TDMM Chapter 17 Flashcards

(109 cards)

1
Q

Asset

A

An employee, contractor or any possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DACS

A

Digital Alarm Communicator System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DARR

A

Digital Alarm Radio Receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DART

A

Digital Alarm Radio Transmitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAC

A

Electronic Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ESS

A

Electronic Safety and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FACP

A

Fire Alarm Control Panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FDAS

A

Fire Detection and Alarm System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fixed Camera

A

A camera dedicated to a single view that does not change unless physically moved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layering

A

The use of many layers of barriers to provide the maximum level of deterrence and delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAC

A

Notification Appliance Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pan and Tilt

A

A camera that allows 180 or 360 degree view, controlled remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

Potential for loss from an event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat

A

An intent to do harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Video Surveillance

A

The extension of human vision to areas requiring surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name six primary functions that an ESS system performs

A
  • Access control
  • Surveillance
  • Intrusion Detection
  • Fire Alarm
  • Mass notification
  • Area of rescue communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name three independent components of a security system

A
  • Electronic
  • Architectural
  • Operational
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lighting is categorized as what type of countermeasure?

A

Architectural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Access control is categorized as what type of countermeasure?

A

Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Contingency planning is categorized as what type of countermeasure?

A

Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a fundamental concept of security design?

A

The use of layerinf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe the theory of concentric circles

A

Using multiple points of detection provides the greatest opportunity for evaluation and reaponae

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What principle serves as the basis of event based monitoring?

A

The principle that electronic systems can efficiently and effectively drive operational response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is required to provide a person with total safety and security?

