PSP Domain 2 Application, Design, and Integration of Physical Security Systems Flashcards

1
Q

What are the two foundational design principles?

A

The Four Ds and Layered security (aka Defense in Depth).

Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 76

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point where the delay time remaining exceeds the response force time is know as what?

A

Critical detection point.

Sources: PSP, 5.1, page 74 POA, Physical Security, 5.1, page 78

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term for the type of security where there is significant perimeter protection and entry is tightly controlled at a single portal?

A

Area security.

Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for the type of security where the outer perimeter is loosely controlled and the primary security focus is at an individual building or restricted area within?

A

Point security.

Sources: PSP, 5.1.1, page 75 POA, Physical Security, 5.1.1, page 79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some conflicts that might arise in the design process for physical security measures?

A

Surveillance systems, sensors, door systems, and other physical security measures may conflict with one another: Safety and security objectives may not be the same; Security goals may not align with an organization’s mission or culture.
Sources: PSP, 5.1.2, page 75 POA, Physical Security, 5.1.2, page 79

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What concept is used in the security design process to describe all aspects of a security system complementing and working with each other?

A

Balanced protection.

Sources: PSP, 5.1.3, page 76 POA, Physical Security, 5.1.3, page 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a key factor in the nature of the physical security design and strategy employed to meet protection objectives?

A

The type or use of the facility or asset being protected.

Sources: PSP, 5.1.4, page 77 POA, Physical Security, 5.1.4, page 81

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of design criteria?

A
Performance criteria (elements chosen for their contribution to performance),Feature criteria (elements chosen because certain features are required).
Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of design process selects elements and procedures according to the contribution they make to overall system performance?

A

Performance criteria.

Sources: PSP, 5.1.4, page 78 POA, Physical Security, 5.1.4, page 83

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of design process selects elements or procedures to satisfy requirements that certain items be present?

A

Feature criteria.

Sources: PSP, 5.1.4, page 78 POA, Physical Security, page 83

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five different aspects that need to be taken into account when developing security system procedures?

A

People,Operations,Maintenance, Training & awareness, Incident based & exploratory investigations.
Sources: PSP, 5.1.4, page 79 POA, Physical Security, 5.1.4, page 84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the nine basic factors to know from the onset in security design?

A

Governing codes and regulations,Protection requirements,Company standards and guidelines, Type of construction, Site layout, Material selection, Utilities, Life safety, Infrastructure.
Sources: PSP, 7.1, page 99 POA, Physical Security, 7.1, page 105

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What equation is used for calculating risk when developing a design?

A

Risk = Vulnerability x Threat x Asset Value

Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

According to the U.S. Federal Emergency Management Agency (FEMA) model, what are the two basic classifications of threats or hazards?

A

Natural and human-caused.

Sources: PSP, 7.3, page 100 POA, Physical Security, 7.3, page 106

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the design basis threat (DBT)?

A

A profile of the type, composition, capabilities, and methods (tactics, techniques, and procedures), as well as the goals, intent, and motivation of an adversary, upon which the security engineering and operations of a facility are based.
Source: POA, Physical Security, 7.3, page 106

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirements document?

A

A requirements document identifies the primary reasons for implementing new measures or upgrading an old system. It is closely tied to the risk assessment by identifying the specific security measures to mitigate threats and reduce vulnerabilities.

Source: IPPS , Chapter 4, page 63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The collection, review and analysis of data relative to the facility where the system will be implemented is an integral part of which process?

A

Planning process.

Source: IPPS, Chapter 4, page 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two important criteria in developing the objectives for implementing or upgrading the physical protection system (PPS)?

A

The objective must be clearly stated and it must be SMART.

Source: IPPS, Chapter 4, page 66

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does SMART stand for?

A

Specific, Measurable, Aggressive but achievable, Realistic, Time-bounded (Source: IPPS)

Specific, Measurable, Attainable, Repeatable, Time-dependent (Source: PSP)

Other variations on these initials maintain the essential idea: that objectives be clear, focused, and appropriate to the task.

Source: IPPS, Chapter 4, page 66, and PSP, 4.1.2, page 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some influencing characteristic factors to consider in physical security design?

A

Assests under protection,Buiding or facility type,Surroundings, Location, Additional concerns, such as senior management support.
Sources: PPS, Chapter 6, pages 89-95 POA, Physical Security, Chapter 6, pages 95-101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

According to CPTED security layering, where is the first layer of security?

