Physical (Environmental) Security Flashcards
4 types of physical security threats
environmental
man-made
supply system
political
give off a soft yellow light
sodium vapor light
have a long lamp life but take time to provide full light after they are activated
mercury vapor light
cost effective but unsuitable for outdoor
fluorescent light
provide a very bright white light that’s ideal for areas where high visibility is required
quartz light
Define CPTED
Crime prevention through environmental design
3 main strategies for CPTED
natural access control
natural surveillance
territorial reinforcement
Using pavements to define an organization’s territory
territorial reinforcement
using carefully placed entrances and fencing to discourage unauthorized access to company premises
natural access control
using raised entrances to make it easier to observe unauthorized activity
natural surveillance
A key device that can be used to disable a key using one turn of a master key to change a lock.
instakey
A key device that contains a built-in microprocessor, microcomputer, and a key exchange data
intellikey
The primary function of a physical protection system is?
A. determine, direct, and dispatch
B. detection, delay, and response
C. display, develop, initiated, and apprehend
D. evaluate, dispatch, and detain
B. detection, delay, and response
To successfully complete a vulnerability assessment, it is critical that protection systems are well understood through
A. threat definition, target identification and facility characterization
B. threat definition, conflict control, and facility characterization
C. risk assessment, threat identification, and incident review.
D. threat identification, vulnerability appraisal, and access review
A. threat definition, target identification and facility characterization
Laminated glass is recommended for what type of locations?
A. all exterior glass windows
B. interior boundary penetration
C. street level windows, doorways, and other access areas
D. Capacitance proximity, intrusion detection locations and boundary penetration sites
C. street level windows, doorways, and other access areas
The strategy of forming layers of protection around an asset or facility is known as A. secured perimeter B. defense in depth C. reinforced barrier deterrent D. reasonable asset protection
B. defense in depth
What crime reduction technique best creates a physical environment that positively influences human behavior?
A. asset protection and vulnerability assessments
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. crime prevention through environmental design
D. instituting employee screening and workplace violence programs
C. crime prevention through environmental design
The key to a successful physical protection system is the integration of
A. people, procedures, and equipment
B. technology, risk assessment, and human interaction
C. protecting, offsetting, and transferring risk
D. detection, deterrence, and response
A. people, procedures, and equipment
What is the primary objective of controlling entry into a facility or area?
A. provide time management controls for all employees
B. ensure that only authorized persons are allowed to enter
C. keep potential hazards and contraband material out that could be used to commit sabotage.
D. Identification purposes
B. ensure that only authorized persons are allowed to enter
For safety considerations in perimeter areas such as parking lots or garages what is the advised lighting? A. 3fc B. 5fc C. 7fc D. 10fc
B. 5fc
What would be the most appropriate interior sensor used for a building that has windows along the ground floor? A. infrared glass-break sensor B. ultrasonic glass-break sensor C. acoustic/shock glass break sensor D. volumetric sensors
C. acoustic/shock glass break sensor
Which of the following best describe three separate functions of CCTV?
A. surveillance, deterrence, and evidentiary archives
B. intrusion detection, detainment, and response
C. optical scanning, infrared beaming, and lighting
D. monitoring, white balancing, and inspection
A. surveillance, deterrence, and evidentiary archives
Although security technologies are not the answer to all organizational security problems, if applied appropriately what will they provide?
A. the ability to reduce electrical costs
B. they can enhance the security envelope and in the majority of cases will save the organization money
C. government tax incentives for increased physical protection systems
D. increased capital value of property with high tech integrated technologies
B. they can enhance the security envelope and in the majority of cases will save the organization money
A meaningful assessment of a facility or building should be used
A. to determine where all the fire exits are located
B. within the context of the defined threats and the value of the organization’s assets
C. to count the number of employees within the facility
D. to determine the structural strength of the perimeter walls
B. within the context of the defined threats and the value of the organization’s assets
The best example of building a new facility for security is
A. limiting the number of entrances to the site that must be monitored, staffed and protected
B. reducing the cost associated with energy needs in providing the physical protection system
C. giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities.
D. blast reinforcement film on all perimeter windows
A. limiting the number of entrances to the site that must be monitored, staffed and protected
All visitors entering the facility sign in and out on a visitor’s log, this is established for what reasons?
A. for the purpose of detection, accountability and the necessity for response
B. access control and surveillance
C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes
D. for planning assessment and the requirements of proper designation
C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes
What is the best means of protecting the physical devices associated with the alarm systems? A. tamper protection B. target hardening C. security design D. UL 2050
A. tamper protection
When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. The best consist of
A. cable locks, encryption, password protection, and increased awareness
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. operation readiness, physical protection systems, standard operating processes
D. increase awareness, environmental design, and physical security
A. cable locks, encryption, password protection, and increased awareness