired (timely detection).,
2‐ Provide a timely and accurate assessment of alarms to separate valid intrusions from nuisance alarms.
3‐Communicate alarm information to a response force in a timely manner, or record all required information for after‐the‐event response,
4‐ Establish performance measures for each PPS function—detection, delay, and response—for each defined threat category or level.,
5‐ Ensure detection occurs before delay.,
6‐ Delay the adversary long enough for alarm recording and storage or for immediate response to interrupt the adversary,
7‐Use protection‐in‐depth (multiple layers),
8‐Ensure balanced protection.,
9‐Engage and neutralize the adversaries, using force if appropriate,
10‐Conduct path and scenario analyses, and use analysis tools to predict system effectiveness, using interruption alone, or in combination with neutralization, as the overall performance measure.

342
Q

What is the difference between video surveillance and video assessment

A

The difference between video surveillance and video assessment was also described, the major difference being the use of sensors to trigger an event and the immediate presentation of pre‐and post‐alarm video to a human operator for immediate action

343
Q

What is the best technique to objectively assess security elements and systems?

A

However, characterizing technology by testing to statistical standards is still the best technique to objectively assess security elements and systems

344
Q

What is required to make the alarm monitoring system as effective as possible?

A

The alarm monitoring system must communicate sensor activation to a central monitoring point, and then appropriate data is displayed to the operator. Tight integration of technology, human factors, procedures, and training is required to make the alarm monitoring system as effective as possible.

345
Q

When conducting either a qualitative or quantitative performance‐based analysis, the same six‐step process is used. What are these steps?

A

These are the steps used when conducting either a qualitative or quantitative performance‐based analysis,
(1)‐Create an adversary sequence diagram (ASD) for all asset locations,
(2)‐Conduct a path analysis,
(3)‐ Perform a scenario analysis,
(4)‐Complete a neutralization analysis, if appropriate,
(5)‐Determine system effectiveness,
(6)‐If system effectiveness (or risk) is not acceptable, develop and analyze upgrades.

346
Q

To protect what type of asset, immediate on‐site response is required? When delay response is considered as appropriate?

A

An immediate on‐site response is required to protect critical assets, while a delayed response may be more appropriate for lower‐value assets.

347
Q

After completion of PPS design, what is the next step?

A

After a PPS is designed, the next step is to evaluate the design for its effectiveness in meeting protection goals and objectives

348
Q

What are the components of detection subsystem which provide notification of a potential security event?

A

The components of each detection subsystem combine people, procedures, and technology to provide notification of a potential security event.

349
Q

What could be response strategies?

A

Response strategies including containment, denial, and occasionally, assault (or force) were described

350
Q

When quantitative analysis of risk assessment is essential?

A

For assets with unacceptably high consequence of loss, it is necessary to conduct a rigorous quantitative analysis, even if the probability of attack is low.

351
Q

What is the key principle of PPS analysis?

A

A key principle of analysis is that an initial baseline must first be established; upgrades are then considered if the baseline shows that the PPS does not meet goals and objectives.

352
Q

How to define interruption?

A

Interruption is defined as arrival of responders at a deployed location to halt adversary progress

353
Q

What do you understand by response storyboard?

A

Creation of a response storyboard allows the analyst and tactical experts to get a sense of how long it will take for the response force to fully engage with the adversary and what tactics are appropriate at different stages of the attack and response. Often, the response storyboard is used for neutralization analysis and scenario development

354
Q

What is adversary path?

A

An adversary path is an ordered series of actions against a facility, which, if completed, results in successful theft, sabotage, or other malevolent outcome.

355
Q

Why an adversary sequence diagram is used?

A

An adversary sequence diagram (ASD) is a functional representation of the PPS at a facility that is used to describe the specific protection elements present.

356
Q

When neutralization analysis can be performed?

A

After weak paths and suitable attack scenarios have been determined, a neutralization analysis can be performed

357
Q

What are the steps to be followed to conduct a scenario analysis?

A

The steps to conduct a scenario analysis as follows:
1‐Develop attacks and tactics designed to exploit weak paths. Consider attacks during different facility states using the defined threat and capability,
2‐Modify performance estimates for path elements using these tactics or under these states,
3‐Document the assumptions used and the results of the scenario analysis

358
Q

What features should be considered while upgrading options in PPS

A

The upgrade options generally consider the interaction of detection, delay, and response features, as well as operational effects, life‐cycle performance‐cost trade‐offs, single‐point failures, reliability, quality, and maintenance of the security system.

359
Q

Why path analysis is carried out

A

A path analysis determines whether a system has sufficient detection and delay to result in interruption, it is conducted first

360
Q

What are the three basic steps need to be followed in creating an Adversary Sequence Diagram (ASD)?

