Physical Security Flashcards

Chapter 6 CPP

1
Q

A critical on-site examination and analysis of a facility to ascertain in determining the protection needed to make recommendations to improve overall security is the definition of a(n):

  1. Full-field inspection
  2. Inspection review
  3. Audit survey
  4. Security survey
  5. None of the above
A

D. Security survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a key consideration in a risk analysis or risk assessment

  1. Vulnerability to attack
  2. Probability of attack
  3. Cost
  4. Impact to business if loss occurs
  5. Both a and b
  6. All of the above
A

F.All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

From a security perspective, what is the first factor to be considered in facility construction?

  1. The identity of experience consultants
  2. An effective security plan
  3. The building site itself
  4. An architect with knowledge of physical security
  5. None of the above
A

C. The building site itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not correct regarding a security education program

  1. Many people are naïve and trusting
  2. All installation personnel must be made aware of the constant threat of breaches of security
  3. Structural aids to security are valueless without active support of all personnel
  4. Security consciousness is an inherent state of mind
  5. None of the above
A

D. Security consciousness is an inherent state of mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most vulnerable link in any identification system is:

  1. Poor quality of identification badges
  2. Educational background of security offices
  3. Not enough security officers assisted to control posts
  4. Perfunctory performance of duty
  5. None of the above
A

D. Perfunctory performance of duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not true in regard to establishing and identifying personnel to control movement

  1. The identification card should be designed as simply as possible
  2. Detailed instructions should be disseminated as to where, when, and how badges should be worn.
  3. Procedures should be designed to show employees what to do when an identification card or badge is lost
  4. The identification card or badge should be designed in relativity complicated manner to avoid duplication
  5. Prerequisites for reissue should be devised and disseminated
A

D. The identification card or badge should be designed in relativity complicated manner to avoid duplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of simple code word or phrase during normal conversion to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed

  1. Code one
  2. SOS
  3. Security alert
  4. Duress code
  5. Basic alert
A

D. Duress code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The practice of having at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to sensitive area is referred to as the:

  1. Two-man access procedure
  2. Two-man control rule
  3. Two-man rule
  4. Controlled access rule
  5. Information security rule
  6. None of the above
A

C. Two-man rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The designation an establishment of “restricted areas” according to army regulations is performed by the:

  1. Joint Chiefs of Staff
  2. National Security Agency
  3. Secretary of Defense
  4. Secretary of the Army
  5. Military commander of the installation or facility
A

E. Military commander of the installation or facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a known advantage of the establishment of restricted access

  1. They provide an increase in security without slowdown in operation
  2. They provide increased security through buffer zones
  3. They allow for varying digress of security as required
  4. They improve overall security
  5. They make it possible to have security compatible with operational requirements
A

A. They provide an increase in security without slowdown in operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A restricted area containing a security interest or other sensitive matter, in which uncontrolled movement can permit access to the security interest or sensitive matter but within access may be prevented by security escort and other internal restrictions and control, is called a(n):

  1. Exclusion area
  2. Controlled area
  3. Limited area
  4. Sensitized area
  5. None of the above
A

C. Limited area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of fencing is generally used for protection of limited and exclusion areas?

  1. Concertina
  2. Barbed tape
  3. Barbed wire
  4. Chain link
  5. Wood
A

D. Chain link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Excluding the top guard, a chain link fence for general security purposes should be:

  1. 6 gauge
  2. 7 gauge
  3. 8 gauge
  4. 9 gauge
  5. 10 gauge
A

D. 9 gauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a chain link fence with mesh openings for general security purposes the opening should be no larger than

  1. 1.5 in
  2. 2 in
  3. 2.5 in
  4. 4 in
  5. 4.5 in
A

B. 2 in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Excluding the top guard, standard barb-wire fencing that is intended to prevent human trespassing should not be less than:

  1. 6 ft. high
  2. 7 ft. high
  3. 8 ft. high
  4. 9 ft. high
  5. 10 ft. high
A

B. 7 ft. high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The federal specification regarding standard barbed wire fencing that is twisted and double strand is that it should be:

  1. 8 gauge
  2. 10 gauge
  3. 12 gauge
  4. 14 gauge
  5. None of the above
A

C. 12 gauge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The standard barbed wire, twisted, double strand fence has how many point barbs spaced an equal distance apart:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
A

D. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The distance between barbed wire strands in a barbed wire fence should not exceed:

  1. 2 in
  2. 3 in
  3. 4 in
  4. 5 in
  5. 6 in
A

E. 6 in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Top guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence by at least:

  1. 1 ft.
  2. 1.5 ft.
  3. 2 ft.
  4. 2.5 ft.
  5. 3 ft.
A

A. 1 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A top guard must consist of:

  1. Two strands of barbed wire or tape
  2. Three strands of barbed wire or tape
  3. Four strands of barbed wire or tape
  4. Five strands of barbed wire or tape
  5. Six strands of barbed wire or tape
A

B. Three strands of barbed wire or tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many inches apart should strands of barbed wire or tape used as a top guard on a fence be spaced

  1. 2
  2. 3
  3. 4
  4. 5
  5. 6
A

E. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unavoidable drainage ditches, culverts, vents, ducts, and other openings should be protected by securely fastened welded bard grills when they have a cross sectional area greater than:

  1. 10 in
  2. 48 in
  3. 64 in
  4. 96 in
  5. 104 in
A

D. 96in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Between the perimeter barrier and exterior structures should be a clear zone covering:

  1. 10 ft.
  2. 15 ft.
  3. 20 ft.
  4. 30 ft.
  5. 40 ft.
A

C. 20 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:

  1. 10 ft.
  2. 20 ft.
  3. 30 ft.
  4. 40 ft.
  5. 50 ft.
A

E. 50 ft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Manhole covers _____ in. or more in diameter should be secured to prevent unauthorized openings

  1. 10
  2. 20
  3. 30
  4. 40
  5. 50
A

A. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following characteristics of protective lighting is incorrect:

  1. It may be unnecessary where the perimeter fence is protected by a central alarm system
  2. It usually requires less intensity than working light
  3. It may also provide personal protection by reducing advantages of concealment
  4. It should only be used as a psychological deterrent
  5. Such lighting is expensive to maintain
A

E. Such lighting is expensive to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Measure horizontally 6 in. above ground level and at least 30 ft. outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:

  1. 0.2 foot-candle
  2. 0.3 foot-candle
  3. 0.4 foot-candle
  4. 0.6 foot-candle
  5. 0.10 foot-candle
A

A. 0.2 foot-candle

28
Q

Which of the following principles of protective lighting is not correct?

  1. Lighting should be used with other measures, such as fixed security posts, fences, etc., and not alone
  2. A large amount of light should be focused on security patrol routes
  3. Adequate, even light should be used on bordering areas
  4. These should be a high brightness contrast between an intruder and the back ground
  5. Glaring lights should be directed at the eyes of the intruder
A

B. A large amount of light should be focused on security patrol routes

29
Q

Lighting units of four general types are used for protective lighting. Which of the following is not used?

  1. Emergency
  2. Movable
  3. Standby
  4. Intermittent
  5. Continuous
A

D. Intermittent

30
Q

What is the most common protective lighting system, which consists of a series of fixed luminaries arranged to flood a given area during the hours of darkness with overlapping cones of light

  1. Emergency lighting
  2. Movable lighting
  3. Standby lighting
  4. Intermittent lighting
  5. Continuous lighting
A

E. Continuous lighting

31
Q

Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

  1. 0.5 foot-candle
  2. 1.0 foot-candle
  3. 1.5 foot-candle
  4. 2.0 foot-candle
  5. 3.0 foot-candle
A

B. 1.0 foot-candle

32
Q

Water approaches that extend to 100 ft. from the pier should be illuminated to at least:

  1. 0.5 foot-candle
  2. 1.0 foot-candle
  3. 1.5 foot-candle
  4. 2.0 foot-candle
  5. 3.0 foot-candle
A

A. 0.5 foot-candle

33
Q

The US Army illumination intensity minimums for lighting the perimeter of a restricted area is:

  1. 0.15 foot-candle
  2. 0.40 foot-candle
  3. 1.00 foot-candle
  4. 2.00 foot-candle
  5. 2.15 foot-candle
A

B. 0.40 foot-candle

34
Q

What agency should be consulted before installing protective lighting adjacent to navigable waters?