A

The first layer should be at the perimeter of the property.

Source: PAP Standard, A.3.3, page 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

According to CPTED security layering, where is the second layer of security?

A

The second layer should be at the building exterior.

Source: PAP Standard, A.3.3, page 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to CPTED security layering, which layers are inside the building?

A

The third, fourth, and fifth layers.The third layer should segregate authorized and unauthorized visitors.The fourth layer should segregate generally accessible client areas from staff-only areas. The fifth layer should further restrict staff access to highly sensitive areas.
Source: PAP Standard, A.3.3, page 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is crime prevention through environmental design (CPTED)?

A

An approach to reducing crime or security incidents through the strategic design of the built environment, typically employing organizational, mechanical, and natural methods to control access, enhance natural surveillance and territoriality, and support legitimate activity.
Source: PAP Standard, 3.14, page 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the three classifications to CPTED strategies?

A

Mechanical measures, Organizational measures,Natural or architectural measures.
Source: PAP Standard, A.3.1, page 31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is natural surveillance?

A

A CPTED strategy to increase visibility, both interior-to-exterior and exterior-to-interior, to increase witness potential, foster a sense of exposure to the criminal element, and give advance visibility to areas people are entering.
Source: PAP Standard, A.3.2, page 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the ‘broken windows’ theory?

A

This theory suggests that an abandoned building or car can remain unmolested indefinately, but once the first window is broken, the building or car is quickly vandalized.
Source: POA, Physical Security, 10.1, page 213

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is compartmentalization?

A

A CPTED strategy to design multiple or concentric layers of security measures so that highly protected assets are behind multiple barriers. This is also known as protection-in-depth.
Source: PAP Standard, A.3.3, page 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the four levels of integration?

A

Integrated electronic security systems,Integrated physical security elements,Integrated security programs, Integration in enterprise risk management.
Sources: PSP, Chapter 8 Introduction, page 120 POA, Physical Security, Chapter 8 Introduction, page 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A successful security design integrates what three primary elements?

A

Architectural aspects, Security systems, Operational factors.
Source: POA, Physical Security, 8.3, page 131

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does PSIM stand for?

A

Physical security information management.

Sources: PSP, 8.4, page 127 POA, Physical Security, 14.7.1, page 520

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What involves planning, organizing and controlling resources on a project?

A

Project management.

Sources: PSP, Chapter 13, page 437 POA, Physical Security, Chapter 13, page 471

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are four constraints on a project?

A

Project scope, Schedule,Budget, Quality.

Source: POA, Physical Security, Chapter 13, page 472

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are typical elements in the project management process for a physical protection system (PPS)?

A

Project concept, Designing the project, Managing the bid process, Managing the implementation process, Acceptance of work, Initializing and managing the warranty process.
Sources: PSP, Chapter 13, pages 441-442 POA, Physical Security, Chapter 13, pages 476-477

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the two first phases of system design principles?

A

Planning and assessment.

Source: POA, Physical Security, 14.1, page 479

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Technical security projects typically progress through which six tasks?

A

Risk analysis, Conceptual (schematic),Design development, Construction documents, Bidding, Construction.
Source: POA, Physical Security, 14.1, page 481

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is stand-off distance?

A

The distance between a critical asset and the nearest point of attack.
Source: PAP Standard, A.4.2, page 36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the five basic tasks of physical protection system (PPS) implementation?

A

Conducting planning and assessment to determine security requirements;Developing conceptual solutions for resolving vulnerabilities;Preparing PPS design and construction documentation; Soliciting bids and conducting pricing and vendor negotiations; Installing, testing, and commissioning the PPS.
Source: POA, Physical Security, Chapter 13, page 475

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the term used to describe the outcome of the overall planning phase through a set of security requirements or objectives that is used as a basis of the eventual design?

A

Design basis.

Sources: PSP, 14.2, page 446 POA, Physical Security, 14.2, page 482

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The ground rules and guidelines for the design are referred to as what?

A

Design criteria.

Sources: PSP, 14.3.1, page 449 POA, Physical Security, 14.3.1, page 485

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the two phases in design and documentation?

A

Design development stage, Construction documents phase

Sources: PSP, 14.3.4, page 455 POA, Physical Security, 14.3.4, page 491

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the three sections of the procurement documents that are also known as contract (or bid) documents?

