PSP Domain 3: Implementation of Physical Security Measures Flashcards

1
Q

What document describes the company’s requirements for qualification of the bidders such as licenses, labor affiliations, experience, and bonds?

A

Bidders’ instructions.

Source: IPPS, Chapter 5, page 75

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What enables bidders to understand exactly what they are expected to supply and install?

A

Specifications.

Source: IPPS, Chapter 5, page 77

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What party should clearly state what its evaluation criteria are, how each criterion is weighted, and what the method of evaluating proposals will be?

A

The purchasing organization.

Source: IPPS, Chapter 6, page 99

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the invitation for bid (IFB)?

A

When a system is already designed, the IFB is used to obtain the lowest cost for the equipment, software, and installation.

Source: IPPS, Chapter 6, page 98

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should the company be prepared to use to defend its selection of qualified contractors?

A

Written selection criteria results documentation.

Source: IPPS, Chapter 6, page 102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The output of the project design phase is called what?

A

Bid package.

Source: IPPS, Chapter 5, page 75

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components of the bid package?

A

Bidders’ instructions, Specifications, Drawings and schedules, Hardware schedules.

Source: IPPS, Chapter 5, page 75

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which component of the bid package supplies the security system requirements in sufficient detail that bidders have a common understanding of what is needed?

A

Specifications.

Source: IPPS, Chapter 5, page 75

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the most commonly supplied drawings within the bid package?

A

Plan drawings, Elevation drawings, Detail drawings, Riser diagrams, Conduit and cable lists.

Source: IPPS, Chapter 5, pages 75-76

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the hardware schedules included in the bid package to aid in understanding the specific components to be provided?

A

Data panel schedule, Door hardware schedule, CCTV camera schedule.

Source: IPPS, Chapter 5, page 76

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What group carries out the security system procurement activities?

A

The procurement committee.

Source: IPPS, Chapter 6, page 94

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What brings all potential bidders together in a room so the project manager can explain the procurement requirements to all of them at the same time?

A

Bidders’ conference.

Source: IPPS, Chapter 6, page 97

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should a bidders’ conference include?

A

Opening remarks;Introductions of evaluation team and bidders;Overview of project and key objectives;Explanation of procurement process;Discussion of purpose, time line, evaluation criteria, etc.;Tour of the site;Opportunity for vendors to submit questions.

Source: IPPS, Chapter 6, page 97

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should the company consider giving a bidder to resolve a minor informality or irregularity in the bid?

A

A chance to cure any minor deficiency, such as missing information or attachments, wrong number of copies, or missing signatures.

Source: IPPS, Chapter 6, page 104

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the six phases of the physical protection system (PPS) life cycle process?

A

Planning,
Design and estimation,
Procurement,
Installation, operation, and training,
Testing and warranty,
Maintenance, evaluation, and replacement.

Source: IPPS, Chapter 2, pages 19-20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How long can the typical physical protection system (PPS) implementation process take?

A

18 to 24 months.

Source: IPPS, Chapter 2, page 19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the most important phase of the physical protection system (PPS) life cycle?

A

Planning phase.

Source: IPPS, Chapter 2, page 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The procurement process is included in which physical protection system (PPS) life cycle phase?

A

Phase three, procurement.

Source: IPPS, Chapter 2, page 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three common types of procurement actions?

A

Sole source,Request for proposals (RFP),Invitation for bids (IFP).

Source: IPPS, Chapter 2, page 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three major components of the physical protection system (PPS) procurement phase?

A

Form a procurement committee,Prepare bid package,Prequalify contractors.

Source: IPPS, Chapter 2, page 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Conducting a bidders’ conference, reviewing technical and cost evaluations, and interview and due diligence results are part of which physical protection system (PPS) life cycle phase?

A

The procurement phase.

Source: IPPS, Chapter 2, page 27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What has evolved for the purpose of planning, coordinating, and controlling the complex and diverse activities of modern security projects?

A

Project management.

Source: IPPS, Chapter 3, page 31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the documentation called that is prepared during the planning stage of project management?

A

Project scope document.

Source: IPPS, Chapter 3, page 35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a good practice for project managers in ensuring the comprehensiveness and appropriateness of a physical protection system (PPS)?

