PSP Domain 3: Implementation of Physical Security Measures Flashcards
What document describes the company’s requirements for qualification of the bidders such as licenses, labor affiliations, experience, and bonds?
Bidders’ instructions.
Source: IPPS, Chapter 5, page 75
What enables bidders to understand exactly what they are expected to supply and install?
Specifications.
Source: IPPS, Chapter 5, page 77
What party should clearly state what its evaluation criteria are, how each criterion is weighted, and what the method of evaluating proposals will be?
The purchasing organization.
Source: IPPS, Chapter 6, page 99
What is the purpose of the invitation for bid (IFB)?
When a system is already designed, the IFB is used to obtain the lowest cost for the equipment, software, and installation.
Source: IPPS, Chapter 6, page 98
What should the company be prepared to use to defend its selection of qualified contractors?
Written selection criteria results documentation.
Source: IPPS, Chapter 6, page 102
The output of the project design phase is called what?
Bid package.
Source: IPPS, Chapter 5, page 75
What are the components of the bid package?
Bidders’ instructions, Specifications, Drawings and schedules, Hardware schedules.
Source: IPPS, Chapter 5, page 75
Which component of the bid package supplies the security system requirements in sufficient detail that bidders have a common understanding of what is needed?
Specifications.
Source: IPPS, Chapter 5, page 75
What are the most commonly supplied drawings within the bid package?
Plan drawings, Elevation drawings, Detail drawings, Riser diagrams, Conduit and cable lists.
Source: IPPS, Chapter 5, pages 75-76
What are the hardware schedules included in the bid package to aid in understanding the specific components to be provided?
Data panel schedule, Door hardware schedule, CCTV camera schedule.
Source: IPPS, Chapter 5, page 76
What group carries out the security system procurement activities?
The procurement committee.
Source: IPPS, Chapter 6, page 94
What brings all potential bidders together in a room so the project manager can explain the procurement requirements to all of them at the same time?
Bidders’ conference.
Source: IPPS, Chapter 6, page 97
What should a bidders’ conference include?
Opening remarks;Introductions of evaluation team and bidders;Overview of project and key objectives;Explanation of procurement process;Discussion of purpose, time line, evaluation criteria, etc.;Tour of the site;Opportunity for vendors to submit questions.
Source: IPPS, Chapter 6, page 97
What should the company consider giving a bidder to resolve a minor informality or irregularity in the bid?
A chance to cure any minor deficiency, such as missing information or attachments, wrong number of copies, or missing signatures.
Source: IPPS, Chapter 6, page 104
What are the six phases of the physical protection system (PPS) life cycle process?
Planning,
Design and estimation,
Procurement,
Installation, operation, and training,
Testing and warranty,
Maintenance, evaluation, and replacement.
Source: IPPS, Chapter 2, pages 19-20
How long can the typical physical protection system (PPS) implementation process take?
18 to 24 months.
Source: IPPS, Chapter 2, page 19
What is the most important phase of the physical protection system (PPS) life cycle?
Planning phase.
Source: IPPS, Chapter 2, page 20
The procurement process is included in which physical protection system (PPS) life cycle phase?
Phase three, procurement.
Source: IPPS, Chapter 2, page 22
What are the three common types of procurement actions?
Sole source,Request for proposals (RFP),Invitation for bids (IFP).
Source: IPPS, Chapter 2, page 22
What are the three major components of the physical protection system (PPS) procurement phase?
Form a procurement committee,Prepare bid package,Prequalify contractors.
Source: IPPS, Chapter 2, page 23
Conducting a bidders’ conference, reviewing technical and cost evaluations, and interview and due diligence results are part of which physical protection system (PPS) life cycle phase?
The procurement phase.
Source: IPPS, Chapter 2, page 27
What has evolved for the purpose of planning, coordinating, and controlling the complex and diverse activities of modern security projects?
Project management.
Source: IPPS, Chapter 3, page 31
What is the documentation called that is prepared during the planning stage of project management?
Project scope document.