A

Contractual details, Construction specifications, Construction drawings.
Sources: PSP, 14.3.4, page 455 POA, Physical Security, 14.3.4, page 492

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The construction document (CD) phase includes what five items?

A

CD drawings,Specifications,Bill of quantities, Refined system budgets, Contract terms & Conditions.
Sources: PSP, 14.3.4, page 456 POA, Physical Security, 14.3.4, page 493

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the results of detailed specifications?

A

Final implementation reflects what was intended,All bidders get same complete understanding of requirements.
Sources: PSP, 14.3.5, pages 456-457 POA, Physical Security, 14.3.5, pages 493-494

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does CADD stand for?

A

Computer-aided design drafting.

Sources: PSP, 14.3.6, page 458 POA, Physical Security, 14.3.6, page 495

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The table of related security devices is commonly known as what?

A

Hardware schedules.

Sources: PSP, 14.3.6, page 462 POA, Physical Security, 14.3.7, page 499

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the three types of cost estimates?

A

Budgetary, Preliminary design, Final design.

Sources: PSP, 14.4.3, pages 466-467 POA, Physical Security, 14.4.3, pages 504-506

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the two possibilities for who will design the system?

A

Customer or end user, Contractor or integrator.

Source: IPPS, Chapter 4, pages 66-67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An approximation of the cost of each alternative security solution prepared for budgeting & planning purposes is known as what?

A

Budgetary estimates.

Source: IPPS, Chapter 4, page 67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the three different types of project estimates?

A

Budgetary, Preliminary design, Life cycle cost.

Source: IPPS, Chapter 5, pages 85-86

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the seven procedures to be covered when creating a detailed estmate?

A

Identify PPS subsystem,Identify other installation activities,Develop list of components,Establish component prices,Formulate installation crews & establish productivity,Identify required special equipment & rates,Use spreadsheet format.

Source: IPPS, Chapter 5, pages 88-89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Project scope document should have what 10 sections?

A

Executive summary,Project benefits,Project objectives,Project scope,Estimated project hours,Estimated cost,Estimated duration,Assumptions,Major risks,Objectives.

Source: IPPS, Chapter 3, pages 34-36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the four stages of a project?

A

Project feasibility,Project development,Project execution,Project closeout.

Source: IPPS, Chapter 3, pages 36-37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In which stage of the project should any changes to the project scope, deliverables, or activities be subject to a more systematic change process and submitted to a change review board (CRB)?

A

Stage 3- Project execution.

Source: IPPS, Chapter 3, pages 43-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are the seven deliverables of the planning stage?

A

Risk assessment report,Procurment method,Budgetary estimate,Selection of project manager,Selection of project team,Design criteria,Contracting & Legal requirements.

Source: IPPS, Chapter 4, pages 67-68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are two types of physical barriers?

A

Natural barriers and structural barriers.

Source: PAP Standard, A.6, page 40

57
Q

Examples of this type of barrier include fields, rivers, cliffs, marshes or deserts.

A

Natural barriers.

Source: PAP Standard, A.6, page 40

58
Q

Examples of this type of barrier include berms, ditches, planted trees and shrubs, fences, doors, and glazing materials.

A

Structural barriers.

Source: PAP Standard, A.6, page 40

59
Q

What are the most common means for securing grounds against trespassing?

A

Walls, chain link fences, moats, and other barriers.

Source: PAP Standard, A.4.2, page 36

60
Q

What should be considered when installing chain link fence?

A

Posts, Bracing, Fabric, Fence top treatment, Gates, Turnstiles.
Source: POA, Physical Security, 9.1.5 pages 146-150

61
Q

When should barbed wire be installed atop a fence?

A

If fences are intended to discourage human tresspassing.

Source: POA, Physical Security, 9.1.5, page 153

62
Q

What is the purpose of installing a cement apron under the fence?

A

To prevent individuals or objects from going under the fence.
Source: POA, Physical Security, 9.1.5, page 148

63
Q

What should be considered when implementing physical barriers and site hardening?

A

Target attractiveness,Overall risks to the site,Neighboring perimeters and adjacencies, Effectiveness of multiple options of perimeter and outer and inner security structures, Cost-effectiveness, Response directives and operational procedures.
Source: PAP Standard, A.6.1, page 44

64
Q

Planters can be an effective vehicle barrier under what conditions?

A

When properly anchored to the ground.

Source: PAP Standard, A.6, page 42

65
Q

A sturdy and short cylindrical post intended to divert traffic or absorb vehicular impact are known as what?

