Physical Security Flashcards
From a physical security perspective, what is the very first factor to be considered in facility construction?
The building site itself.
An architect with knowledge of physical security.
The identity of experienced consultants.
An effective security plan.
A
Protection-in-depth is a concept that suggests that an adversary should be required to avoid or defeat a number of protective measures prior to achieving the desired goal. The effects produced on the adversary by a system that provides protection-in-depth will include all but the following:
To require more extensive preparation prior to attacking the system.
To create a system that assures detection and apprehension.
To create additional steps where the adversary may fail or abort the mission.
To increase uncertainty about the system or measures.
B
Crime Prevention Through Environmental Design (CPTED) techniques involve all of the
following strategies except:
Provide positive access controls to a designated space.
Re-designate the use of space to provide natural barriers
Provide clearly marked transitional zones.
Provide clear border definition of controlled space.
A
The degree of protection desired in any installation is predicated on an analysis of which of the following?
Criticality & Vulnerability.
Vulnerability & Environmental conditions.
Cost & Vulnerability.
Cost & Criticality.
A
The most widely used physical security device is a(n):
Video surveillance system.
Alarm system.
Fence.
Lock-and-key device.
D
Which of the following is considered to be the most resistant to a blast explosion?
Thick earthen barricades.
Wire-reinforced glass windows.
Steel-frame building walls.
Thick reinforced concrete walls.
D
What are the two major components in most mechanical locks?
The coded mechanism & The fastening device.
The deadbolt & The latch.
The bolt & The key.
The cylinder & The tumbler array.
A
Excluding the top guard, standard barbed wire fencing that is intended to prevent human
trespassing should not be less than:
8 feet high.
6 feet high.
9 feet high.
7 feet high.
D
Measured horizontally 6 inch above ground level and at least 30 feet outside the exclusion area to the barrier, the perimeter band of lighting must provide a minimum intensity of:
5 foot-candle.
1 foot-candle.
10 foot candle.
0.2 foot-candle.
D
The UL symbol “TRTL” indicates:
The type of locking devices used.
That the safe is resistant to torches.
That the safe is resistant to tools.
That the safe is resistant to both torches and tools.
D
The most vulnerable operational link in any identification system is:
Poor quality of identification badges.
Educational background of security officers.
Perfunctory performance of duty.
Not enough security officers assigned to control posts.
C
A system using inaudible sound waves to detect the presence of an intruder or other disturbances is known as a(n):
Ultrasonic motion detection system.
Vibration detection system.
Motion detection system.
Sonic motion detection system.
A
The type of sensor that is designed to place a current-carrying conductor between an intruder and an area to be protected is known as a(n):
Electromechanical sensor.
Vibration sensor.
Microwave sensor.
Capacitance sensor.
A
The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electrostatic field around an object to be protected is known as a(n):
Radio-frequency detection system.
Microwave detection system.
Ultrasonic detection system.
Capacitance detection system.
D
A personal identification method based on the length of each finger on one hand from base to tip and the width of the hand inside the thumb is called the:
Henry fingerprint system.
Bausch & Lomb method
Hand geometry identification.
Bertillon method.
C
A major task in assets protection is addressing concerns when considering a communications application and/or data storage. The strategies to mitigate damage to systems include divergent routing, including hot/cold sites.
What is the best description of a hot site?
Hot site storage is a term used when storing perishable goods at low temperatures in any hot environment.
In a hot site, the customer provides the hardware and other facilities for the communication or data storage.
A hot site can be defined as the backup site that stores the data in real-time and is quickly operable in case of an interruption.
A backup facility that has the necessary electrical and physical components of a computer facility but does not have the computer equipment in place.
C