Source: IPPS, Chapter 3, page 35
What is a good practice for project managers in ensuring the comprehensiveness and appropriateness of a physical protection system (PPS)?
Divide the project into several stages.
Source: IPPS, Chapter 3, page 36
What are two key reminders for project managers?
Determine and sequence activities and keep the project on schedule and under control.
Source: IPPS, Chapter 3, page 41
When is a project complete?
When there is proof that all objectives have been achieved and the necessary transfer of knowledge from the project team to operations personnel has occurred.
Source: IPPS, Chapter 3, page 47
What are some risks involved in security system procurement?
The system may be delivered late or over budget,The system may not work as required,The system may adversely affect existing systems or processes,The organization may be unable to recover losses after a contract breach,Third-party subcontractors may make claims against the company.
Source: IPPS, Chapter 6, page 93
What are some steps in the security system procurement process?
Forming a procurement committee, Specifying hardware and software requirements, Identifying potential integrators, Launching a competitive tender program, Selecting a successful bidder, Issuing a purchase order, Receiving and installing the products and services.
Source: IPPS, Chapter 6, page 94
When should a project manager schedule a bidders’ conference?
About two weeks after the request for proposals (RFP) is issued.
Source: IPPS, Chapter 6, page 97
In selecting contractors, what must be accomplished?
Qualifications reviewed, References checked, Interviews held with the people who will perform the work.
Source: IPPS, Chapter 6, pages 101-102
What skills and characteristics must a good project manager possess?
Process management skills (organized, logical, analytical, self-disciplined),People management skills (leadership, supervision, team-building, and communication abilities).
Source: IPPS, Chapter 3, page 33
Considering the techniques of project management, what approach is considered to provide a pathway to success?
A standardized approach, with repeatable and documented work practices.
Source: IPPS, Chapter 3, page 34
Over the length of a project, what consumes the greatest amount of project management time, day in and day out?
The control effort, which includes gathering information, reviewing progress, documenting issues and decisions, and managing the overall work plan.
Source: IPPS, Chapter 3, page 42
How often should the project manager require status meetings of a project?
Weekly.
Source: IPPS, Chapter 3, page 43
Which physical protection system (PPS) life cycle phase includes developing a punch list and taking necessary actions to formally accept and commission the system?
The installation, operation, and training phase.
Source: IPPS, Chapter 2, pages 23-24
What is the process of ensuring that all systems and components of a system are designed, installed, tested, operated, and maintained according to the operational requirements of the owner?
Commissioning.
Source: IPPS, Chapter 2, page 24
What is a contract document used in the architecture and building trades to organize the completion of a construction project?
Punch list.
Source: IPPS, Chapter 2, page 24
Who must receive end-user training of the physical protection system (PPS)?
All personnel involved in operating, updating, and maintaining the PPS.
Source: IPPS, Chapter 2, page 24
When commissioning a physical protection system (PPS), what are the three types of tests that should be conducted?
Factory Acceptance,Site Acceptance,Availability or reliability.
Source: IPPS, Chapter 2, page 25
What should testing simulate in the physical protection system (PPS) commissioning process?
Realistic conditions.
Source: IPPS, Chapter 2, page 25
Within testing and commissioning, when should a certificate of completion be issued and a contract considered complete?
After successful completion of all prescribed testing.
Source: IPPS, Chapter 5, page 84
What does equipment performance testing determine?
Whether equipment is functional, Whether it has adequate sensitivity, Whether it meets design and performance objective
Sources: PSP, 15.4, page 504 POA, Physical Security, 15.4, page 550
What does personnel performance testing determine?
Whether procedures are effective, Whether personnel know and follow procedures, Whether personnel and equipment interact effectively. Sources: PSP, 15.4, page 504 POA, Physical Security, 15.4, page 550
How does the contractor perform predelivery or factory acceptance testing?
Assemble a test system including some or all of the system components, Conduct tests to demonstrate that system performance complies with specified requirements in accordance with approved factory test procedures.