A

Divide the project into several stages.

Source: IPPS, Chapter 3, page 36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are two key reminders for project managers?

A

Determine and sequence activities and keep the project on schedule and under control.

Source: IPPS, Chapter 3, page 41

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When is a project complete?

A

When there is proof that all objectives have been achieved and the necessary transfer of knowledge from the project team to operations personnel has occurred.

Source: IPPS, Chapter 3, page 47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are some risks involved in security system procurement?

A

The system may be delivered late or over budget,The system may not work as required,The system may adversely affect existing systems or processes,The organization may be unable to recover losses after a contract breach,Third-party subcontractors may make claims against the company.

Source: IPPS, Chapter 6, page 93

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some steps in the security system procurement process?

A

Forming a procurement committee, Specifying hardware and software requirements, Identifying potential integrators, Launching a competitive tender program, Selecting a successful bidder, Issuing a purchase order, Receiving and installing the products and services.

Source: IPPS, Chapter 6, page 94

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When should a project manager schedule a bidders’ conference?

A

About two weeks after the request for proposals (RFP) is issued.

Source: IPPS, Chapter 6, page 97

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In selecting contractors, what must be accomplished?

A

Qualifications reviewed, References checked, Interviews held with the people who will perform the work.

Source: IPPS, Chapter 6, pages 101-102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What skills and characteristics must a good project manager possess?

A

Process management skills (organized, logical, analytical, self-disciplined),People management skills (leadership, supervision, team-building, and communication abilities).

Source: IPPS, Chapter 3, page 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Considering the techniques of project management, what approach is considered to provide a pathway to success?

A

A standardized approach, with repeatable and documented work practices.

Source: IPPS, Chapter 3, page 34

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Over the length of a project, what consumes the greatest amount of project management time, day in and day out?

A

The control effort, which includes gathering information, reviewing progress, documenting issues and decisions, and managing the overall work plan.

Source: IPPS, Chapter 3, page 42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How often should the project manager require status meetings of a project?

A

Weekly.

Source: IPPS, Chapter 3, page 43

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which physical protection system (PPS) life cycle phase includes developing a punch list and taking necessary actions to formally accept and commission the system?

A

The installation, operation, and training phase.

Source: IPPS, Chapter 2, pages 23-24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the process of ensuring that all systems and components of a system are designed, installed, tested, operated, and maintained according to the operational requirements of the owner?

A

Commissioning.

Source: IPPS, Chapter 2, page 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a contract document used in the architecture and building trades to organize the completion of a construction project?

A

Punch list.

Source: IPPS, Chapter 2, page 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Who must receive end-user training of the physical protection system (PPS)?

A

All personnel involved in operating, updating, and maintaining the PPS.

Source: IPPS, Chapter 2, page 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When commissioning a physical protection system (PPS), what are the three types of tests that should be conducted?

A

Factory Acceptance,Site Acceptance,Availability or reliability.

Source: IPPS, Chapter 2, page 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What should testing simulate in the physical protection system (PPS) commissioning process?

A

Realistic conditions.

Source: IPPS, Chapter 2, page 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Within testing and commissioning, when should a certificate of completion be issued and a contract considered complete?

A

After successful completion of all prescribed testing.

Source: IPPS, Chapter 5, page 84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does equipment performance testing determine?

A

Whether equipment is functional, Whether it has adequate sensitivity, Whether it meets design and performance objective

Sources: PSP, 15.4, page 504 POA, Physical Security, 15.4, page 550

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does personnel performance testing determine?

A

Whether procedures are effective, Whether personnel know and follow procedures, Whether personnel and equipment interact effectively. Sources: PSP, 15.4, page 504 POA, Physical Security, 15.4, page 550

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does the contractor perform predelivery or factory acceptance testing?

A

Assemble a test system including some or all of the system components, Conduct tests to demonstrate that system performance complies with specified requirements in accordance with approved factory test procedures.
Sources: PSP, 15.4.1, page 505 POA, Physical Security, 15.4.1, page 551

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does a contractor perform site acceptance testing?

A

Develop a plan to calibrate and test all components, Verify data transmission system operation, Install the system, Place the system in service, Test the system.

