Physical (Environmental) Security Flashcards
4 types of physical security threats
environmental
man-made
supply system
political
give off a soft yellow light
sodium vapor light
have a long lamp life but take time to provide full light after they are activated
mercury vapor light
cost effective but unsuitable for outdoor
fluorescent light
provide a very bright white light that’s ideal for areas where high visibility is required
quartz light
Define CPTED
Crime prevention through environmental design
3 main strategies for CPTED
natural access control
natural surveillance
territorial reinforcement
Using pavements to define an organization’s territory
territorial reinforcement
using carefully placed entrances and fencing to discourage unauthorized access to company premises
natural access control
using raised entrances to make it easier to observe unauthorized activity
natural surveillance
A key device that can be used to disable a key using one turn of a master key to change a lock.
instakey
A key device that contains a built-in microprocessor, microcomputer, and a key exchange data
intellikey
The primary function of a physical protection system is?
A. determine, direct, and dispatch
B. detection, delay, and response
C. display, develop, initiated, and apprehend
D. evaluate, dispatch, and detain
B. detection, delay, and response
To successfully complete a vulnerability assessment, it is critical that protection systems are well understood through
A. threat definition, target identification and facility characterization
B. threat definition, conflict control, and facility characterization
C. risk assessment, threat identification, and incident review.
D. threat identification, vulnerability appraisal, and access review
A. threat definition, target identification and facility characterization
Laminated glass is recommended for what type of locations?
A. all exterior glass windows
B. interior boundary penetration
C. street level windows, doorways, and other access areas
D. Capacitance proximity, intrusion detection locations and boundary penetration sites
C. street level windows, doorways, and other access areas
The strategy of forming layers of protection around an asset or facility is known as A. secured perimeter B. defense in depth C. reinforced barrier deterrent D. reasonable asset protection
B. defense in depth
What crime reduction technique best creates a physical environment that positively influences human behavior?
A. asset protection and vulnerability assessments
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. crime prevention through environmental design
D. instituting employee screening and workplace violence programs
C. crime prevention through environmental design
The key to a successful physical protection system is the integration of
A. people, procedures, and equipment
B. technology, risk assessment, and human interaction
C. protecting, offsetting, and transferring risk
D. detection, deterrence, and response
A. people, procedures, and equipment
What is the primary objective of controlling entry into a facility or area?
A. provide time management controls for all employees
B. ensure that only authorized persons are allowed to enter
C. keep potential hazards and contraband material out that could be used to commit sabotage.
D. Identification purposes
B. ensure that only authorized persons are allowed to enter
For safety considerations in perimeter areas such as parking lots or garages what is the advised lighting? A. 3fc B. 5fc C. 7fc D. 10fc
B. 5fc
What would be the most appropriate interior sensor used for a building that has windows along the ground floor? A. infrared glass-break sensor B. ultrasonic glass-break sensor C. acoustic/shock glass break sensor D. volumetric sensors
C. acoustic/shock glass break sensor
Which of the following best describe three separate functions of CCTV?
A. surveillance, deterrence, and evidentiary archives
B. intrusion detection, detainment, and response
C. optical scanning, infrared beaming, and lighting
D. monitoring, white balancing, and inspection
A. surveillance, deterrence, and evidentiary archives
Although security technologies are not the answer to all organizational security problems, if applied appropriately what will they provide?
A. the ability to reduce electrical costs
B. they can enhance the security envelope and in the majority of cases will save the organization money
C. government tax incentives for increased physical protection systems
D. increased capital value of property with high tech integrated technologies
B. they can enhance the security envelope and in the majority of cases will save the organization money
A meaningful assessment of a facility or building should be used
A. to determine where all the fire exits are located
B. within the context of the defined threats and the value of the organization’s assets
C. to count the number of employees within the facility
D. to determine the structural strength of the perimeter walls
B. within the context of the defined threats and the value of the organization’s assets
The best example of building a new facility for security is
A. limiting the number of entrances to the site that must be monitored, staffed and protected
B. reducing the cost associated with energy needs in providing the physical protection system
C. giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities.
D. blast reinforcement film on all perimeter windows
A. limiting the number of entrances to the site that must be monitored, staffed and protected
All visitors entering the facility sign in and out on a visitor’s log, this is established for what reasons?