Sources: PSP, 15.4.1, page 505 POA, Physical Security, 15.4.1, page 551
How does a contractor perform site acceptance testing?
Develop a plan to calibrate and test all components, Verify data transmission system operation, Install the system, Place the system in service, Test the system.
Sources: PSP, 15.4.2, page 506 POA, Physical Security, 15.4.2, page 552
How long should reliability testing be conducted?
24 hours per day for 15 consecutive calendar days, including holidays.
Sources: PSP, 15.4.3, page 508 POA, Physical Security, 15.4.3, page 554
What are six types of post-implementation tests?
Operational tests,Performance tests,Post-maintenance tests, Subsystem tests, Limited scope tests, Evaluation tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, pages 555-556
Reliability testing is performed in what four phases?
Phase I Testing,Phase I Assessment,Phase II Testing, Phase II Assessment.
Sources: PSP, 15.4.3, page 508 al Security, 15.4.3, pages 554-555
What type of post-implementation test is performed periodically to prove correct system operation but does not involve verification of equipment operating specifications?
Operational tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 555
What type of post-implementation test is conducted after preventive or remedial maintenance has been performed on a security system to make sure the systems are working properly?
Post-maintenance test.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556
What type of post-implementation test is used to test a complex system that is broken down into several subsystems or segments that are tested separately?
Limited scope tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556
What type of post-implementation test verifies that equipment conforms with equipment or system specifications, thereby demonstrating effectiveness?
Performance tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556
What type of post-implementation test ensures that large parts of the system are all working together as originally designed?
Subsystem tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556
What type of post-implementation test is a periodic, independent test of the security system to validate the vulnerability analysis and ensure that overall effectiveness is being maintained?
Evaluation tests.
Sources: PSP, 15.4.4, page 509 POA, Physical Security, 15.4.4, page 556
What are the deliverables during the commissioning and warranty of the implementation phase?
Testing of the sytem to demonstrate its effectiveness and reliability;Correction of any problems, free of charge, by the installation contractor during the warranty period.
Source: IPPS, Chapter 2, page 28
Maintenance, evaluation, and replacement fall under which project stage?
Stage four, closeout.
Source: IPPS, Chapter 3, page 37
How often should evaluation tests be performed?
At least once a year.
Source: IPPS, Chapter 7, page 153
What tests checks people’s or objects’ tolerance to abuse or misuse under deliberately introduced stress?
Stress Tests.
Source: IPPS, Chapter 7, page 153
What are regression tests?
Tests that apply to subsystems, systems, or procedures that have been altered to perform a new function and must still perform some of their original functions.
Source: IPPS, Chapter 7, page 154
What should a training manual for a physical protection system (PPS) include?
An agenda, Defined objectives for each lesson, A detailed description of the subject matter for each lesson.
Source: IPPS, Chapter 7, page 154
When should approval of the planned training content and schedule be obtained from the customer?
At least 30 days before the training.
Source: IPPS, Chapter 7, page 154
What should system troubleshooting and maintenance training cover?
Physical layout of each piece of hardware,Trouble shooting and diagnostic procedures, Repair instructions, Preventive maintenance procedures and schedules, Calibration procedures.
Source: IPPS, Chapter 7, pages 156-157
How many site acceptance tests (SAT) are normally conducted for each physical location where system components are being installed?
One.
Source: IPPS, Chapter 8, page 169
What are the goals of preventive maintenance?
Keep equipment and software operating efficiently,Extend the operational life of equipment,Identify equipment issues before a failure occurs.
Source: IPPS, Chapter 9, page 178
What type of maintenance corrects faults and returns the system to operation after a hardware or software component fails?
Remedial maintenance.
Source: IPPS, Chapter 9, page 181
What is the major goal of system maintenance agreements?
To ensure that the security system operates at its optimum capability with minimum downtime.
Source: IPPS, Chapter 9, page 185
What is standards compliance testing (SCT)?
SCT evaluates the system compliance with both in-house company standards and industry standards.