A

1‐Describing the facility by separating it into adjacent physical areas,
2‐Defining protection layers and path elements between the adjacent areas,
3‐Recording detection and delay values for each path element

361
Q

Why scenario analysis is required to be conducted

A

A scenario analysis is conducted to determine whether the system has vulnerabilities that could be exploited by adversaries using varying tactics, resulting in lower effectiveness of the PPS.

362
Q

What is the key point in developing ASDs

A

A key point in developing ASDs is that one ASD must be created for each asset (target location), unless the assets are co‐located

363
Q

What is the formula to calculate physical protection system effectiveness

A

In this case, physical protection system effectiveness (PE) is calculated by this formula: PE = PI x PN

364
Q

What is the key objective of path analysis

A

The key objective of path analysis is to evaluate the PPS at a facility at a high level and determine how well protected all assets are at all times

365
Q

What is the important aspect of scenario analysis

A

As in path analysis, an important aspect of scenario analysis is consideration of different operating states at the facility or near the asset. There are usually at least two facility states—open and closed.

366
Q

Communications transmitted over copper wire in the telephone network can be intercepted at any point in the circuit. What type of tool can be used for disguising information?

A

A scrambler is a tool for disguising information so that it is unintelligible to those who are eavesdropping.

367
Q

What are the elements in every communication, security professionals should be concerned with ?

A

In every communication, security professionals are concerned with the following:
1‐integrity of the communications medium (availability of the message path),
2‐integrity of the message (complete and errorless transmission of the data),
3‐ timeliness of the transmission (data communication within an appropriate time frame),
4‐message security (accessibility of the communication to authorized persons only)

368
Q

Individual signals in the multiplexing process share a common transmission path but must be separated so they do not interfere with each other. What types of methods can be used?

A

The two methods generally used are
(1) time separation or time division multiplexing (TDM), and
(2) frequency separation or frequency division multiplexing (FDM).

369
Q

What are the characteristics of alarm communication systems that drive the design?

A

Alarm communication systems have several characteristics that drive the design. These characteristics include the quantity of alarm data, high reliability needed for the system, and speed at which data must be delivered

370
Q

What are the factors should be considered while designing work area for console operator?

A

Thus, the work area design must consider these factors:
1‐What the operator needs to see: people, equipment, displays, and controls,
2‐What the operator needs to hear: other operators, communications equipment, and warning indicators,
3‐What the operator needs to reach and manipulate: hand or foot controls and communications equipment.

371
Q

What is the overriding design philosophy for AC&D console? What are the rules a designer should follow while designing a console?

A

The overriding design philosophy is “operator first.” Designers should follow these rules:
1‐The number of actions required to perform a command should be minimized. For a major command, an operator should only have to click the mouse once or depress a single key,
2 Only operations that are valid in the current context should be available,
3‐ The system should guide the operator through complex operations,
4‐ Annunciator systems should not override operations in progress,
5‐Systems should not be annoying and should avoid loud, continuous alarms or bright, flashing displays,
6‐A given command should be performable in several ways. Making commands available,
7‐As menu items, buttons, and keystrokes creates a friendlier system, enabling users to select their preferred methods.

372
Q

What drive alarm reporting speeds

A

Both human‐factor considerations and interactions between the AC&D and assessment systems drive alarm reporting speeds

373
Q

What is the major advantage of private automatic board exchange (PABX)?

A

A wireless private automatic board exchange (PABX) uses a low‐power transmitter to communicate with handheld telephones within a limited range. The major advantage is that two‐way communication can be established with an employee whose duties require roaming throughout the facility

374
Q

How the range of the microwave system can be extended? When microwave can be cost‐effect in electronic protection system?

A

A repeater also can be used to extend the range of the microwave system. Where short distances are involved, microwave can be cost‐effective in electronic protection systems

375
Q

What is multiplexing?

A

Multiplexing is a technique to transmit several messages simultaneously on the same medium. A multiplex installation can be more cost‐ effective than a loop or point‐to‐point installation, as multiple signals are transmitted over longer distances to a control center.

376
Q

How a measure of security can be added in digital cellular systems

A

As in digital cellular systems, the signal can be intercepted using a receiver tuned to the transmission frequency. The use of transmission compression technology, such as TDMA, adds a measure of security to the system.

377
Q

While designing the alarm display console (the operator’s console), what are the concerns that needs to be addressed?

A

The alarm display equipment (the operator’s console) receives information from alarm sensors. Several concerns must be addressed in console design:
1‐what information is shown to the operator,
2‐ how it is presented,
3‐how the operator communicates with the system,
4‐how to arrange the equipment at the operator’s workstation.

378
Q

What are the methods of line security may be taken to ensure where the value of the assets being protected or the information being transmitted is high?

A

Where the value of the assets being protected or the information being transmitted is high, other methods of line security may be required, such as these:
1‐minimizing the permissible variance in circuit value,
2‐using quasi‐random pulses, which must be recognized by the control equipment,
3‐using shifts in the transmission frequency.