A

Bollard.

Source: PAP Standard, A.6, page 42

66
Q

What is the purpose of a turnstile?

A

To control pedestrian traffic and minimize tailgating (piggybacking).
Source: PAP Standard, A.6, page 43

67
Q

What measures can be taken to strengthen doors?

A

Adding steel plates for reinforcement, Anchoring frames, Adding kick plates, Using set screws in hinges, Spot welding hinges.
Source: PAP Standard, A.6, page 15

68
Q

What are five types of window glass?

A

Annealed or plate glass,Tempered glass,Wired glass, Laminated glass, Bullet-resistant or burglar-resistant glass.
Source: PAP Standard, A.6, page 43

69
Q

What are four window-related security materials?

A

Window bars,Window film,Blast curtains, Security shutters.

Source: POA, Physical Security, 9.1.3, page 142

70
Q

At what dimension should openings be fortified?

A

96 square inches (2.4 square meters)

Source: POA, Physical Security, 10.3.2, page 235

71
Q

What are four key factors in hardening a facility?

A

Stand-off distance,Structural integrity of the premises,Prevention of progressive collapse, Redundancy of operating systems.
Source: PAP Standard, A.4.2, page 36

72
Q

What are four typical objectives of an access control system?

A

Permit authorized assets access to controlled areas,Detect, minimize, and prevent the access attempts or exit of unauthorized assets from controlled areas,Provide information to security personnel for the assessment and response to unauthorized entry, Provide a record of who, what, when, where, and how access to controlled areas was granted.
Source: PAP Standard, A.8.1, pages 46-47

73
Q

What are three types of credentials that can be vaildated in an electronic access control system?

A

Identifying a valid key or credential – something an asset has,Validating an identification number or code – something a person knows,Processing the unique characteristic for biometric identification – what is inherent to a person.
Source: PAP Standard, A.8.1, page 47

74
Q

What are the six types of locks?

A

Mechanical, Electrified,Electromagnetic, Credential-operated, Combination, Biometric.
Source: PAP Standard, A.8.3, page 49

75
Q

The time required to defeat a lock should approximate what?

A

The penetration delay time of the rest of the secured barrier.
Source: PAP Standard, A.8.3, page 49

76
Q

What are four methods of contraband detection?

A

Metal detectors, Package search,Explosive detection, Chemical and biological agent detection.
Source: POA, Physical Security, 11.2, pages 283-293

77
Q

What are some advantages of security lighting?

A

Possible deterrence of adversaries and suspicious activities,Improved surveillance by users and security response,Reduced liability from trips and falls and premises security negligence cases, Witness potential of suspicious and criminal acts, Enhanced observation of spaces, Proper lighting fosters a sense of security to the legitimate users of the space.
Source: PAP Standard, A.5, page 37

78
Q

What are six application types of security lighting?

A

Continuous,Glare protection,Standby, Controlled, Portable (movable), Emergency.
Source: PAP Standard, A.5.3, pages 38-39

79
Q

How is light intensity measured?

A

Lux and foot-candles.

Source: PAP Standard, A.5.4, page 39

80
Q

What lamps are the least efficient, the most expensive, and have a short life span?

A

Incandescent.

Source: PAP Standard, A.5.5, page 39

81
Q

What lamps are more efficient than incandescent lamps but are not used extensively outdoors, except for underpasses, tunnels and signs?

A

Fluorescent.

Source: PAP Standard, A.5.5, page 39

82
Q

What lamps provide about 25 percent better efficiency and life than ordinary incandescent bulbs?

A

Halogen and quartz halogen.

Source: PAP Standard, A.5.5, page 40

83
Q

What lamps take several minutes to produce full light output and have a poor color rendition for video surveillance, but have a long life?

A

Mercury vapor.

Source: PAP Standard, A.5.5, page 40

84
Q

What lamps best imitate daylight and work well with video surveillance systems by providing accurate color rendition?

A

Metal halide.

Source: PAP Standard, A.5.5, page 40

85
Q

What lamps are energy efficient and have a long life span, but poor color rendition for video surveillance?

A

High-pressure sodium. Their particular quality of light enables people to see more detail at greater distances in fog, so they are often used on streets or in parking lots.
Source: PAP Standard, A.5.5, page 40

86
Q

What lamps are more efficient than high-pressure sodium, but are expensive to maintain and provide poor color rendition?

A

Low-pressure sodium.