Source: IPPS, Chapter 8, page 164
What is the common time for the contractor to report to the job site to address a warranty issue?
Within four hours.
Source: IPPS, Chapter 8, page 174
What results can be expected from preventive maintenance?
Correct operation of electromechanical equipment,Replacement of hardware to keep equipment updated,Updates of system and application software,Problem detection through testing and analysis of system reports,Maintenance of system documentation.
Source: IPPS, Chapter 9, page 179
Most security system failures occur in the first year due to what two issues?
“Infant mortality” of system components or improper installation.
Source: IPPS, Chapter 9, page 182
How often should maintenance logs be provided to the security department for analysis?
On a quarterly basis.
Source: IPPS, Chapter 9, page 188
What type of records identify problems operators have with certain subsystems or components?
System operator records.
Source: IPPS, Chapter 9, page 188
As a rule of thumb, how much of the capital cost of the physical protection system (PPS) equipment for a location should be allocated each year for spare parts purchases?
5 percent.
Source: IPPS, Chapter 9, page 189
What are two benefits of in-house maintenance?
In-house systems expertise built and maintained, reducing reliance on outside contractors;Management control over resource priorities.
Source: IPPS, Chapter 9, page 190
What are three benefits for outsourced maintenance?
Technicians who keep current on products and systems,Supervision and control transferred to other company,Backup resources available.
Source: IPPS, Chapter 9, pages 190-191
How long does it take before most security systems are considered obsolete due to advancements in technology?
5 years or less.
Source: IPPS, Chapter 9, page 191
What should be included in a service report for a warranty repair?
Date and time the fault was reported, Nature of the reported fault, Date and time of the service visit, Actual fault identified, Remedial work carried out.
Sources: PSP, 15.4.5, page 509 POA, Physical Security, 15.4.5, page 556
What is the purpose of a warranty?
To repair, correct, or replace any defect for a period of 12 months from the date of issue of the certificate of practical completion.
Sources: PSP, 15.4.5, page 509 POA, Physical Security, 15.4.5, page 556
What qualifications should personnel have for conducting training on the new system?
All personnel giving instruction should be certified by the equipment manufacturer for the hardware and software.Trainers should have experience in conducting similar training.The customer should approve the trainers.
Sources: PSP, 15.5.1, page 510 POA, Physical Security, 15.5.1, page 557
What are seven training topics for new systems?
System administration,System monitoring,Alarm assessment and dispatch, Incident response, System troubleshooting and maintenance, IT functions, System overview.
Sources: PSP, 15.5.2, pages 511-512 POA, Physical Security, 15.5.2, pages 558-560
What is the goal of system administration training?
System administrators will learn to use all system functions, including ID badge design and production, cardholder setup and access level assignment, access door programming, alarm setup and implementation, data storage and retrieval through reports, and system database backups.
Sources: PSP, 15.5.2, page 511 POA, Physical Security, 15.5.2, page 558
What is the goal of alarm assessment and dispatch training?
Security system operators will learn to assess the cause of different alarm conditions and properly deal with them.
Sources: PSP, 15.5.2, page 512 POA, Physical Security, 15.5.2, page 559
What are some functions, other than protection, that security officers may be asked to assist in?
Communications,Customer service,Transportation.
Sources: PSP, 12.2, page 382 POA, Physical Security, 12.1, page 418
What is a continuing challenge when procuring services within the contract security industry?
During procurement, companies overemphasize low price, which leads to disappointing and compromised service quality.
Sources: PSP, 12.2, page 384 POA, Physical Security, 12.2, page 420
The need for security personnel can be analyzed using which concept?
The “necessary human being” concept.
Sources: PSP, 12.3, page 384 POA, Physical Security, 12.3, page 420
What are the two categories of patrols for security officers?
Foot patrols and mobile patrols.
Sources: PSP, 12.5.2, page 387 POA, Physical Security, 12.5.2, page 424
Regardless of the patrol method, how should security officers patrol their assigned area?
Systematically,Frequently backtracking,Taking unexpected routes.