379
Q

What is difference between frequency modulator scramblers and phase modulator scramblers

A

Frequency modulator scramblers cause the voice spectrum to be inverted and continuously changed in frequency in accordance with a predetermined pattern. Phase modulators operate in a similar manner, but it is the phase rather than the frequency of the voice wave that is changed. These devices are similar to a rolling band splitter but usually have a higher level of security since the pattern can be changed more frequently

380
Q

What is masking

A

Masking is a technique for modifying the amplitude of the voice by adding another signal into the voice band. This masking signal is removed at the receiving unit to restore the original voice. The mask may be a single tone, a combination of switched tones, or RF noise. This is a very effective technique for destroying some syllabic content of the voice. Used alone, its security is not very good because a clear voice can be read through the mask fairly easily. Used in conjunction with a band splitter or frequency or phase modulator, masking provides a high degree of security.

381
Q

What is the goal of the AC&D subsystem

A

The subsystem’s goal is to support the rapid evaluation of alarms

382
Q

The control and display subsystem should be designed to serve what

A

The control and display subsystem should be designed to serve the human operator.

383
Q

How it is possible to create an environment suitable for console operator to work effectively and reduces frustration and fatigue

A

Ensuring normal temperature, humidity, noise, and general comfort factors creates an environment suitable for operator effectiveness and reduces frustration and fatigue

384
Q

What is band splitter

A

Band splitters are extensions of the frequency inverter, in which the single speech band is broken up into a number of smaller frequency bands. These bands are inverted and interchanged prior to transmission . A five‐band band splitter theoretically may scramble the frequency bands in exactly 3,080 different ways, of which 90 percent provide no better security than a frequency inverter. A trained listener can obtain a surprising amount of information by listening to the scrambled transmission

385
Q

What can be used to distinguish classes of alarms

A

Different pitches and volumes can be used to distinguish classes of alarms, such as security, safety, or maintenance

386
Q

Where displays should be installed in the console

A

Displays are usually installed in the center of the console, with readily identifiable controls placed on, below, or around the displays

387
Q

How it is possible to improve the display of security alarm information

A

Well‐designed graphical user interfaces (GUIS) can improve the display of security alarm information, and poorly designed GUIs can quickly overwhelm an operator

388
Q

What is the difference between time division multiplexing and frequency division multiplexing?

A

With TDM, each sensor or data source is assigned a time segment and each may transmit only during its assigned segment. In FDM, signals from a number of sensors on a common transmission line occupy different portions of the frequency spectrum. Even though transmitted simultaneously, their different frequencies keep them individually identifiable at the receiver

389
Q

BSK-W Solutions

A

Provide support to CPP through overall systematic mentoring with help of Question Bank And Flashcards & important notes

390
Q

Based on what a facility should decide in advance which type of response will be used?

A

Depending on the needs and objectives of a facility, it is prudent to decide in advance which type of response will be used at the site under various conditions.

391
Q

What is fundamental to the performance of the response function?

A

Staffing of the response force is fundamental to the performance of the response function

392
Q

What is an important part of a facility’s ability to successfully resolve an incident?

A

Contingency planning is an important part of a facility’s ability to successfully resolve an incident

393
Q

What is a critical part of the design and analysis process of a PPS

A

A critical part of the design and analysis process of a PPS is the identification of assets

394
Q

What is a key factor in the interaction between facility personnel and other agencies?

A

Communication will be a key factor in the interaction between facility personnel and other agencies

395
Q

Depending on what factors the response force of a particular facility decide either prevents

A

Depending on the threat, consequence of loss of the asset, and the particular facility, the response force must either prevent adversaries from accomplishing their objective or work to recover the asset

396
Q

What helps a facility manager identify potential targets, respond to different threats, interact with outside agencies, and determine what level of force guards can use in various situations?

A

Prior planning helps a facility manager identify potential targets, respond to different threats, interact with outside agencies, and determine what level of force guards can use in various situations.

397
Q

When it can be considered that a denial strategy expected to be successful?

A

It should be apparent that for a denial strategy to be successful, the response force must be present at the location and time of the sabotage or attack

398
Q

When containment strategy can be used?

A

Containment is the strategy used against an adversary with theft as the goal.

399
Q

What may reveal weaknesses in the security protection at a facility and provide an opportunity to improve asset protection?

A

Abnormal conditions may reveal weaknesses in the security protection at a facility and provide an opportunity to improve asset protection

400
Q

What is the key to effective guard regardless of which type of guard force?

A

Regardless of which type of guard force is used at a facility, the key to effective guard use is training

401
Q

When a denial strategy may be used

A

A denial strategy is used when the adversary goal is sabotage or violent attack

402
Q

On what elements interruption depends

A

Interruption depends on reliable, accurate, fast alarm reporting and assessment, along with reliable communication and effective deployment to the proper location.

403
Q

Based on the adversary goal and the consequence of loss of the asset, different response force strategies will be used. Name the types of strategies are used?