Source: PAP Standard, A.5.5, page 40

87
Q

What lamps provide a cost-effective alternative that lasts longer, without sacrificing illumination?

A

LED (light-emitting diodes).

Source: PAP Standard, A.5.5, page 40

88
Q

What lamps have a long life and are utilized mainly indoors?

A

Induction.

Source: PAP Standard, A.5.5, page 40

89
Q

What are 10 types of devices used to detect intrusions?

A

Position detection devices,Motion detectors,Sound detectors, Vibration sensors, Heat sensors, Temperature sensors, Capacitance devices, Impact sensors, Glass break sensors, Duress/Panic alarms.
Source: PAP Standard, A.7.3, pages 45-46

90
Q

Video surveillance cameras are selected to provide what four things?

A

Scene identification and general observation,Recognition and action identification,Automation through analytics, Personal identification.
Source: PAP Standard, A.9.6, page 52

91
Q

How do thermal cameras work?

A

Using special filters and lenses, they monitor the temperatures of objects in their field of view and use a grayscale to represent temperatures graphically.
Source: PAP Standard, A.9.6.1, page 53

92
Q

A specially constructed room or area intended to limit access and provide protection to the assets in the space is known as what?

A

A vault.

Sources: PSP, 9.2.2, page 164 POA, Physical Security, 9.2.2, page 171

93
Q

A safe weighing less than what is required to be anchored?

A
750 lb (340 kg).
Sources: PSP, 9.2.1, page 160 POA, Physical Security, 9.2.1, page 163
94
Q

What organization has a well-established protocol for testing and rating safes and protective containers?

A
Underwriters Laboratories (UL).
Sources: PSP, 9.2.1, page 160 POA, Physical Security, 9.2.1, page 163
95
Q

Underwriters Laboratories (UL) designates what three classes of records protection equipment?

A

Class 350, specified for paper records and products.Class 150, specified for magnetic media, tapes, discs, and photographic material.Class 125, specified for floppy discs and similar flexible computer media.
Sources: PSP, 9.2.1, page 161 POA, Physical Security, 9.2.1, page 165

96
Q

What differentiates high security locks from other mechanical locks?

A

The keys are cut at precise angles, as well as depths, so that when inserted into the plug the key will both raise the individual tumbler array of driver and pins to a shear line and, at the same time, turn each pin so that the interlocking mechanism is plug to rotate enough to move the bolt.
Sources: PSP, 9.3.1, page 170 POA, Physical Security, 9.3.1, page 178

97
Q

What is the purpose of master keying?

A

Master keying is used to provide a hierarchy of access to groups of locks, from access to only one lock through access to increasingly larger groups of locks, and, finally, to access to all locks in the population.
Sources: PSP, 9.3.1, page 171 POA, Physical Security, 9.3.1, page 180

98
Q

What are the primary attack avenues of mechanical locks?

A

Attack by force, Surreptitious attack, Attack by impression-making and try keys.
Sources: PSP, 9.3.1, page 172 POA, Physical Security, 9.3.1, pages 180-181

99
Q

What are the four major components of lighting systems?

A

Lamp, or light bulb, Luminaire, or fixture, Mounting hardware, Electrical power.
Sources: PSP, 9.4.4, pages 188-189 POA, Physical Security, 9.4.4, pages 201-202

100
Q

What constitutes lighting operating costs?

A
Capital items (8%), maintenance (4%) and energy (88%).
Sources: PSP, 9.4.5, page 189 POA, Physical Security, 9.4.5, page 202
101
Q

What additional lighting considerations must be made for electronic surveillance systems and/or cameras?

A

Color rendering index (CRI) for accurate reproduction and identification of colors,Reflectance of materials,Directionality of the reflected lighting.
Sources: PSP, 9.4.8, page 192 POA, Physical Security, 9.4.8, pages 205-206

102
Q

What discipline addresses the design of facilities and building complexes such that security features are built in from the start rather than as an afterthought?

A

Security architecture and design.

Sources: PSP, Chapter 7 Introduction, page 97 POA, Physical Security, Chapter 7 Introduction, page 103

103
Q

What may be included as perimeter protection?

A

Fence line, Guard personnel, Cameras, Vehicle barriers, Intrusion detection systems, Signs, Natural barriers.
Sources: PSP, 7.5.1, page 102 POA, Physical Security, 7.5.1, pages 108-109

104
Q

What are the three types of security zones?