  1. Local law enforcement agencies
  2. The Department of Transportation
  3. The Bureau of Customs
  4. The US Coast Guard
  5. Both a and b
A

D. The US Coast Guard

35
Q

The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as a(n):

  1. Capacitance detection system
  2. Ultrasonic detection system
  3. Vibration detection system
  4. Electromechanical detection system
  5. Microwave detection system
A

E. Microwave detection system

36
Q

The intrusion detection system that is used on safes, walls, and opening in an effort to establish an electrostatic field around and object to be protected is known as a(n):

  1. Capacitance detection system
  2. Ultrasonic detection system
  3. Contact microphone detection system
  4. Microwave detection system
  5. Radio-frequency detection system
A

A. Capacitance detection system

37
Q

An alarm system in which the installation-owned system is a direct extension of the police or fire alarm system is known as a(n):

  1. Central station system
  2. Local alarm system
  3. Proprietary system
  4. Auxiliary system
  5. Bell-sound system
A

D. Auxiliary system

38
Q

An alarm system that is monitored by an outside company to provide electric protective services in which they provide the appropriate actions is known as a(n):

  1. Central station system
  2. Local alarm system
  3. Proprietary system
  4. Auxiliary system
  5. Bell-sound system
A

A. Central station system

39
Q

An alarm system whereby the central station is owned by and located within the installation being protected is known as a(n):

  1. Central station system
  2. Local alarm system
  3. Proprietary system
  4. Auxiliary system
  5. Bell-sound system
A

C. Proprietary system

40
Q

The principle of the pin-tumbler lock can be traced back historically to:

  1. Egyptians more than 400 years ago
  2. The Civil War period
  3. The late eighteenth century
  4. 1905
  5. World War 1
A

A. Egyptians more than 400 years ago

41
Q

Which of the following is not true with regard to lock-and-key systems?

  1. The locking systems should be supplemented with other security devices
  2. Most key locks can be picked by an expert in a few minutes
  3. A high quality pickproof lock is considered a positive bar to entry
  4. The is the most accepted and widely used security device of the basic safeguards in protecting installations
  5. Locks, regardless of quality or cost, should be considered as delay devices only.
A

C. A high quality pickproof lock is considered a positive bar to entry

42
Q

Of the following locks, which type is generally considered to have the poorest security value?

  1. An interchangeable core system
  2. Conventional combination locks
  3. Key locks
  4. Manipulation-resistant combination locks
  5. Both a and d
  6. None of the above
A

C.Key locks

43
Q

The number of combinations possible with a lock that has 40 numbers and 3 number combination is:

  1. 12,000
  2. 16,000
  3. 32,000
  4. 64,000
  5. 86,000
A

D. 64,000

44
Q

Which lock is generally used on automobiles, desks, and cabinets?

  1. Wafer
  2. Ward
  3. Pin tumbler
  4. Combination
  5. Cypher
A

A. Wafer

45
Q

Which of the following is not true with regard to door latches?

  1. A dead-bolt latch is easy to install and can be used on almost any door
  2. Chain latches are highly recommended as effective security measures
  3. A dead bolt latch is very expensive
  4. A dead bolt latch increases the security posture of the facility
  5. Both b and c
  6. Both a and d
A

E. Both b and c

46
Q

An inventory of key systems should be conducted at least:

  1. Weekly
  2. Monthly
  3. Quarterly
  4. Semiannually
  5. Annually
A

E. Annually

47
Q

A sentry dog normally does not perform as well at:

  1. Radar sites
  2. Warehouses
  3. Gasoline storage areas
  4. Ammunition storage areas
  5. Offices containing classified materials
A

C. Gasoline storage areas

48
Q

Which of the following is more of a probable disadvantage in the use of sentry dogs?

  1. A dog is more effective than a human during inclement weather
  2. A dog has a keen sense of smell
  3. A dog provides a strong psychological deterrent
  4. The type of dog best suited for security work is naturally dangerous
  5. A dog can detect and apprehend intruders
A

D. The type of dog best suited for security work is naturally dangerous

49
Q

In meeting federal specifications, insulated units must have the following fire-resistant minimum ratings:

  1. Class 150: 2h
  2. Class 150: 4h
  3. Class 350: 1h
  4. Class 350: 3h
  5. Class 350: 4h
A

C. Class 350: 1h

50
Q

In meeting minimal federal specifications, noninsulated security containers must satisfactorily pass a drop test of:

  1. 15 ft.
  2. 20 ft.
  3. 22 ft.
  4. 25 ft.
  5. 30 ft.
A

E. 30 ft.

51
Q

In meeting minimal federal specifications, government security containers must be equipped with a combination lock capable of resisting manipulation and radiological attack for:

  1. 10 man-hours
  2. 20 man-hours
  3. 30 man-hours
  4. 40 man-hours
  5. 45 man-hours
A

B. 20 man-hours

52
Q

Which of the following is not an approved UL safe classification:

  1. 350-1
  2. 350-2
  3. 350-3
  4. 350-4
  5. None of the above
A

C. 350-3

53
Q

Underwriters Lavatories does independent testing on security containers that simulate a major fire where the heat builds up gradually:

  1. 750 Degrees Fahrenheit
  2. 1000 Degrees Fahrenheit
  3. 2000 Degrees Fahrenheit
  4. 2500 Degrees Fahrenheit
  5. 3000 Degrees Fahrenheit
A

C. 2000 Degrees Fahrenheit

54
Q

The acceptable vault construction of insulated doors has a minimum reinforced concrete wall, floor, and celling of:

  1. 4 ft.
  2. 6ft.
  3. 8ft.
  4. 10ft.
  5. 12ft.
A

B. 6ft.

55
Q

Which of the following would be a UL computer media storage classification?

  1. 100-4
  2. 150-4
  3. 250-4
  4. 350-4
  5. 450-4
A

B. 150-4

56
Q

Safes that are UL classified must be anchored to the floor or must weigh at least:

  1. 750lbs
  2. 1000lbs
  3. 1500lbs
  4. 2000lbs
  5. 3000lbs
A

A. 750lbs

57
Q

Which of the following is not generally true regarding money safes?

  1. Those manufactured prior to 1960 have round doors
  2. They provide good protection against fire
  3. They always have wheels
  4. Today, money safes have square doors
  5. Both b and c
  6. All of the above
A

E. Both b and c

58
Q

A “relock” on a vault door will automatically prevent the bolt mechanism from operating when

  1. A timer is used
  2. A switch is flipped
  3. There is an attack on the door or the combination lock
  4. It is locked by remote control
  5. All of the above
A

C. There is an attack on the door or the combination lock

59
Q

Money safes are classified by both Underwriters Laboratories and:

  1. The Bureau of Standards
  2. American Society of Industrial Securities
  3. The Federal Deposit Insurance Corporation
  4. The Insurance Services Office
A

D. The Insurance Services Office

60
Q

Security Vaults differ from safes in that:

  1. They do not have both fire and burglary resistant properties
  2. Steel is used
  3. They are tested by UL for burglary resistance
  4. They are permanently affixed to the building
  5. None of the above
A

D. They are permanently affixed to the building

61
Q

Most theft is committed by:

  1. Professionals
  2. Organized crime
  3. Amateurs
  4. Maladjusted criminals
  5. Semiprofessionals
A

C. Amateurs

62
Q

An experienced safecracker will ordinarily use which of the following methods?

  1. Trying the maintenance standard combination
  2. Trying the day combination
  3. Trying the handle
  4. All of the above
  5. None of the above
A

D. All of the above

63
Q

Which of the following methods has not been used in recent years to crack open record and money safes?

  1. Punching
  2. Core drilling
  3. Using fluoroscope
  4. Torching
  5. Using a laser beam
A

E. Using a laser beam

64
Q

The weakness of the burning bar as a burglary tool is that:

  1. It will not burn through concrete
  2. Its actual heat is not intense enough
  3. It required hydrogen tanks
  4. It produces a large volume of smoke
  5. All of the above
A

D. It produces a large volume of smoke

65
Q

A 50% insurance discount is generally allowed to protect a safe if:

  1. The premises are guarded by security guards
  2. The premises are open 24 hours a day
  3. Multiple coverage is purchased
  4. The safe is UL tested
  5. The safe has wheels
A

B. The premises are open 24 hours a day

66
Q

Which of the following is not correct with regard to safes?

  1. Money safes do not have accredited fire resistance
  2. UL classification labels are removed from all safes exposed to fires
  3. Record safes are designed to resist fires only
  4. Quality equipment should be purchased only from reputable dealers
  5. Insulation in record safes more than 30 years old may negate fire resistant qualities
  6. None of the above
A

F. None of the above