A

Based on the adversary goal and the consequence of loss of the asset, different response force strategies will be used. These strategies include containment, denial, and occasionally assault

404
Q

What is major part of contingency planning?

A

Well‐documented procedures should be developed in advance as a major part of contingency planning.

405
Q

What are the primary uses of video surveillance systems

A

Detection, recording, and assessment

405
Q

Which of the following is NOT one of the systems design processes

A

Delivery and maintenance

406
Q

Which of the following drawing types are chart-like representations of complete subsystems, such as CCTV or access control?

A

Riser

407
Q

In general, how much more light do color cameras require than black and white cameras?

A

Twice as much

408
Q

The quality of assets protection is a direct function of _________ and ____________.

A

Local training and supervision

409
Q

An entry control subsystem is part of the…

A

Detection system

410
Q

Of the three main characteristics of intrusion sensor performance, which of the following is NOT one?

A

False Alarm Rate (FAR)

411
Q

Interior application sensors are divided into three categories. Which of the following is NOT one of these categories?

A

Perimeter sensing

412
Q

When selecting a video system, use a ________ approach instead of a components approach

A

System

413
Q

What are the two classes of locks

A

Mechanical and electromechanical

414
Q

Which of the following is NOT one of the biggest causes of vulnerabilities in a Physical Protection System (PPS)?

A

Improper repair

415
Q

An effective PPS combines the following into an integrated system

A

People, technology, and procedures

416
Q

CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through what three methods?

A

Natural, mechanical, and organizational means

417
Q

What are the three main components of an analog video system?

A

Camera, transmission cable, and monitor

418
Q

Which camera can see in perfect darkness with no light source?

A

Thermal imaging

419
Q

Which type of system test is conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions?

A

Reliability or availability tests

420
Q

What is the most important measure of an Alarm Communication and Display (AC&D) system?

A

How well it quickly and clearly communicates alarm data from sensors to the system operator

421
Q

A security officer post is any location or combination of activities for which a trained human being is necessary. Which of the following is NOT one of the three key concepts of this approach?

A

Necessary equipment

422
Q

The efficiency of the security force depends on…

A

The adequacy and skill of its supervisors

423
Q

Which camera can see in perfect darkness but requires a light source outside the visible spectrum?

A

IR

424
Q

What are the three main components of a digital video system?

A

Camera, digital transmission medium, and PC/software

425
Q

Safes less than what weight are considered “portable?

A

750 lbs

426
Q

The process of assessing security-related risks from internal and external threats to an entity, its assets, and its personnel is called a

A

Risk Assessment

427
Q

A weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss event”, is a definition of which of the following?

A

Vulnerability

428
Q

This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this?

A

Passive Infrared

429
Q

There is a serious threat to security and fear of attack in a college, what security measures would be necessary to address that situation

A

Design and redesign space to encourage activity and witness potentials by legitimate users

430
Q

In an account department, what would be the best practice to ensure proper accounting practices

A

Adopt a two persons rule/separation of duties

431
Q

Which sensor is designed to detect a change in capacitive coupling among a set of wires attached to an object

A

Capacitance

432
Q

A colour rendition index of 70 to 80 is considered what

A

Good

433
Q

When you decide to keep a critical asset of the company at a remote location, what is this called

A

Risk Spreading

434
Q

What is the technique of transmitting several messages simultaneously on the same medium called

A

Multiplexing

435
Q

Disguising information so that it is unintelligible to protect proprietary information is called

A

Scrambling

436
Q

When preparing an initial budget, what percentage of the final bid price is generally allowed as a margin of error

A

15-20 percent

437
Q

What requires a sufficient amplitude change and duration to cause an alarm in a microwave

A

Doppler principle

438
Q

The reliability of this locks accounts for its popularity, which lock is being referred

A

Pin tumbler locks

439
Q

Gathering information on the layout of the facility, the location of key assets, facility operations and production capability and location types of PPS components by the VA team is referred to as what

A

Facility characterization

440
Q

A logical method of problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions is a definition of

A

System approach

441
Q

What is the recommended spacing distance between pillars in a chain link fencing

A

10 feet

442
Q

Access delay barriers may take which forms

A

 Passive barriers
 Security officers
 Dispensable barriers

443
Q

How many trials combinations can a four digits PIN allow

A

10000

444
Q

For resolution that is clearer and can see larger range of colours and high sensitivity what would be best recommended for observation or assessment

A

Digital cameras

445
Q

What is a major difference between emergency lights and other forms of lights

A

It has alternative power source

446
Q

Which type of lighting would best serve for video surveillance if colour rendition is a major consideration

A

Metal halide

447
Q

The verification that a PPS component is able to do what it is expected to and is suitable for the use it is selected is called

A

Validate

448
Q

An alarm that terminates at police or the headquarters is called

A

Auxiliary alarm

449
Q

Which type of structural barriers is best in providing an extended penetration delay even after an explosive attack