A

Perimeter,Nonexclusive zone,Exclusive zone.

Sources: PSP, Figure 7-7, page 105 POA, Physical Security, Figure 7-7, page 112

105
Q

Which security zone typically features entry control and vehicle barriers?

A

Perimeter.

Sources: PSP, Figure 7-7, page 105 POA, Physical Security, Figure 7-7, page 112

106
Q

Which security zone typically features controlled entry with less restrictive access and public right-of-way?

A

Nonexclusive zone.

Sources: PSP, Figure 7-7, page 105 POA, Physical Security, Figure 7-7, page 112

107
Q

Which security zone typically features controlled entry with highly restrictive access and access control with proximity cards, keypads, passwords, or facial recognition CCTV?

A

Exclusive zone.

Sources: PSP, Figure 7-7, page 105 POA, Physical Security, Figure 7-7, page 112

108
Q

What spacing is typically used for signage on boundary fences?

A
50 ft (15 m)
Sources: PSP, 9.1.5, page 143 POA, Physical Security, 9.1.5, page 146
109
Q

What are two categories of barriers?

A

Passive (fixed) and active (operable).

Sources: PSP, 9.1.6, page 151 POA, Physical Security, 9.1.6, page 154

110
Q

Where are active barriers most often used?

A

At vehicle access control points within a perimeter barrier system or at the entry to specific buildings within a site to provide a barrier for vehicle screening or inspection.
Sources: PSP, 9.1.6, page 151 POA, Physical Security, 9.1.6, page 154

111
Q

How is a barrier rated?

A

ASTM and the US Department of State both rate barriers according to vehicle weight and speed. ASTM ratings are M30, M40 and M50 while DOD ratings are K4, K8 and K12.
Sources: PSP, 9.1.6, page 155 POA, Physical Security 9.1.6, page 158

112
Q

What barrier rating stops a 15,000 lb (6.8 ton) vehicle traveling at 30 miles per hour?

A

K4 or M30

Sources: PSP, 9.1.6, page 155 POA, Physical Security, 9.1.6, page 158

113
Q

During a fire emergency, how does a fail-safe locking mechanism respond?

A

A fail-safe locking mechanism will unlock under any failure condition, such as loss of power.
Sources: PSP, 11.1.2, page 255 POA, Physical Security, 11.1.2, page 269

114
Q

During a fire emergency, how does a fail-secure locking mechanism respond?

A

This locking mechanism remains locked when power is lost or another failure occurs.
Sources: PSP, 11.1.2, page 255 POA, Physical Security, 11.1.2, page 270

115
Q

What is second generation CPTED?

A

Second generation CPTED refocused attention to encompass not only reducing physical opportunities for crime but also creating a sense of neighborliness to help reduce motives that cause crime in the first place.
Sources: PSP, 10.2.1, page 203 POA, Physical Security, 10.2.1, page 216

116
Q

What are the four main strategies of second generation CPTED?

A

Cohesion,Capacity threshold,Community culture, Connectivity.
Sources: PSP, 10.2.1, pages 203-204 POA, Physical Security, 10.2.1, pages 216-217

117
Q

What are the five most common types of badges?

A

Magnetic stripe,Wiegand wire,Bar codes, Proximity, Smart cards.
Sources: PSP, 11.1.1, page 247 POA, Physical Security, 11.1.1, page 260

118
Q

How does magnetic stripe encoding work?

A

A strip of magenetic material located alone one edge of the badge is encoded with data. The data are then read as the magnetic strip is moved through or inserted into a magnetic reader. This is widely used in credit and debit card systems.
Sources: PSP, 11.1.1, page 247 POA, Physical Security 11.1.1, page 260

119
Q

How are proximity badges classified?

A

By the method of powering the badge, operating frequency range of the badge, and read-only or read/write capability.
Sources: PSP, 11.1.1, page 248 POA, Physical Security, 11.1.1, pages 261-262

120
Q

What are six types of electrified locking mechanisms?

A

Electric deadbolt,Electric latch,Electric strike,Electric lockset,Exit device,Electromagnetic lock.

Source: PSP, 11.1.1, pages 255-256

121
Q

How does a biometric lock function?

A

Biometric locks function by verifying a person’s specific physical characteristic and if that characteristic is verified, the locking device is activated to permit access.
Sources: PSP, 11.1.1, page 261-262 POA, Physical Security, 11.1.2, page 276-277

122
Q

What are the two error types in biometric technologies?