A. for the purpose of detection, accountability and the necessity for response
B. access control and surveillance
C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes
D. for planning assessment and the requirements of proper designation
C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes
What is the best means of protecting the physical devices associated with the alarm systems? A. tamper protection B. target hardening C. security design D. UL 2050
A. tamper protection
When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. The best consist of
A. cable locks, encryption, password protection, and increased awareness
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. operation readiness, physical protection systems, standard operating processes
D. increase awareness, environmental design, and physical security
A. cable locks, encryption, password protection, and increased awareness
Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are A. biometric B. technological C. physiometric D. physical analysis
A. biometric
Physical security is applied by using \_\_\_\_ of physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property A. layers B. methods C. varieties D. types
A. layers
What is a comprehensive overview of a facility to include physical security controls, policy, procedures and employee safety? A. availability assessment B. security survey C. budgetary and financial performance D. defense in depth
B. security survey
Which security control is most effective in curtailing and preventing piggybacking or tailgating as a means of unauthorized access? A. cameras B. turnstiles C. keys D. identification badges
B. turnstiles
Robert has been given the responsibility of installing doors that provide different types of protection. He has been told to install doors that provide failsafe, fail-secure, and fail-soft protection. Which of the following is true about secure door types?
A. Fail soft defaults to the sensitivity of the area
B. Fail safe defaults to locked
C. Fail secure defaults to unlocked
D. Fail secure defaults to double locked.
A. Fail soft defaults to the sensitivity of the area
Does a fail-safe door default to locked or unlocked?
Unlocked
What does a fail-soft door default to?
Locked or unlocked depending on the sensitivity of the area
What does a fail secure door default to?
Locked
Windows can have different glazing materials. What type of window may be prohibited by fire codes because of it's combustibility? A. Tempered B. Polycarbonate acrylic C. Glass-clad polycarbonate D. Laminated
B. Polycarbonate acrylic
As with logical access controls, audit logs should be produced and monitored for physical access controls. Which of the following statements is correct about auditing physical access?
A. Unsuccessful access attempts should be logged but only need to be reviewed by a security guard.
B. Only successful access attempts should be logged and reviewed.
C. Only unsuccessful access attempts during unauthorized hours should be logged and reviewed.
D. All unsuccessful access attempts should be logged and reviewed.
D. All unsuccessful access attempts should be logged and reviewed.
Brad is installing windows on the storefront of a bank in an area known to be at risk of fires in the dry season. Which of the following is least likely to be true of the windows he is installing?
A. The glass has embedded wires
B. They are made of glass-clad polycarbonate
C. The window material is acrylic glass
D. A solar window film has been added to them.
C. The window material is acrylic glass
CCTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV?
A. A fixed focal length lens allows you to move between various fields of view with a single lens.
B. To cover a large area and not focus on specific items use a large lens opening.
C. An auto-iris lens should be used in an area with fixed lighting
D. A shallow depth of focus allows you to focus on focus on smaller details
D. A shallow depth of focus allows you to focus on focus on smaller details
Which of the following describes the type of construction materials most commonly used to build a bank’s exterior walls?
A. Dense woods fastened with metal bolts and plates
B. Steel rods encased inside of concrete walls and support beams.
C. Untreated lumber
D. Steel
D. A shallow depth of focus allows you to focus on focus on smaller details
Which of the following is a light sensitive chip used in most of today's CCTV cameras? A. Digital Light Processing B. Cathode ray tube C. Annunicator D. Charged coupled devices
D. Charged coupled devices
John is installing a sprinkler system that makes use of a thermal fusible link for a data center located in Canada. Which of the following statements is true of the system he’s installing?
A. The pipes of a dry pipe system are filled with water when pressurized air within the pipes is reduced.
B. The pipes of a preaction system are filled with water when pressurized air within the pipes is reduced.
C. The sprinkler heads of a deluge system are wide open to allow a larger volume of water to be released in a shorter period
D. The pipes in a wet pipe system always contain water
B. The pipes of a preaction system are filled with water when pressurized air within the pipes is reduced.
Which of the following allows security personnel to change the field of view of a CCTV lens to different angles and distances? A. Depth of field B. Manual Iris C. Zoom D. Illuminiation
C. Zoom
An outline for a physical security design should include program categories and the necessary countermeasures for each? What category do locks and access controls belong to? A. Assessment B. Deterrence C. Response D. Delay
D. Delay
A number of factors need to be considered when buying and implementing a CCTV system. Which of the following is the primary factor in determining whether a lens should have a manual iris or auto iris?