A

Thick reinforced concrete

450
Q

Testing a PPS component to verify whether the device is on and performing as expected is called

A

Functional testing

451
Q

Which are the HID family of lamps

A

 Metal halide
 Mercury vapour
 High pressure sodium

452
Q

A line transmission technique in which the installation is connected directly to a control by a pair of wires is referred to as what

A

Point-to-point

453
Q

A wire alarm system designed to check the circuit automatically and immediately signal a fault on the circuit is known as

A

Line Supervision

454
Q

The designer always considers expansion capacity of the design from the very beginning, what is typically the range added in percentage

A

10-15 percent

455
Q

A good design always strikes a balance between what

A

Quality components and cost

456
Q

Two of the main cost drivers for security design are the design fees and what else

A

Projected system construction cost

457
Q

When events are independent of each other, the probability of their, simultaneous occurrence is the product of their separate probabilities, is known as what

A

Redundant security scheme

458
Q

For security professionals, CPTED is a set of management tools targeting what

A

 Places
 Behaviour
 Design and use of space

459
Q

The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as

A

Image and milieu

460
Q

The quantity of light emitted by a lamp is measured in what

A

Lumen

461
Q

To show the displays from several cameras on one or more monitors, what does a system generally require

A

Switcher

462
Q

The principal security strategies identified by most security designers as the important functional requirements of a security design are

A

 Prevention
 Detection
 Control

463
Q

The biggest mistake made when conducting a vulnerability assessment is

A

Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level

464
Q

CPTED solution follow which methods

A

 Natural access control
 Natural surveillance
 Natural territorial reinforcement

465
Q

After analysing facility data and vulnerabilities and the VA report is written, what is the next response

A

Baseline risk is determined

466
Q

If a light burns for 15,000hrs, how much lumen per watts is its efficacy

A

150 watts

467
Q

The general purpose of undertaking a vulnerability assessment is

A

To establish a baseline of the PPS effectiveness in meeting goals and objectives

468
Q

Any delay before detection serves primarily as what

A

Deterrence

469
Q

The amount of protection required by any asset within an organization is a function of which of the following

A

The value of the asset and the risk tolerance of the enterprise

470
Q

Response force personnel if deployed in a fixed and well protected position are considered what element of the PPS

A

Delay

471
Q

What is the sole purposes of using locks in security applications

A

 Eliminate the need of posting guards to every access point
 Serves as a method of controlling physical access
 As a delay mechanism

472
Q

What are major determinants of a security system solutions

A

 Capacity
 Size
 Space requirements

473
Q

What is used to detect any attack or defeat on communication lines

A

Line supervision

474
Q

What is associated with immediate image capture with a sensor alarm to determine the response

A

Assessment system

475
Q

Rings or layers in an assets safe guide in relation to protection-in-depth is referred to as

A

Redundant security scheme

476
Q

List what are HID family of light

A

 Metal halide
 High pressure sodium
 Mercury vapour

477
Q

At what point should future expansion be considered in the design of the PPS

A

At the site selection

478
Q

A rational and orderly approach as well as a comprehensive solution to problem identification and probability determination is

A

Risk assessment

479
Q

The percentage of light reflected from a surface is referred to as

A

Reflectance

480
Q

The principle strategy considered as the most important functional requirements of a security design are

A

 Prevention
 Detection
 Control

481
Q

What is referred to as time period a switcher automatically switches from camera to camera

A

Dwell-time

482
Q

What is referred to as the dividing of video images into grid selections

A

Masking

483
Q

The most common type of sensors generally installed on doors and windows is

A

Simple switch

484
Q

The concentration of light over a particular area is called

A

Illuminance

485
Q

Which are an integral parts of a mechanical lock

A

 Bolt or latch
 Tumbler array
 Key

486
Q

Which locks greatest weakness is its vulnerability to spring manipulation due to corrosion, weathering and age

A

Warded

487
Q

If an area required to be illuminated by a light level of 55FC (foot candle) what is the equivalent in lux

A

550 lux

488
Q

Verification decision for personnel entry control is usually based on the determination of what concepts

A

 What you have
 What you know
 What you are

489
Q

Which is the most widely used encoded card used in commercial credit card system

A

Magnetic stripe

490
Q

What is the main advantage of the smart card is

A

Has large memory and high degree of resistance to compromise

491
Q

Which of the following is an easy going entry control card technology

A

Proximity card

492
Q

The first phase of the implementation PPS is planning and

A

Assessment

493
Q

From an eavesdropper perspective which of the following are popular means to obtain information from a phone line

A

Inductive/direct coupling

494
Q

What are the types of metal detectors

A

Passive/active

495
Q

A good design always strikes a balance between which two factors

A

Quality components and overall cost

496
Q

Systems in PPS designs will be evaluated on which parameters

A

 Quality
 Reliability
 Cost

497
Q

What determines how security is designed, defined and implemented in an organization