A
False reject (Type I error): the improper rejection of an authorized user,False accept (Type II error): the improper acceptance of an unauthorized person.
Sources: PSP, 11.1.1, page 262 POA, Physical Security, 11.1.2, page 277
123
Q

What are two methods that can be used to detect metal?

A

Continuous-wave detectors and pulsed-field detectors.

Sources: PSP, 11.2.1, page 267 POA, Physical Security, 11.2.1, page 284

124
Q

What are the X-ray approaches for package search?

A

Single energy transmission X-ray,Multiple-energy X-ray,Computed tomography (CT) scan, Backscatter X-ray.
Sources: PSP, 11.2.2, page 268 POA, Physical Security, 11.2.2, page 285

125
Q

Which type of X-ray can be safely used on people?

A

Low-dose backscatter X-ray.

Sources: PSP, 11.2.2, page 270 POA, Physical Security, 11.2.2, page 288

126
Q

What methods are used for trace explosives detection?

A

Ion mobility spectrometry, Colorimetric, Chemiluminescence, Mass spectrometry, Fluorescence, Canine olfaction.
Sources: PSP, 11.2.2, page 272 POA, Physical Security, 11.2.3, page 289

127
Q

What are two ways biological agent detection differs from chemical detection?

A

Most biological agents are not immediately lethal, so response time may not be as critical as for chemical attacks.Biological detection methods usually involve filtering air for several hours then analyzing the filter, while chemical detectors sample air at various perimeter locations and work more quickly.
Sources: PSP, 11.2.4, page 275 POA, Physical Security, 11.2.4, page 293

128
Q

What is a nuisance alarm?

A

Any alarm not caused by an intrusion.

Sources: PSP, 11.3.1, page 277 POA, Physical Security, 11.3.1, page 296

129
Q

What are three main characteristics of intrusion sensor performance?

A

Probability of detection (PD),Nuisance alarm rate,Vulnerability to defeat.
Sources: PSP, 11.3.1, page 276 POA, Physical Security, 11.3.1, page 294

130
Q

The probability of detection depends on what factors?

A

Target to be detected,Sensor hardware design,Installation conditions, Sensitivity adjustment, Weather conditions, Condition of the equipment.
Sources: PSP, 11.3.1, page 277 POA, Physical Security, 11.3.1, page 295

131
Q

What are three general ways to defeat a sensor?

A

Bypass,Adversary path exploitation,Spoof.

Source: POA, Physical Security, 11.3.1, pages 296-297

132
Q

What are classifications of intrusion sensors?

A

Passive or active,Covert or visible,Line-of-sight or terrain-following (exterior only), Volumetric or line detection, Application.
Sources: PSP, 11.3.3, page 284, and 11.3.4, page 300 POA, Physical Security, 11.3.3, page 304, and 11.3.4, page 324

133
Q

What are the main elements of video surveillance?

A

Field of view,Scene,Lens, Camera, Transmission medium, Monitor, Recording equipment, Control equipment.
Sources: PSP, 11.4, page 315 POA, Physical Security, 11.4, pages 344-345

134
Q

What are four uses for video surveillance?

A

To obtain visual information about something that is happening,To obtain visual information about something that has happened,To deter or discourage undesirable activities, To use video analytics tools. Source: POA, Physical Security, 11.4.2, page 347

135
Q

What are the three theoretical identification views of a video surveillance system?

A

Subject identification,Action identification,Scene identification.
Source: POA, Physical Security, 11.4.2, page 348

136
Q

What are the typical parts of a video surveillance system (VSS)?

A

Camera,Transmission medium,Power over Ethernet (PoE) network switch, Recording equipment.
Source: POA, Physical Security, 11.4.4, page 351

137
Q

What are the five main types of camera lenses?

A

Wide-angle,Standard,Telephoto, Zoom, Varifocal.

Sources: PSP, 11.4.7, page 335 POA, Physical Security, 11.4.6, page 365

138
Q

When should the object occupy at least 10% of the scene’s width?

A

For subject identification.

Sources: PSP, 11.4.3, page 319 POA, Physical Security, 11.4.2, page 348

139
Q

A typical integrated physical protection system (PPS) project would include what six elements?

A

Project concept,Designing the project,Managing the bid process, Managing the implementation process, Acceptance of work, Initializing and managing the warranty process.
Source: POA, Physical Security Chapter 13. pages 476-477