Sources: PSP, 15.4.2, page 506 POA, Physical Security, 15.4.2, page 552

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How long should reliability testing be conducted?

A

24 hours per day for 15 consecutive calendar days, including holidays.

Sources: PSP, 15.4.3, page 508 POA, Physical Security, 15.4.3, page 554

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are six types of post-implementation tests?

A

Operational tests,Performance tests,Post-maintenance tests, Subsystem tests, Limited scope tests, Evaluation tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, pages 555-556

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Reliability testing is performed in what four phases?

A

Phase I Testing,Phase I Assessment,Phase II Testing, Phase II Assessment.

Sources: PSP, 15.4.3, page 508 al Security, 15.4.3, pages 554-555

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What type of post-implementation test is performed periodically to prove correct system operation but does not involve verification of equipment operating specifications?

A

Operational tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 555

50
Q

What type of post-implementation test is conducted after preventive or remedial maintenance has been performed on a security system to make sure the systems are working properly?

A

Post-maintenance test.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556

51
Q

What type of post-implementation test is used to test a complex system that is broken down into several subsystems or segments that are tested separately?

A

Limited scope tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556

52
Q

What type of post-implementation test verifies that equipment conforms with equipment or system specifications, thereby demonstrating effectiveness?

A

Performance tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556

53
Q

What type of post-implementation test ensures that large parts of the system are all working together as originally designed?

A

Subsystem tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556

54
Q

What type of post-implementation test is a periodic, independent test of the security system to validate the vulnerability analysis and ensure that overall effectiveness is being maintained?

A

Evaluation tests.

Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556

55
Q

What are the deliverables during the commissioning and warranty of the implementation phase?

A

Testing of the sytem to demonstrate its effectiveness and reliability;Correction of any problems, free of charge, by the installation contractor during the warranty period.

Source: IPPS, Chapter 2, page 28

56
Q

Maintenance, evaluation, and replacement fall under which project stage?

A

Stage four, closeout.

Source: IPPS, Chapter 3, page 37

57
Q

How often should evaluation tests be performed?

A

At least once a year.

Source: IPPS, Chapter 7, page 153

58
Q

What tests checks people’s or objects’ tolerance to abuse or misuse under deliberately introduced stress?

A

Stress Tests.

Source: IPPS, Chapter 7, page 153

59
Q

What are regression tests?

A

Tests that apply to subsystems, systems, or procedures that have been altered to perform a new function and must still perform some of their original functions.

Source: IPPS, Chapter 7, page 154

60
Q

What should a training manual for a physical protection system (PPS) include?

A

An agenda, Defined objectives for each lesson, A detailed description of the subject matter for each lesson.

Source: IPPS, Chapter 7, page 154

61
Q

When should approval of the planned training content and schedule be obtained from the customer?

A

At least 30 days before the training.

Source: IPPS, Chapter 7, page 154

62
Q

What should system troubleshooting and maintenance training cover?

A

Physical layout of each piece of hardware,Trouble shooting and diagnostic procedures, Repair instructions, Preventive maintenance procedures and schedules, Calibration procedures.

Source: IPPS, Chapter 7, pages 156-157

63
Q

How many site acceptance tests (SAT) are normally conducted for each physical location where system components are being installed?

A

One.

Source: IPPS, Chapter 8, page 169

64
Q

What are the goals of preventive maintenance?

A

Keep equipment and software operating efficiently,Extend the operational life of equipment,Identify equipment issues before a failure occurs.

Source: IPPS, Chapter 9, page 178

65
Q

What type of maintenance corrects faults and returns the system to operation after a hardware or software component fails?

A

Remedial maintenance.

Source: IPPS, Chapter 9, page 181

66
Q

What is the major goal of system maintenance agreements?

A

To ensure that the security system operates at its optimum capability with minimum downtime.

Source: IPPS, Chapter 9, page 185

67
Q

What is standards compliance testing (SCT)?

A

SCT evaluates the system compliance with both in-house company standards and industry standards.

Source: IPPS, Chapter 8, page 164

68
Q

What is the common time for the contractor to report to the job site to address a warranty issue?

A

Within four hours.

Source: IPPS, Chapter 8, page 174

69
Q

What results can be expected from preventive maintenance?