A

Organizational culture

498
Q

The first task of the first phase in the design and implementation of the PPS includes what

A

 Identification of critical assets
 Potential threats
 Functional requirements

499
Q

A significant factor in the design and implementation of security system and programs is

A

Corporate culture

500
Q

Along with specification which of the following is the cornerstone of any construction project

A

Drawings

501
Q

What in security system shows a top-down, map-like view of an area where security devices and system

A

Plan

502
Q

Considering the operation of the PPS which of the following drives the system design

A

 Security programs need to have minimum negative impact on productivity
 Security programs as a source of convenience to employees

503
Q

An organization is constantly experiencing break-ins, with most of it targeted at night, which sensor type would be the best recommendation to address this issues

A

Vibration

504
Q

A safe used to store records what would be a major interior constituents

A

 Scientifically insulated
 Moisture incorporation
 Reinforced steel

505
Q

A type of alarm transmission installation which involves devices being installed on a pair of wires throughout an area on facility, and then connected to a control centre is

A

Loop

506
Q

The measure of effectiveness of entry control is

A

 Thorough put
 False acceptance rate
 False rejection rate

507
Q

The final size of the viewing area as measured in width and height is referred to as

A

Field of view

508
Q

Resolution of a digital camera is measured in terms of what

A

Common intermediate format

509
Q

Which sensor causes an alarm when an intruder is made to go either towards or away from the field of view

A

Microwave

510
Q

A detailed in-depth examination of all revealing security defences and defensive activity, measured against current and projected risk is

A

Security survey

511
Q

Which are the primary function of the PPS

A

 Detection
 Delay
 Response

512
Q

What is VSAT

A

Vulnerability self assessment tool

513
Q

List lights that have instant re-strike

A

Incandescent
Halogen
Fluorescent

514
Q

Sensors are generally categorized into which classes

A

 Perimeter,
 Space,
 Object

515
Q

What views shows vertical surfaces and mounting heights and locations of security devices in a security design document

A

Elevation drawings

516
Q

A type of procurement method recommended where the security owner has the capability to perform the security needs analysis and has a good prior knowledge of systems and prices is

A

Invitation for bids

517
Q

A type of procurement where the security manager knows the requirements and specification the system to meet but does not have any knowledge of the equipment or how it will be met is

A

Request for proposal

518
Q

What is the required height of an impact drop test for a safe

A

30 ft

519
Q

Which concept is generally applied when applying CPTED measures

A

 Natural access control
 Natural surveillance
 Natural territoriality

520
Q

An alarm caused due to an equipment failure is

A

False alarm

521
Q

The human perception of the amount of light that reaches the eye is referred to as what

A

Brightness

522
Q

As a general rule what are the lighting levels for detection, recognition and identification listed in sequence

A

0.5FC, 1.0FC, 2.0FC

523
Q

Which lamps requires time to reach full output especially in cold weather

A

Fluorescence

524
Q

Which are the advantages of smart card over proximity card

A

 Large memory
 High degree resistance to forgery
 Low degree of compromise

525
Q

For security and safety reasons what should be the recommended distance between a door and window

A

40 inch

526
Q

A before the incident preparation for an after-the-incident continuation of business refers to what

A

Risk management

527
Q

A method of identifying the weak points of a facility is

A

Vulnerability analysis

528
Q

The most common interior motion sensor is

A

PIR

529
Q

What is the most common type of sensor generally installed on doors and windows

A

Simple switch

530
Q

What testing repeats a given test enough times to establish a measure of device capability against different threats

A

Performance testing

531
Q

What is the major goal of vulnerability assessment

A

Identify PPS components in the functional area of detection, delay and response

532
Q

The use of multiple lines of detection is referred to as

A

Protection-in-depth

533
Q

The second most important decision in the application of CCTV in an asset protection program is

A

Choice of lens

534
Q

If a camera is mounted on the site of a building 40ft from the ground and the centre of the scene to be watched is 30ft from the building. What would be the distance from the camera to the scene

A

50 ft

535
Q

The output of the first phase of the design and evaluation process of the PPS is

A

Threat spectrum

536
Q

The first phase of the design and evaluation process is

A

Determining system goals and objectives

537
Q

When the failure of a primary structural element results in the failure of adjoining structural element, this is

A

Progressive collapse

538
Q

What describes the action of the response force from the time it receives a communication until it is in position to interrupt the adversary

A

Deployment

539
Q

An analysis approach which evaluates how each element of the PPS operates and its contribution to the overall system effectiveness is referred to

A

Performance based analysis

540
Q

The key distinction between safety and security is

A

Their cause

541
Q

In risk analysis, reducing consequences given the event is called

A

Mitigation

542
Q

After assessment of vulnerability, and the implementation of countermeasures what is next

A

Evaluation/Review of effectiveness

543
Q

An uncertain situation in which a number of possible outcome might occur, one or more of which is undesirable describes what