Sources: PSP, 12.5.2, page 387 POA, Physical Security, 12.5.2, page 424
What is the goal when dealing with mentally ill or incapacitated people?
Prevent harm from the person’s acts and to control the person without injury, discomfort, or embarrassment.
Source: POA, Physical Security, 12.5.7, page 427
What positive impact can security officers have in a security awareness program?
Encouraging employees to report security risks.
Sources: PSP, 12.6.1, page 392 POA, Physical Security, 12.6.1, page 430
To be successful in an intelligence role, what should security officers be trained in?
Fundamentals of investigations,Interviewing techniques,Investigative report-writing.
Sources: PSP, 12.6.2, pages 392-393 POA, Physical Security, 12.6.2, page 431
What should be reviewed before an organization purchases security uniforms and equipment?
State and local statutes and regulations to ensure that any proposed purchases of uniforms and equipment comply with the law.
Sources: PSP, 12.7, page 394 POA, Physical Security, 12.7, page 433
The decision to arm an officer should be based on the existence of what conditions?
There is a greater danger to life safety without the weapon.The officer may reasonably be expected to use fatal force.
Sources: PSP, 12.7.1, page 396 POA, Physical Security, 12.7.1, page 434
What guideline is used for standards for private security officers?
ASIS Private Security Officer Selection and Training Guideline, which was updated in 2019.
Sources: PSP, 12.8.1, page 398 POA, Physical Security, 12.8.1, page 438
Which organization promulgated a code of ethics for security officers?
The International Foundation for Protection Officers
Affective learning helps a person change the way he or she views a situation. What are some types of affective training for security officers?
Understanding various cultures, Dealing with disabled persons, Practicing safety compliance, Exploring methods used by adversaries to acquire information.
Sources: PSP, 12.9.1, page 403 POA, Physical Security, 12.9.4, page 449
Psychomotor training offers hands-on experiences. What are some examples of psychomotor learning for security officers?
Equipment operation, Defensive driving tactics,Firearms training, Fire extinguisher training, First aid skills, Emergency response skills.
Sources: PSP, 12.9.1, page 404 POA, Physical Security, 12.9.4, page 449
What is training?
The acquisition of the knowledge, skills, and abilities directly related to job performance.
Source: POA, Physical Security, 12.9.4, page 450
What method of training is useful for guiding the learner in any topic where discretionary judgement is necessary?
Case studies.
Sources: PSP, 12.9.4, page 412 POA, Physical Security, 12.9.3, page 446
What are post orders based on?
Standard operating procedures (SOPs).
Sources: PSP, 12.10.1, page 421 POA, Physical Security, 12.10.1, page 458
Besides a list of procedures for the security group to follow in day-to-day operations, what else might standard operating procedures (SOPs) include?
Emergency response procedures.
Sources: PSP, 12.10.1, page 421 POA, Physical Security, 12.10.1, page 458
“Officers will maintain a professional or military bearing” is an example of which type of order?
General order.
Sources: PSP, 12.10.2, page 421 POA, Physical Security, 12.10.2, page 459
What should post orders convey for the security force?
Express the policies of the protected enterprise,Summarize required officer duties,Avoid the problems of word-of-mouth instructions, Provide a basis for site-specific training.
Sources: PSP, 12.10.2, page 422 POA, Physical Security, 12.10.2, page 459
What may be included in personnel databases that hold a skills inventory list of security officers?
Special training,Certifications,Qualifications.
Sources: PSP, 12.10.3, pages 423-424 POA, Physical Security, 12.10.3, page 461
Aside from post hours and shift time, what else must be considered and calculated into the work schedule for a proprietary security officer?
Paid holidays,Sick time,Other absences, such as jury duty, family illnesses, or emergencies.
Sources: PSP, 12.10.3, page 424 POA, Physical Security, 12.10.3, page 462
Contract security agencies have a broad personnel base from which they can draw additional officers when necessary. What can be major disadvantages to this approach?