A. If the camera must be able to move in response to commands.
B. If the environment has fixed lighting
C. If the objects to be viewed are wide angle, such as a parking lot, or narrow, such as a door.
D. The amount of light present in the environment.
B. If the environment has fixed lighting
IDSs can detect intruders by employing eletromechanical systems or volumetric systems. Which of the following correctly describes these systems?
A. Because they detect changes in subtle environmental characteristics, electromechanical systems are more sensitive than volumetric.
B. Electromechanical systems are less sensitive than volumetric systems, which detect subtle changes in environmental characteristics.
C. Electromechanical systems deal with the environmental changes such as ultrasonic frequencies while volumetric systems can employ pressure mats or metallic foil in windows.
D. Electromagnetic systems are more sensitive because they detect a change or break in a circuit, while volumetric systems detec environmental changes.
B. Electromechanical systems are less sensitive than volumetric systems, which detect subtle changes in environmental characteristics.
How do electromechanical sensors work?
Detect a change or break in a circuit
How do volumetric sensors work?
Detect changes in vibration, microwaves,
What discipline combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime?
A. Layered defense model
B. Target hardening
C. Crime prevention through environmental design
D. Natural access control
C. Crime prevention through environmental design
There are several types of volumetric IDSs. What type of IDS emits a measurable magnetic field that it monitors for disruptions? A. Capacitance detector B. Passive infrared C. Wave pattern motion D. Photoelectric
A. Capacitance detector
Paisley is helping her company identify potential site locations for a new facility. Which of the following is not an important factor when choosing a location? A. Distance to police and fire stations B. Lighting C. Natural disaster occurrence D. Crime rate
B. Lighting
Sarah recently learned that the painting she inherited from a relative and hung in her downtown coffee shop is worth a lot of money. She is worried about its protection and wants to install and IDS. Which of the following intrusion detection systems is the most appropriate for protecting the painting? A. Acoustical B. Proximity C. Photoelectric D. Vibration
B. Proximity
David is preparing a server room at a new branch office. What locking mechanisms should he use for the primary and secondary server room entry doors?
A. The primary and secondary entrance doors should have a swipe card or cipher lock.
B. The primary entrance door should have access controlled through a security guard. The secondary doors should be secured from the inside and allow no entry.
C. The primary entrance door should have access controlled through a swipe card or cipher lock. The secondary doors should have a security guard.
D. The primary entrance door should have access controlled through a swipe card or cipher lock. Secondary doors should be secured from the inside and allow no entry.
D. The primary entrance door should have access controlled through a swipe card or cipher lock. Secondary doors should be secured from the inside and allow no entry.
Which of the following is not true of IDSs?
A. They can be hindered by items within the room.
B. They are expensive and require human intervention to respond to alarms.
C. They usually come with redundant power supply and emergency backup power.
D. They should detect, and be resistant to tampering
C. They usually come with redundant power supply and emergency backup power.
Before an effective physical security program can be rolled out, a number of steps must be taken. Which of the following steps comes first in the process of rolling out a security program?
A. Create countermeasure performance metrics
B. Conduct a risk analysis
C. Design the program
D. Implement countermeasures
B. Conduct a risk analysis
A number of measures should be taken to help protect devices and the environment from electric power issues. Which of the following is best to keep voltage steady and power clean? A. Power line monitor B. Surge protector C. Shielded cabling D. Regulator
D. Regulator
What type of fence detects if someone attempts to climb or cut it? A. Class IV B PIDAS C. CPTED D. PCCIP
B PIDAS - Perimeter Intrusion Detection and Assessment System
What is a class D fire?
Combustible metals
How do you extinguish a Class D fire
Dry chemicals
What is a class C fire?
Something electrical
How do you extinguish a class C fire?
A gas like Halon/CO2
What is a class B fire?
Something liquid
How do you extinguish a class B fire?
A gas like FM200 or CO2
What is a class A fire?
common combustible
How do you extinguish a class A fire?
water or soda acid
Why smart grids concern security professionals?
They are vulnerable to digital attack
What type of control is a fence, sign?
deterrent
What type of control is a reinforced wall, lock?
delaying
What type of control is an IDS?
detection
What type of control is a security guard?
assessment