A

Risk

544
Q

What type of analysis would be most appropriate for a petro-chemical industrial location

A

Quantitative

545
Q

The statement ‘‘volumetric sensor shall detect an individual moving at a rate of 1 foot per second’’ or faster within a total field of view of the sensor ‘‘is an example of what

A

Performance based criteria

546
Q

What type of sensors is recommended for deployment in an environment with explosive vapour materials

A

Passive

547
Q

When installing a glass break sensor what is a major consideration

A

Installed directly opposite the protected glass

548
Q

A technique that allows the target to pass through the sensor’s normal detection zone without generating an alarm is

A

Spoofing

549
Q

When two sensors are logically combined, the probability of detection of the combined detectors is what

A

Is less than the probability of detection of the individual detector

550
Q

In designing a CCTV application, for an asset protection program, security manager should keep what in mind

A

CCTV is a visual tool of security and should be applied accordingly
The application should dictate the equipment
No matter what, the equipment of the system will become obsolete
If a system is obsolete but still performing it is because the original application was correctly designed

551
Q

What is the correct sequence of choosing cameras

A

Sensitivity, resolution and features

552
Q

The three theoretical identification views of a CCTV system are

A

Subject identification
Action identification
Scene identification

553
Q

When a master key is lost, what is the recommended key replacement approach

A

Replace from outer perimeter first

554
Q

What is the most common reason for using mechanical locks and key

A

Eliminate the need for posting guards to every access
Used for restricting access to corporate and institutional facilities/ assets
As a delay mechanism

555
Q

Fire resistance document safes are designated in what way

A

350-1
350-4
350-2

556
Q

An alarm that goes to the fire and police station is

A

Auxiliary alarm

557
Q

List what are external security lighting

A

Search light
Frensel
Street light
Flood light

558
Q

What light is good for video surveillance

A

Incandescent

559
Q

Which sensor is used to protect filling cabinets and safes

A

Capacitance

560
Q

Which surfaces have the highest reflectance

A

Snow

561
Q

When bid prices have been considered for a project, which drawing in particular does contractors use for device count

A

Riser drawings

562
Q

Which alarm operates from residential location with guards in charge

A

Proprietary alarm

563
Q

What sensor operates with the adversary body temperature

A

PIR

564
Q

Marquis-de-Laplace’s formula of probability can be referred to as what

A

Redundant scheme

565
Q

The process of combining technology elements, procedures and personnel into a single system for providing security at a facility is

A

System integration

566
Q

What is the most used sensor for intrusion protection

A

Vibration sensors
Electromechanical sensors

567
Q

Which alarm is a result of equipment failure

A

False alarm

568
Q

Which sensor provides early warning for a forced entry

A

Vibration

569
Q

What advantage does stored image badge have over manual photo I.D system

A

Difficult to tamper with stored image as it’s comparable to badge exchange

570
Q

In lock, the concept of what you have, what you know, and what you are is in relation to what

A

Personal entry control

571
Q

What is the distance of the outer perimeter fence to the structure inside, if the building itself forms part of the perimeter

A

2 inch

572
Q

What is the distance of the outer perimeter fence to the structure inside, if the building itself is not part of the perimeter

A

50 feet/600 inch

573
Q

What type of light is a metal halide

A

HID light

574
Q

What sensor will cause an alarm on an intruder who absorbs some of electrical energy upon touching the protected object

A

Capacitance

575
Q

For the purpose of bomb blast on a perimeter, what type of wall is best suited to resist the blast

A

Thick reinforced concrete

576
Q

Which sensor will detect an intruder in the area immediately adjacent to an object being protected in an interior area

A

Proximity

577
Q

Access delay barriers are passive barriers security officers and what else

A

Dispensable barriers

578
Q

What is the most integral instrument in conducting a site survey

A

Checklist

579
Q

The parts of the overall risk management process are

A

Threat
Asset value
Vulnerability

580
Q

Which sensor can be applied by a security manager to handle frequent reports of stolen haulage items in a distant location

A

Radio frequency wireless sensor system/IDS

581
Q

What is the quantity of light emitted by a household bulb rated 100wats

A

1700 Lumen

582
Q

What sensor determines if there is a change in temperature by human presence in a place

A

PIR

583
Q

A sensor that achieves absolute alarm confirmation by combining two technologies is

A

Dual technology

584
Q

Which sensor will be inappropriate in a building in which walls are made of gypsum plastic plywood

A

Microwave

585
Q

When events are independent of each other the probability is the product of their simultaneous occurrence is the product of their separate probabilities is whose principle

A

Marquis de-Laplace

586
Q

On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility is which type of alarm transmission

A

Central alarm

587
Q

Which magnetic stripe medium that is mostly used in security credential application