Officers may never have been assigned before to the particular client location. Such a security officer cannot become familiar with post requirements in one or two hours, and an inexperienced officer may cause more harm than good.
Sources: PSP, 12.10.3, pages 424-425 POA, Physical Security, 12.10.3, page 463
Why is it important for security officers to log their meal and break periods?
If an incident occurs, the log may allow verification of whether an officer was on a break or should have been at the post.
Sources: PSP, 12.10.3, page 425 POA, Physical Security, 12.10.3, page 464
How do experienced supervisors provide continuous training?
They provide feedback to an officer in response to situations that were not handled correctly.They provide training when new material is introduced that requires familiarization by the officer.
Sources: PSP, 12.10.4, page 426 POA, Physical Security, 12.10.4, page 464
What can a supervisor do to ensure the post orders are read and to reinforce training?
Ask one or more specific questions about the new order,Observe the officer in an actual situation involving its application,Set up a hypothetical situation requiring the officer to show a working knowledge of the order.
Sources: PSP, 12.10.4, page 426 POA, Physical Security, 12.10.4, page 465
What are some items that can be evaluated during regular assessments of security officer performance?
Personal appearance and condition of the officer,Condition of the post,Availability and condition of required personnel and post equipment, Quality of officer response to training questions or simulations, Quality of officer response to real-life situations.
Sources: PSP, 12.10.4, page 427 POA, Physical Security, 12.10.4, pages 465-466
Regular assessments and recordings of officer performance by supervisors after every post visit can be used for what?
To identify trends and additional training needs.
Sources: PSP, 12.10.4, page 427 POA, Physical Security, 12.10.4, page 466
In the context of security officer operations, what is the focus of quality assurance (QA) programs?
To test, inspect, or identify problems in order to correct them and to maintain and improve service, as well as prevent problems before they happen.
Sources: PSP, 12.10.5, page 427 POA, Physical Security, 12.10.5, page 466
What is the outcome of effectiveness assessments?
Maintain service quality, as well as to continuously improve security officer performance and operation.
Source: POA, Physical Security, 12.10.5, page 466
Aside from on-site supervisors, contract security companies can use “independent” inspectors for what type of inspections?
Quality control inspections.
Sources: PSP, 12.10.6, page 428 POA, Physical Security, 12.10.6, page 466
What can quality control inspections identify?
Substandard performance,Subject areas requiring supplemental training,Procedures needing clarification.
Sources: PSP, 12.10.6, page 428 POA, Physical Security, 12.10.6, page 467
What are some cost-effective and practical ideas to increase organization-wide security awareness?
Incorporating security awareness training into new-hire orientations, special luncheons, and regular business meetings.
Sources: PSP, 12.11, page 430 POA, Physical Security, 12.11, page 469
What is the strategy of the Business Watch program?
Connecting designated police officers with business leaders who assist businesses in reporting and preventing crime.
Sources: PSP, 12.11, pages 430-431 POA, Physical Security, 12.11, page 469
What is a security policy?
A security policy establishes strategic security objectives and priorities for the organization, identifies the organization representatives primarily accountable for physical security, and sets forth responsibilities and expectations for managers, employees, and others in the organization.
Source: PAP Standard, 6.2, page 14
What is a security procedure?
Procedures should describe how the organization will take proactive steps to protect its assets by establishing architectural, administrative, design, operational, and technological approaches to avoid, eliminate, or reduce the likelihood that risks will materialize.
Source: PAP Standard, 6.2 page 14
What is a post order?
Post orders are the most important written instructions for the security force. Orders:Express the policies of the protected enterprise,Summarize required officer duties, Avoid the problems of word-of-mouth instructions, Provide a basis for site-specific training.
Source: POA, Physical Security, 12.10.2, page 459
What considerations should be given to security officer ID badges?
The badge normally provides the officer with proper identification and access to areas that he or she tours regularly or may need to enter during an emergency.
Sources: PSP, Figure 12-1, page 395 POA, Physical Security, Figure 12.1, page 433