A

Correct operation of electromechanical equipment,Replacement of hardware to keep equipment updated,Updates of system and application software,Problem detection through testing and analysis of system reports,Maintenance of system documentation.

Source: IPPS, Chapter 9, page 179

70
Q

Most security system failures occur in the first year due to what two issues?

A

“Infant mortality” of system components or improper installation.

Source: IPPS, Chapter 9, page 182

71
Q

How often should maintenance logs be provided to the security department for analysis?

A

On a quarterly basis.

Source: IPPS, Chapter 9, page 188

72
Q

What type of records identify problems operators have with certain subsystems or components?

A

System operator records.

Source: IPPS, Chapter 9, page 188

73
Q

As a rule of thumb, how much of the capital cost of the physical protection system (PPS) equipment for a location should be allocated each year for spare parts purchases?

A

5 percent.

Source: IPPS, Chapter 9, page 189

74
Q

What are two benefits of in-house maintenance?

A

In-house systems expertise built and maintained, reducing reliance on outside contractors;Management control over resource priorities.

Source: IPPS, Chapter 9, page 190

75
Q

What are three benefits for outsourced maintenance?

A

Technicians who keep current on products and systems,Supervision and control transferred to other company,Backup resources available.

Source: IPPS, Chapter 9, pages 190-191

76
Q

How long does it take before most security systems are considered obsolete due to advancements in technology?

A

5 years or less.

Source: IPPS, Chapter 9, page 191

77
Q

What should be included in a service report for a warranty repair?

A

Date and time the fault was reported, Nature of the reported fault, Date and time of the service visit, Actual fault identified, Remedial work carried out.

Sources: PSP, 15.4.5, page 509 POA, Physical Security, 15.4.5, page 556

78
Q

What is the purpose of a warranty?

A

To repair, correct, or replace any defect for a period of 12 months from the date of issue of the certificate of practical completion.

Sources: PSP, 15.4.5, page 509 POA, Physical Security, 15.4.5, page 556

79
Q

What qualifications should personnel have for conducting training on the new system?

A

All personnel giving instruction should be certified by the equipment manufacturer for the hardware and software.Trainers should have experience in conducting similar training.The customer should approve the trainers.

Sources: PSP, 15.5.1, page 510 POA, Physical Security, 15.5.1, page 557

80
Q

What are seven training topics for new systems?

A

System administration,System monitoring,Alarm assessment and dispatch, Incident response, System troubleshooting and maintenance, IT functions, System overview.

Sources: PSP, 15.5.2, pages 511-512 POA, Physical Security, 15.5.2, pages 558-560

81
Q

What is the goal of system administration training?

A

System administrators will learn to use all system functions, including ID badge design and production, cardholder setup and access level assignment, access door programming, alarm setup and implementation, data storage and retrieval through reports, and system database backups.

Sources: PSP, 15.5.2, page 511 POA, Physical Security, 15.5.2, page 558

82
Q

What is the goal of alarm assessment and dispatch training?

A

Security system operators will learn to assess the cause of different alarm conditions and properly deal with them.

Sources: PSP, 15.5.2, page 512 POA, Physical Security, 15.5.2, page 559

83
Q

What are some functions, other than protection, that security officers may be asked to assist in?

A

Communications,Customer service,Transportation.

Sources: PSP, 12.2, page 382 POA, Physical Security, 12.1, page 418

84
Q

What is a continuing challenge when procuring services within the contract security industry?

A

During procurement, companies overemphasize low price, which leads to disappointing and compromised service quality.

Sources: PSP, 12.2, page 384 POA, Physical Security, 12.2, page 420

85
Q

The need for security personnel can be analyzed using which concept?

A

The “necessary human being” concept.

Sources: PSP, 12.3, page 384 POA, Physical Security, 12.3, page 420

86
Q

What are the two categories of patrols for security officers?

A

Foot patrols and mobile patrols.

Sources: PSP, 12.5.2, page 387 POA, Physical Security, 12.5.2, page 424

87
Q

Regardless of the patrol method, how should security officers patrol their assigned area?

A

Systematically,Frequently backtracking,Taking unexpected routes.

Sources: PSP, 12.5.2, page 387 POA, Physical Security, 12.5.2, page 424

88
Q

What is the goal when dealing with mentally ill or incapacitated people?