A

Total isolation from their environment and other people while maintaining basic life support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is required to provide objects with total safety and security?
Isolating the object from access
26
Name the three steps performed by a security consultant
- Assess known and potential risks - Estimate the likelihood that threats will occur - Recommend countermeasures
27
What is the key to mitigating risks?
Identifying the source of a potential risk
28
Name four factors that affect a users access level
- Security clearance - Job title - Rank - Employee type
29
Name two primary components of an EAC
- A computer with EAC software - One or more peripheral devices or control panels
30
Define the three levels of EAC systems
- Level 1 - Headend processing software Level 2 - Intelligent field processing Level 3 - Field devices
31
What is a credential?
An item that allows entry into an area
32
What type of cables make up an EAC cable?
Four individually shielded pairs
33
Name four types of cabling used for communications in an EAC system
- Fiber - Twisted pair - Wireless - Cellular
34
Name four types of basic door locks
- Bored locks - Rim locks - Mortise locks - Vertical rods
35
Name four types of basic lock functions
- Entrance - Store room - Classroom - Vestibule
36
How does an entrance lock function?
When it is pushed in, an inside button locks the outside lever
37
How does a storeroom lock function?
The lock is key operated from the outside because the outside lever is always locked. The inside lever allows free egress
38
What determines if the outside lever of a vestibule lock is locked or unlocked?
The outside lever is accessed by a key when the door is locked. A key in the inside lever determines if the outside lever is locked or unlocked
39
What is the most common type of door hardware?
Electric strikes
40
Name three performance ratings used to describe electric strikes
- Static strength - Dynamic strength - Endurance levels
41
Name three types of optional monitoring switches for an electric strike
- Latch bolt monitor - Locking cam monitor - Dead bolt monitor
42
How long does it typically take for an electric strike to unlock?
8 to 11 seconds
43
Name two types of magnetic locks
- Direct hold - Shear locks
44
How many means of release do AHJs normally require for magnetic locks?
two
45
What replaces the function of a traditional mechanical key in an electric lockset?
Actuating solenoids
46
Name two applications where electric bolts and latches may be used
- High security applications - Applications where people do not move in and out of the area
47
What is another name for electrified exit hardware
Panic hardware
48
Where is the use of electrified exit hardware often required?
In the path of egress
49
Where is electrified exit hardware commonly used?
Double door applications
50
Name five primary applications of video surveillance
- Investigation - Prosecution - Deterrence - Observation - Intrusion Detection
51
Name three traditional uses of surveillance systems
- Operational - Safety - Security
52
What is a good rule of thumb regarding the use of video surveillance and property rights
Do not use video surveillance where a right to privacy is expected
53
What does the use of video surveillance imply about the areas under surveillance?
Areas are being monitored and a response will be provided if the need arises
54
Why are IR cameras referred to as starlight cameras?
Because of their night time viewing capabilities
55
What is the purpose of thermal cameras?
To capture heat or temperature rather than light values
56
How are lens for video surveillance cameras define?
By their focal length
57
Name the three common types of camera lenses
- Fixed - Variable - Zoom
58
Name the two typical types of camera mounts used in video surveillance applications
- Fixed - Pan tilt
59
Name two factors used to determine camera mounting locations
- Available physical infrastructure - Required fields of view
60
What is the recommended mounting height for interior video surveillance cameras?
8ft AFF
61
What is the recommended mounting height for exterior video surveillance cameras?
15ft AFF
62
Name the three types of wireless use for video transmission
- Radio frequency (RF) - Free space optics - Microwave
63
Name the two possible methods for accomplishing IP based video
- Digitization of analog device - IP based camera
64
What determines how many layers of intrusion detection are present at a facility?
The purpose of the facility
65
Name three general types of alarms
- Fire Alarm - Intrusion - Special
66
Name three components of an alarm system
- Sensor - Sending circuit - Annunciator
67
Name three types of monitoring methods
- Local alarm - Central Station - Dial alarm
68
What does the IDS protect?
- Perimeter - Area of space - Point of object
69
Name four components of an intrusion detection system
- Detection sensors - Processing devices - Annunciators - Power source
70
Name the two classes of FDAS
- Protected premises system - Supervising station system
71
How do supervising station systems differ from protected premises systems?
Supervising stations signal authorities, protected premises do not
72
Do central station services own the properties they monitor?
No
73
Name five types of initiation devices
- Smoke - Heat - Flame - Gas - Human
74
Name three components of a fire
- Smoke - Heat - Light radiation
75
Name the two categories of smoke detectors
- Photoelectric - Ionization
76
How do heat detectors differ from flame detectors?
Heats detect high temps Flames detect radiation produced by fire
77
What is a pull station?
A switch that turns on fire alarm notification appliances
78
What is the benefit on dual action pull stations?
Helps prevent false alarms
79
What is typically the maximum distance between pull station and door?
5 ft
80
What is the maximum distance between pull stations?
200 ft
81
Name three design goals that are necessary considerations when designing for effective notification
- Signal audibility - Intelligibility - Visibility
82
What are the most used notification appliances for FA signaling?
- Audible appliances - Visual appliances - combo appliances
83
List six types of notification appliances
- Bells - Chimes - Horn - Speaker - Strobe - Combo
84
Why are most FA signaling devices designed to run in 24V dc power?
They run off a battery
85
What factor is the most important aspect of FA signaling?
Audibility
86
What is the most common mode of alarm perception?
Hearing
87
Name three ways the audibility of an alarm can be compromised
- Volume - Clarity - Reliability
88
Along with audibility, what is another major consideration for mass notification systems?
Intelligibility
89
Name three factors that impact visibility
- Area of coverage - Mounting location - Ceiling height
90
True or False Fire alarm control systems are capable of two way communication
True
91
What is required to happen if the silent switch for a trouble signal is activated in an FA system?
A visual indicator must be lit until the trouble condition is corrected
92
What will happen if the silent switch in an FA is placed but no trouble condition exists?
The trouble signal will sound
93
True or False Designations for the circuits and pathways in an FA system are hierarchical
False
94
What class designation is used for ethernet and other protocols?
Class N
95
What type of supervision is required for a switch in a Class N network?
General Supervision
96
How many redundant pathways are between switch 1 and switch 2 in a class N design?
One
97
What type of shared pathway is dedicated to life safety systems?
Level 3
98
True or False The general public should have access to Class N pathways?
False
99
How many sources of power do central control panels require?
Two
100
What is the purpose of an area of refuge and rescue two way communication system?
To allow people who cannot access paths of egress to summon help
101
What should be posted next to the call station for an area of refuge and rescue?
- Instructions for use under emergency conditions - Directions for use - Instructions on calling for assistance - The location
102
True or False The base call station can terminate a call from the call station in an area of refuge and rescue?
True
103
Name three types of two communication systems
- Analog - VoIP with external power - VoIP with PoE
104
How should areas of refuge and rescue be identified?
Illuminated signs
105
What types of incidents are announced on a mass notification system?
- Weather related - Human related - Fire related
106
Name five inputs into the Mass Notification system
- Fire Alarm - Audio/Music Feeds - Network Interfaces - Microphone - Telephone
107
Name four outputs from the Mass notification system
- Speakers - Digital signage devices - Electronic messaging - Lights/Strobes
108
Name three criteria to consider when designing the Mass Notification System
- Getting to the intended audience - Message receipts - Operational performances
109
Where should the all clear message be delivered?
At the muster point