Physical Security Flashcards

1
Q

From a physical security perspective, what is the very first factor to be considered in facility construction?

The building site itself.
An architect with knowledge of physical security.
The identity of experienced consultants.
An effective security plan.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection-in-depth is a concept that suggests that an adversary should be required to avoid or defeat a number of protective measures prior to achieving the desired goal. The effects produced on the adversary by a system that provides protection-in-depth will include all but the following:

To require more extensive preparation prior to attacking the system.
To create a system that assures detection and apprehension.
To create additional steps where the adversary may fail or abort the mission.
To increase uncertainty about the system or measures.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crime Prevention Through Environmental Design (CPTED) techniques involve all of the
following strategies except:

Provide positive access controls to a designated space.
Re-designate the use of space to provide natural barriers
Provide clearly marked transitional zones.
Provide clear border definition of controlled space.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The degree of protection desired in any installation is predicated on an analysis of which of the following?

Criticality & Vulnerability.
Vulnerability & Environmental conditions.
Cost & Vulnerability.
Cost & Criticality.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most widely used physical security device is a(n):

Video surveillance system.
Alarm system.
Fence.
Lock-and-key device.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is considered to be the most resistant to a blast explosion?

Thick earthen barricades.
Wire-reinforced glass windows.
Steel-frame building walls.
Thick reinforced concrete walls.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two major components in most mechanical locks?

The coded mechanism & The fastening device.
The deadbolt & The latch.
The bolt & The key.
The cylinder & The tumbler array.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Excluding the top guard, standard barbed wire fencing that is intended to prevent human
trespassing should not be less than:

8 feet high.
6 feet high.
9 feet high.
7 feet high.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Measured horizontally 6 inch above ground level and at least 30 feet outside the exclusion area to the barrier, the perimeter band of lighting must provide a minimum intensity of:

5 foot-candle.
1 foot-candle.
10 foot candle.
0.2 foot-candle.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The UL symbol “TRTL” indicates:

The type of locking devices used.
That the safe is resistant to torches.
That the safe is resistant to tools.
That the safe is resistant to both torches and tools.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most vulnerable operational link in any identification system is:

Poor quality of identification badges.
Educational background of security officers.
Perfunctory performance of duty.
Not enough security officers assigned to control posts.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A system using inaudible sound waves to detect the presence of an intruder or other disturbances is known as a(n):

Ultrasonic motion detection system.
Vibration detection system.
Motion detection system.
Sonic motion detection system.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The type of sensor that is designed to place a current-carrying conductor between an intruder and an area to be protected is known as a(n):

Electromechanical sensor.
Vibration sensor.
Microwave sensor.
Capacitance sensor.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electrostatic field around an object to be protected is known as a(n):

Radio-frequency detection system.
Microwave detection system.
Ultrasonic detection system.
Capacitance detection system.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A personal identification method based on the length of each finger on one hand from base to tip and the width of the hand inside the thumb is called the:

Henry fingerprint system.
Bausch & Lomb method
Hand geometry identification.
Bertillon method.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A major task in assets protection is addressing concerns when considering a communications application and/or data storage. The strategies to mitigate damage to systems include divergent routing, including hot/cold sites.

What is the best description of a hot site?

Hot site storage is a term used when storing perishable goods at low temperatures in any hot environment.
In a hot site, the customer provides the hardware and other facilities for the communication or data storage.
A hot site can be defined as the backup site that stores the data in real-time and is quickly operable in case of an interruption.
A backup facility that has the necessary electrical and physical components of a computer facility but does not have the computer equipment in place.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The practice of having at least two authorized persons (each capable of detecting incorrect or unauthorized procedures with respect to the task being performed) present during any operation that affords access to a sensitive area is referred to as the:

Controlled access rule.
Two-man access procedure.
Two-man rule.
Information security rule

A

C

18
Q

The use of a simple code word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:

Code one.
Security alert.
S.O.S.
Duress code.

A

D

19
Q

What is the very first criterion in evaluating bids for security services?

Complying with the license criterion.
Complying with the submission deadline.
Complying with the price criterion.
Complying with all the required criteria.

A

B

20
Q

An alarm system that is monitored by an outside company to provide electronicprotective services in which they provide the appropriate (response) actions is known as a(n):

Local alarm system.
Central station system.
Proprietary system.
Auxiliary system.

A

B

21
Q

There are three basic goals of a physical security program:

(1) To reduce loss through the control of access.
(2) To limit interruptions in operations.
(3) The third and often most neglected goal is …..

A. to create an environment where vendors, employees, and patrons feel safe.
B. to ensure the security force is adequately staffed.
C. to investigate all reports of theft and fraud.
D. to ensure security staff is trained according to federal and state regulations.

A

A

22
Q

Which of the following is a secondary function of a Physical Protection System (PPS)?

A. Detection.
B. Delay.
C. Deterrence.
D. Response.

A

C

23
Q

What is the definition of design basis threat (DBT)?

A. An estimation of the likelihood of attack.
B. The adversary against which the utility must be protected.
C. Designing a PPS based on historical threat information.
D. Identifying critical assets before implementing security measures.

A

B

24
Q

CPTED is considered a vital component of many security planning projects. There are three basic components to CPTED:

(1) Natural Surveillance.
(2) Boundary Definition or Territorial Reinforcement.
(3) The third is …..

