Physical (Environmental) Security Flashcards

1
Q

4 types of physical security threats

A

environmental
man-made
supply system
political

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

give off a soft yellow light

A

sodium vapor light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

have a long lamp life but take time to provide full light after they are activated

A

mercury vapor light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cost effective but unsuitable for outdoor

A

fluorescent light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provide a very bright white light that’s ideal for areas where high visibility is required

A

quartz light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define CPTED

A

Crime prevention through environmental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 main strategies for CPTED

A

natural access control
natural surveillance
territorial reinforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using pavements to define an organization’s territory

A

territorial reinforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using carefully placed entrances and fencing to discourage unauthorized access to company premises

A

natural access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

using raised entrances to make it easier to observe unauthorized activity

A

natural surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A key device that can be used to disable a key using one turn of a master key to change a lock.

A

instakey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A key device that contains a built-in microprocessor, microcomputer, and a key exchange data

A

intellikey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The primary function of a physical protection system is?
A. determine, direct, and dispatch
B. detection, delay, and response
C. display, develop, initiated, and apprehend
D. evaluate, dispatch, and detain

A

B. detection, delay, and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To successfully complete a vulnerability assessment, it is critical that protection systems are well understood through
A. threat definition, target identification and facility characterization
B. threat definition, conflict control, and facility characterization
C. risk assessment, threat identification, and incident review.
D. threat identification, vulnerability appraisal, and access review

A

A. threat definition, target identification and facility characterization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Laminated glass is recommended for what type of locations?
A. all exterior glass windows
B. interior boundary penetration
C. street level windows, doorways, and other access areas
D. Capacitance proximity, intrusion detection locations and boundary penetration sites

A

C. street level windows, doorways, and other access areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The strategy of forming layers of protection around an asset or facility is known as 
A. secured perimeter
B. defense in depth
C. reinforced barrier deterrent
D. reasonable asset protection
A

B. defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What crime reduction technique best creates a physical environment that positively influences human behavior?
A. asset protection and vulnerability assessments
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. crime prevention through environmental design
D. instituting employee screening and workplace violence programs

A

C. crime prevention through environmental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The key to a successful physical protection system is the integration of
A. people, procedures, and equipment
B. technology, risk assessment, and human interaction
C. protecting, offsetting, and transferring risk
D. detection, deterrence, and response

A

A. people, procedures, and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary objective of controlling entry into a facility or area?
A. provide time management controls for all employees
B. ensure that only authorized persons are allowed to enter
C. keep potential hazards and contraband material out that could be used to commit sabotage.
D. Identification purposes

A

B. ensure that only authorized persons are allowed to enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
For safety considerations in perimeter areas such as parking lots or garages what is the advised lighting?
A. 3fc
B. 5fc
C. 7fc
D. 10fc
A

B. 5fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
What would be the most appropriate interior sensor used for a building that has windows along the ground floor?
A. infrared glass-break sensor
B. ultrasonic glass-break sensor
C. acoustic/shock glass break sensor
D. volumetric sensors
A

C. acoustic/shock glass break sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following best describe three separate functions of CCTV?
A. surveillance, deterrence, and evidentiary archives
B. intrusion detection, detainment, and response
C. optical scanning, infrared beaming, and lighting
D. monitoring, white balancing, and inspection

A

A. surveillance, deterrence, and evidentiary archives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Although security technologies are not the answer to all organizational security problems, if applied appropriately what will they provide?
A. the ability to reduce electrical costs
B. they can enhance the security envelope and in the majority of cases will save the organization money
C. government tax incentives for increased physical protection systems
D. increased capital value of property with high tech integrated technologies

A

B. they can enhance the security envelope and in the majority of cases will save the organization money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A meaningful assessment of a facility or building should be used
A. to determine where all the fire exits are located
B. within the context of the defined threats and the value of the organization’s assets
C. to count the number of employees within the facility
D. to determine the structural strength of the perimeter walls

A

B. within the context of the defined threats and the value of the organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The best example of building a new facility for security is
A. limiting the number of entrances to the site that must be monitored, staffed and protected
B. reducing the cost associated with energy needs in providing the physical protection system
C. giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities.
D. blast reinforcement film on all perimeter windows

A

A. limiting the number of entrances to the site that must be monitored, staffed and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

All visitors entering the facility sign in and out on a visitor’s log, this is established for what reasons?
A. for the purpose of detection, accountability and the necessity for response
B. access control and surveillance
C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes
D. for planning assessment and the requirements of proper designation

A

C. time frame of the visit, who was visited, and in the case of an emergency, have accountability of everyone for safety purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
What is the best means of protecting the physical devices associated with the alarm systems?
A. tamper protection
B. target hardening
C. security design
D. UL 2050
A