A

2,500-4000 Oersted

588
Q

UL standard requires that safes of what weight be anchored on the structure

A

750 Ibs

589
Q

How long does a fire resistant safe keeps its rated value

A

20 to 30 yrs depending on climate

590
Q

What does a record typically incorporate in its insulation to help dissipate a fire’s heat in the interior

A

Moisture

591
Q

What is the lifeblood of every organization

A

Records

592
Q

Which types of safes rating are recommended for magnetic media protection

A

150-1

593
Q

The principal U.S standard for fire-resistant vaults is

A

NFPA

594
Q

In the U.S standard for safes for the storage of government classified information is defined by who

A

GSA

595
Q

The key to an effective guard use is

A

Training

596
Q

The strategy used against an adversary with theft as the final goal is

A

Containment

597
Q

A critical part of the design and analysis process of the PPS is

A

Identification of assets

598
Q

What strategy is recommended when an adversary goal is sabotage or violent attack

A

Denial

599
Q

The primary functions of the PPS are

A

Detection
Delay
Response

600
Q

Which type of analysis would be more appropriate for, retail stores, apartment buildings and small businesses

A

Qualitative

601
Q

What type of analysis approach depends on conformance to specific policies and regulation for which the metrics is the presence of specified equipments and procedures

A

Compliance based

602
Q

What is a multi-step process to subjectively evaluate an asset as a target for attack by adversary, form an adversary’s perspective

A

CARVER

603
Q

A fully integrated security program blends which elements into a responsive system

A

Architectural
Technological
Operational

604
Q

Which are particularly important factors in the design of an integrated security system to pin point the best solution

A

Anticipated threats/Vulnerability
Needs of the facility
Constraints

605
Q

A protective system is evaluated on the performance and cost effectiveness of individual measures in doing what

A

Countering threats
Reducing vulnerabilities
Decreasing risk exposure

606
Q

A combination of equipment’s, personnel and procedures coordinated and designed to ensure optimum achievement of the system stated objectives is referred to as

A

System

607
Q

The last task of the planning and assessment process is

A

Design concept

608
Q

What constitutes the ground rules and guidelines for the PPS design

A

Design criteria

609
Q

Visual evidence of a comprehensive security program will induce some perpetrators to look for other facilities where access would be less risky principle is also referred to as:

A

Deter access

610
Q

To be effective, the design and implementation of an assets protection program incorporates an orderly method of problem solving that should ensure a sound security program is developed. This is called the:

A

Systems approach

611
Q

Physical security barriers are typically arranged in concentric layer, with the level of security growing progressively higher as one approaches the centre. This principle is also referred to as:

A

Redundant security scheme

612
Q

In the discussion on basic concepts of risk management, what does the term dynamic risk mean?

A

Any situation that carries the potential for both benefit and cost or loss

613
Q

When discussing safes, the underwriters laboratories Inc. symbol ‘‘TRTL’’ indicates:

A

Safe is resistant to both torches and tools

614
Q

The mechanical lock longest in use and has practically no security value is

A

The warded lock

615
Q

This SMNA designation for a record safe would indicate paper would be protected for 4-hours if inside this safe in a fire

A

350 Degrees -4 hours

616
Q

Security tools used by the crime prevention manager are the 5‘‘D’s’’ of crime prevention
A six 6-foot (1.8 meter) chain-link fence with a method of alarming and verifying the alarm with CCTV when someone penetrates the barrier is an example of:

A

Deter and detect

617
Q

There are only three reasons for having cameras in security applications, they are:

A

To obtain visual information about something that is happening
To obtain information about something that happened
To deter undesirable activities.

618
Q

Three major components of a CCTV system are:

A

Camera,
Cable,
Monitors

619
Q

The three D’s of CPTED are known as, _____________ definition and delay

A

Designation

620
Q

While establishing a probability rating during a vulnerability analysis, a particular rating is in doubt after all the information is gathered and evaluated. Which of the following measures should be taken?

A

Assign the higher of two possible ratings.

621
Q

In the equation P=f/n, P means

A

Probability

622
Q

This is commonly referred to as a sound wave sensor

A

Ultrasonic detector

623
Q

Three Classifications when practicing CPTED: are Mechanical measures, human and/or organizational measures and:

A

Natural measures

624
Q

Annualized loss expectancy, also known as expected loss, is determined by:

A

Vulnerabilities,
Loss Potentials, and
Threats

625
Q

A top guard is an overhang of barbed wire or barbed tape along the top of the fence facing outward (Sometimes inward) and recommended to be a minimum specification of:

A

Three strands of wire and 45 degree angle

626
Q

In a situation there is air turbulence caused by air condition and there is frequent activity adjacent to the protected area. The walls of the protected area. Are solid concrete. Which combination of motion sensors may be used to reduce or virtually eliminate false alarms?

A

Dual technology

627
Q

When project managing the implementation of a new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment or model, he/she will require which of the following instruments to procure it

A

Request for proposal

628
Q

What is the first and most important output of the planning and assessment phase of any security design process?

A

Basis of design