A. Natural Measures.
B. Organizational Measures.
C. Natural Access Control.
D. Witness Potential.

A

C

25
Q

How does situational crime prevention differ from CPTED and defensible space?

A. Situational crime prevention is only applicable in public neighborhoods.
B. Situational crime prevention seeks to reduce crime opportunities in all behavioral context, not only in the built environment.
C. Situational crime prevention is simply the third generation CPTED.
D. There is no difference, one is applied by architects, the other is applied by asset protection professionals.

A

B

26
Q

What is the preferred glass type for mitigating blast forces?

A. Wired glass.
B. Laminated glass.
C. Annealed (Plate) glass.
D. Crystalline glass.

A

B

27
Q

In addition to doors and windows, building openings can be air vents, shafts, drains, etc.
What is the recommended surface before an opening should be secured or protect?

A. 102 square inches.
B. 92 square inches.
C. 96 square inches.
D. 86 square inches.

A

C

28
Q

One element in the construction of a record safe is the incorporation of ….. into the insulation to help dissipate the heat developed during a fire so that the interior temperature will not increase to such an extent that records are destroyed.

A. Foam.
B. Fiberglass.
C. Moisture.
D. EDP.

A

C

29
Q

Which of the following best describes color rendition?

A. The amount of light (lumens) falling on a surface (over any given square foot or square meter).
B. The way to describe the light appearance provided by a light bulb (measured in degrees of Kelvin).
C. The time required between turn-off and immediate turn-on for high-intensity discharge lamps to achieve full brightness and full colors.
D. The ability of a lamp to faithfully reproduce the colors seen in an object.

A

D

30
Q

Based on the risk assessment, security lighting is placed on the perimeter.
In which direction would most likely the illumination from the lighting be directed?

A. In parallel with the perimeter.
B. Outward.
C. Inward.
D. Covering the whole site.

A

A

31
Q

You are the security manager of an industrial organization. Part of your facility is a loading dock area of 12 x 18 meter. The loading dock area is secured with intrusion detection (IDS) and bold & latch mechanical lock(s).

Which type of security camera would be the best to install on each loading dock?

A. Fixed, black & white, and standard camera.
B. Pan-tilt-zoom (PTZ), black & white, and standard camera.
C. Pan-tilt-zoom (PTZ), color, and wide-angle camera.
D. Fixed, color, and wide-angle camera.

A

C

32
Q

Which light sources can be categorized in the high-intensity discharge (HID) family of lamps?

A. Incandescent, Fluorescent, and Induction.
B. Metal halide, Mercury vapor, and High-pressure sodium.
C. LED, Low-pressure sodium, and Halogen.
D. Quartz halogen, Mercury vapor, and Low-pressure sodium.

A

B

33
Q

Proximity sensors can detect an intruder in the area immediately adjacent to an object in an interior area or when the intruder touches the object such as a safe or file cabinet.
Which type of sensor is typically connected to these kind of objects to be protected?

A. Capacitance sensor.
B. Video motion detector sensor.
C. Electromechanical sensor.
D. Boundary-penetration sensor.

A

A

34
Q

Which lamp would be best suitable for pedestrian entrances?

A. Fluorescent.
B. Mercury vapor.
C. Halogen.
D. High-pressure sodium.

A

C

35
Q

Securing your alarm communications is essential for the reliability of your alarm communication & display (AC&D) system. One of the elements of communications security is line supervision. What is the simplest type of line supervision?

A. Installing frequency inverters to detect variations in frequency on the line that is monitored.
B. Using a scrambler to detect disturbances or loss of signal.
C. Periodic human interface testing.
D. An end-of-line resistor installed to introduce a constant, measurable electric current.

A

D

36
Q

________ are presentations of complete subsystems, such as CCTV or access control, that schematically demonstrate all associated devices, components, and their interconnecting cables.

A. Riser diagrams.
B. Network Diagram (Gantt Chart).
C. Work breakdown structure.
D. Punch list.

A

A

37
Q

When in the procurement stage, an invitation for bid(IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them.

This listing is also known as design …

A. … estimation.
B. … specification.
C. … planning.
D. … evaluation.

A

B

38
Q

Which three zones are most commonly distinguished for PA (public address system) purposes in high rise buildings?

A. Covered parking areas, maintenance areas, and rented areas.
B. Public access areas, secured zones areas, and rented areas.
C. Parking areas, hospitality areas, and rented areas.
D. Public access areas, maintenance areas, and rented areas.

A

D

39
Q

You are the security director of a commercial organization.
What is one of the advantages of using contract staff (employed by a security services firm) in comparison to using proprietary or in-house staff (employed directly by the organization) for security in your organization?

A. More direct control over security personnel.
B. Greater flexibility in staffing levels (up- or downsizing).
C. Lower turnover due to a higher sense of employee loyalty to the organization.
D. Guaranteed risk mitigation through the outsourcing structure.

A

B

40
Q

What are the most common forms of security system procurement?

A. Quotation, request for information (RFI), and invitation for bid (IFB).
B. Sole source procurement, request for proposal (RFP), and eTendering.
C. Sole source procurement, request for proposal (RFP), and invitation for bid (IFB).
D. Security as a service (SaaS), request for proposal (RFP), and invitation for bid (IFB).

A

C