A. tamper protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. The best consist of
A. cable locks, encryption, password protection, and increased awareness
B. reducing vulnerability by protecting, offsetting or transferring the risk
C. operation readiness, physical protection systems, standard operating processes
D. increase awareness, environmental design, and physical security

A

A. cable locks, encryption, password protection, and increased awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are
A. biometric
B. technological
C. physiometric
D. physical analysis
A

A. biometric

30
Q
Physical security is applied by using \_\_\_\_ of physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property
A. layers
B. methods
C. varieties
D. types
A

A. layers

31
Q
What is a comprehensive overview of a facility to include physical security controls, policy, procedures and employee safety?
A. availability assessment
B. security survey
C. budgetary and financial performance
D. defense in depth
A

B. security survey

32
Q
Which security control is most effective in curtailing and preventing piggybacking or tailgating as a means of unauthorized access?
A. cameras
B. turnstiles
C. keys
D. identification badges
A

B. turnstiles

33
Q

Robert has been given the responsibility of installing doors that provide different types of protection. He has been told to install doors that provide failsafe, fail-secure, and fail-soft protection. Which of the following is true about secure door types?
A. Fail soft defaults to the sensitivity of the area
B. Fail safe defaults to locked
C. Fail secure defaults to unlocked
D. Fail secure defaults to double locked.

A

A. Fail soft defaults to the sensitivity of the area

34
Q

Does a fail-safe door default to locked or unlocked?

A

Unlocked

35
Q

What does a fail-soft door default to?

A

Locked or unlocked depending on the sensitivity of the area

36
Q

What does a fail secure door default to?

A

Locked

37
Q
Windows can have different glazing materials.  What type of window may be prohibited by fire codes because of it's combustibility?
A. Tempered
B. Polycarbonate acrylic
C.  Glass-clad polycarbonate
D. Laminated
A

B. Polycarbonate acrylic

38
Q

As with logical access controls, audit logs should be produced and monitored for physical access controls. Which of the following statements is correct about auditing physical access?
A. Unsuccessful access attempts should be logged but only need to be reviewed by a security guard.
B. Only successful access attempts should be logged and reviewed.
C. Only unsuccessful access attempts during unauthorized hours should be logged and reviewed.
D. All unsuccessful access attempts should be logged and reviewed.

A

D. All unsuccessful access attempts should be logged and reviewed.

39
Q

Brad is installing windows on the storefront of a bank in an area known to be at risk of fires in the dry season. Which of the following is least likely to be true of the windows he is installing?
A. The glass has embedded wires
B. They are made of glass-clad polycarbonate
C. The window material is acrylic glass
D. A solar window film has been added to them.

A

C. The window material is acrylic glass

40
Q

CCTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV?
A. A fixed focal length lens allows you to move between various fields of view with a single lens.
B. To cover a large area and not focus on specific items use a large lens opening.
C. An auto-iris lens should be used in an area with fixed lighting
D. A shallow depth of focus allows you to focus on focus on smaller details

A

D. A shallow depth of focus allows you to focus on focus on smaller details

41
Q

Which of the following describes the type of construction materials most commonly used to build a bank’s exterior walls?
A. Dense woods fastened with metal bolts and plates
B. Steel rods encased inside of concrete walls and support beams.
C. Untreated lumber
D. Steel

A

D. A shallow depth of focus allows you to focus on focus on smaller details

42
Q
Which of the following is a light sensitive chip used in most of today's CCTV cameras?
A. Digital Light Processing
B. Cathode ray tube
C. Annunicator
D. Charged coupled devices
A

D. Charged coupled devices

43
Q

John is installing a sprinkler system that makes use of a thermal fusible link for a data center located in Canada. Which of the following statements is true of the system he’s installing?
A. The pipes of a dry pipe system are filled with water when pressurized air within the pipes is reduced.
B. The pipes of a preaction system are filled with water when pressurized air within the pipes is reduced.
C. The sprinkler heads of a deluge system are wide open to allow a larger volume of water to be released in a shorter period
D. The pipes in a wet pipe system always contain water

A

B. The pipes of a preaction system are filled with water when pressurized air within the pipes is reduced.

44
Q
Which of the following allows security personnel to change the field of view of a CCTV lens to different angles and distances?
A. Depth of field
B. Manual Iris
C. Zoom
D. Illuminiation
A

C. Zoom

45
Q
An outline for a physical security design should include program categories and the necessary countermeasures for each?  What category do locks and access controls belong to?
A.  Assessment
B. Deterrence
C. Response
D. Delay
A

D. Delay

46
Q

A number of factors need to be considered when buying and implementing a CCTV system. Which of the following is the primary factor in determining whether a lens should have a manual iris or auto iris?
A. If the camera must be able to move in response to commands.
B. If the environment has fixed lighting
C. If the objects to be viewed are wide angle, such as a parking lot, or narrow, such as a door.
D. The amount of light present in the environment.