A

Prevent harm from the person’s acts and to control the person without injury, discomfort, or embarrassment.

Source: POA, Physical Security, 12.5.7, page 427

89
Q

What positive impact can security officers have in a security awareness program?

A

Encouraging employees to report security risks.

Sources: PSP, 12.6.1, page 392 POA, Physical Security, 12.6.1, page 430

90
Q

To be successful in an intelligence role, what should security officers be trained in?

A

Fundamentals of investigations,Interviewing techniques,Investigative report-writing.

Sources: PSP, 12.6.2, pages 392-393 POA, Physical Security, 12.6.2, page 431

91
Q

What should be reviewed before an organization purchases security uniforms and equipment?

A

State and local statutes and regulations to ensure that any proposed purchases of uniforms and equipment comply with the law.

Sources: PSP, 12.7, page 394 POA, Physical Security, 12.7, page 433

92
Q

The decision to arm an officer should be based on the existence of what conditions?

A

There is a greater danger to life safety without the weapon.The officer may reasonably be expected to use fatal force.

Sources: PSP, 12.7.1, page 396 POA, Physical Security, 12.7.1, page 434

93
Q

What guideline is used for standards for private security officers?

A

ASIS Private Security Officer Selection and Training Guideline, which was updated in 2019.

Sources: PSP, 12.8.1, page 398 POA, Physical Security, 12.8.1, page 438

94
Q

Which organization promulgated a code of ethics for security officers?

A

The International Foundation for Protection Officers

95
Q

Affective learning helps a person change the way he or she views a situation. What are some types of affective training for security officers?

A

Understanding various cultures, Dealing with disabled persons, Practicing safety compliance, Exploring methods used by adversaries to acquire information.

Sources: PSP, 12.9.1, page 403 POA, Physical Security, 12.9.4, page 449

96
Q

Psychomotor training offers hands-on experiences. What are some examples of psychomotor learning for security officers?

A

Equipment operation, Defensive driving tactics,Firearms training, Fire extinguisher training, First aid skills, Emergency response skills.

Sources: PSP, 12.9.1, page 404 POA, Physical Security, 12.9.4, page 449

97
Q

What is training?

A

The acquisition of the knowledge, skills, and abilities directly related to job performance.

Source: POA, Physical Security, 12.9.4, page 450

98
Q

What method of training is useful for guiding the learner in any topic where discretionary judgement is necessary?

A

Case studies.

Sources: PSP, 12.9.4, page 412 POA, Physical Security, 12.9.3, page 446

99
Q

What are post orders based on?

A

Standard operating procedures (SOPs).

Sources: PSP, 12.10.1, page 421 POA, Physical Security, 12.10.1, page 458

100
Q

Besides a list of procedures for the security group to follow in day-to-day operations, what else might standard operating procedures (SOPs) include?

A

Emergency response procedures.

Sources: PSP, 12.10.1, page 421 POA, Physical Security, 12.10.1, page 458

101
Q

“Officers will maintain a professional or military bearing” is an example of which type of order?

A

General order.

Sources: PSP, 12.10.2, page 421 POA, Physical Security, 12.10.2, page 459

102
Q

What should post orders convey for the security force?

A

Express the policies of the protected enterprise,Summarize required officer duties,Avoid the problems of word-of-mouth instructions, Provide a basis for site-specific training.

Sources: PSP, 12.10.2, page 422 POA, Physical Security, 12.10.2, page 459

103
Q

What may be included in personnel databases that hold a skills inventory list of security officers?

A

Special training,Certifications,Qualifications.

Sources: PSP, 12.10.3, pages 423-424 POA, Physical Security, 12.10.3, page 461

104
Q

Aside from post hours and shift time, what else must be considered and calculated into the work schedule for a proprietary security officer?

A

Paid holidays,Sick time,Other absences, such as jury duty, family illnesses, or emergencies.

Sources: PSP, 12.10.3, page 424 POA, Physical Security, 12.10.3, page 462

105
Q

Contract security agencies have a broad personnel base from which they can draw additional officers when necessary. What can be major disadvantages to this approach?