A

B. If the environment has fixed lighting

47
Q

IDSs can detect intruders by employing eletromechanical systems or volumetric systems. Which of the following correctly describes these systems?
A. Because they detect changes in subtle environmental characteristics, electromechanical systems are more sensitive than volumetric.
B. Electromechanical systems are less sensitive than volumetric systems, which detect subtle changes in environmental characteristics.
C. Electromechanical systems deal with the environmental changes such as ultrasonic frequencies while volumetric systems can employ pressure mats or metallic foil in windows.
D. Electromagnetic systems are more sensitive because they detect a change or break in a circuit, while volumetric systems detec environmental changes.

A

B. Electromechanical systems are less sensitive than volumetric systems, which detect subtle changes in environmental characteristics.

48
Q

How do electromechanical sensors work?

A

Detect a change or break in a circuit

49
Q

How do volumetric sensors work?

A

Detect changes in vibration, microwaves,

50
Q

What discipline combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime?
A. Layered defense model
B. Target hardening
C. Crime prevention through environmental design
D. Natural access control

A

C. Crime prevention through environmental design

51
Q
There are several types of volumetric IDSs.  What type of IDS emits a measurable magnetic field that it monitors for disruptions?
A. Capacitance detector
B. Passive infrared
C. Wave pattern motion
D. Photoelectric
A

A. Capacitance detector

52
Q
Paisley is helping her company identify potential site locations for a new facility.  Which of the following is not an important factor when choosing a location?
A. Distance to police and fire stations
B. Lighting
C. Natural disaster occurrence
D. Crime rate
A

B. Lighting

53
Q
Sarah recently learned that the painting she inherited from a relative and hung in her downtown coffee shop is worth a lot of money.  She is worried about its protection and wants to install and IDS.  Which of the following intrusion detection systems is the most appropriate for protecting the painting?
A. Acoustical
B. Proximity
C. Photoelectric
D. Vibration
A

B. Proximity

54
Q

David is preparing a server room at a new branch office. What locking mechanisms should he use for the primary and secondary server room entry doors?
A. The primary and secondary entrance doors should have a swipe card or cipher lock.
B. The primary entrance door should have access controlled through a security guard. The secondary doors should be secured from the inside and allow no entry.
C. The primary entrance door should have access controlled through a swipe card or cipher lock. The secondary doors should have a security guard.
D. The primary entrance door should have access controlled through a swipe card or cipher lock. Secondary doors should be secured from the inside and allow no entry.

A

D. The primary entrance door should have access controlled through a swipe card or cipher lock. Secondary doors should be secured from the inside and allow no entry.

55
Q

Which of the following is not true of IDSs?
A. They can be hindered by items within the room.
B. They are expensive and require human intervention to respond to alarms.
C. They usually come with redundant power supply and emergency backup power.
D. They should detect, and be resistant to tampering

A

C. They usually come with redundant power supply and emergency backup power.

56
Q

Before an effective physical security program can be rolled out, a number of steps must be taken. Which of the following steps comes first in the process of rolling out a security program?
A. Create countermeasure performance metrics
B. Conduct a risk analysis
C. Design the program
D. Implement countermeasures

A

B. Conduct a risk analysis

57
Q
A number of measures should be taken to help protect devices and the environment from electric power issues.  Which of the following is best to keep voltage steady and power clean?
A. Power line monitor
B. Surge protector
C. Shielded cabling
D. Regulator
A

D. Regulator

58
Q
What type of fence detects if someone attempts to climb or cut it?
A. Class IV
B PIDAS
C. CPTED
D. PCCIP
A

B PIDAS - Perimeter Intrusion Detection and Assessment System

59
Q

What is a class D fire?

A

Combustible metals

60
Q

How do you extinguish a Class D fire

A

Dry chemicals

61
Q

What is a class C fire?

A

Something electrical

62
Q

How do you extinguish a class C fire?

A

A gas like Halon/CO2

63
Q

What is a class B fire?

A

Something liquid

64
Q

How do you extinguish a class B fire?

A

A gas like FM200 or CO2

65
Q

What is a class A fire?

A

common combustible

66
Q

How do you extinguish a class A fire?

A

water or soda acid

67
Q

Why smart grids concern security professionals?

A

They are vulnerable to digital attack

68
Q

What type of control is a fence, sign?

A

deterrent

69
Q

What type of control is a reinforced wall, lock?

A

delaying

70
Q

What type of control is an IDS?

A

detection

71
Q

What type of control is a security guard?

A

assessment