A

Officers may never have been assigned before to the particular client location. Such a security officer cannot become familiar with post requirements in one or two hours, and an inexperienced officer may cause more harm than good.

Sources: PSP, 12.10.3, pages 424-425 POA, Physical Security, 12.10.3, page 463

106
Q

Why is it important for security officers to log their meal and break periods?

A

If an incident occurs, the log may allow verification of whether an officer was on a break or should have been at the post.

Sources: PSP, 12.10.3, page 425 POA, Physical Security, 12.10.3, page 464

107
Q

How do experienced supervisors provide continuous training?

A

They provide feedback to an officer in response to situations that were not handled correctly.They provide training when new material is introduced that requires familiarization by the officer.

Sources: PSP, 12.10.4, page 426 POA, Physical Security, 12.10.4, page 464

108
Q

What can a supervisor do to ensure the post orders are read and to reinforce training?

A

Ask one or more specific questions about the new order,Observe the officer in an actual situation involving its application,Set up a hypothetical situation requiring the officer to show a working knowledge of the order.

Sources: PSP, 12.10.4, page 426 POA, Physical Security, 12.10.4, page 465

109
Q

What are some items that can be evaluated during regular assessments of security officer performance?

A

Personal appearance and condition of the officer,Condition of the post,Availability and condition of required personnel and post equipment, Quality of officer response to training questions or simulations, Quality of officer response to real-life situations.

Sources: PSP, 12.10.4, page 427 POA, Physical Security, 12.10.4, pages 465-466

110
Q

Regular assessments and recordings of officer performance by supervisors after every post visit can be used for what?

A

To identify trends and additional training needs.

Sources: PSP, 12.10.4, page 427 POA, Physical Security, 12.10.4, page 466

111
Q

In the context of security officer operations, what is the focus of quality assurance (QA) programs?

A

To test, inspect, or identify problems in order to correct them and to maintain and improve service, as well as prevent problems before they happen.

Sources: PSP, 12.10.5, page 427 POA, Physical Security, 12.10.5, page 466

112
Q

What is the outcome of effectiveness assessments?

A

Maintain service quality, as well as to continuously improve security officer performance and operation.

Source: POA, Physical Security, 12.10.5, page 466

113
Q

Aside from on-site supervisors, contract security companies can use “independent” inspectors for what type of inspections?

A

Quality control inspections.

Sources: PSP, 12.10.6, page 428 POA, Physical Security, 12.10.6, page 466

114
Q

What can quality control inspections identify?

A

Substandard performance,Subject areas requiring supplemental training,Procedures needing clarification.

Sources: PSP, 12.10.6, page 428 POA, Physical Security, 12.10.6, page 467

115
Q

What are some cost-effective and practical ideas to increase organization-wide security awareness?

A

Incorporating security awareness training into new-hire orientations, special luncheons, and regular business meetings.

Sources: PSP, 12.11, page 430 POA, Physical Security, 12.11, page 469

116
Q

What is the strategy of the Business Watch program?

A

Connecting designated police officers with business leaders who assist businesses in reporting and preventing crime.

Sources: PSP, 12.11, pages 430-431 POA, Physical Security, 12.11, page 469

117
Q

What is a security policy?

A

A security policy establishes strategic security objectives and priorities for the organization, identifies the organization representatives primarily accountable for physical security, and sets forth responsibilities and expectations for managers, employees, and others in the organization.

Source: PAP Standard, 6.2, page 14

118
Q

What is a security procedure?

A

Procedures should describe how the organization will take proactive steps to protect its assets by establishing architectural, administrative, design, operational, and technological approaches to avoid, eliminate, or reduce the likelihood that risks will materialize.

Source: PAP Standard, 6.2 page 14

119
Q

What is a post order?

A

Post orders are the most important written instructions for the security force. Orders:Express the policies of the protected enterprise,Summarize required officer duties, Avoid the problems of word-of-mouth instructions, Provide a basis for site-specific training.

Source: POA, Physical Security, 12.10.2, page 459

120
Q

What considerations should be given to security officer ID badges?

A

The badge normally provides the officer with proper identification and access to areas that he or she tours regularly or may need to enter during an emergency.

Sources: PSP, Figure 12-1, page 395 POA, Physical Security, Figure 12.1, page 433