Chapter 10 - Physical (Environmental) Security Flashcards

1
Q

The primary function of a physical protection system is: A. determine, direct and dispatch B. detection, delay and response C. display, develop, initiate, and apprehend

A

B. detection, delay and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To successful complete a vulnerability assessment, it is critical that protection systems are well understood through: A. threat definition, target identification, and facility characterization B. threat definition, conflict control, and facility characterization C. risk assessment, threat identification, and incident review D. threat identification, vulnerability appraisal and access review

A

A. threat definition, target identification, and facility characterization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Laminated glass is recommended for what type of locations: A. All exterior glass windows B. Interior boundary penetration and critical infrastructure facility C. Street-level windows, doorways and other access areas D. Capacitance proximity, intrusion detection locations and boundary penetration sites

A

C. street level windows, doorways and other access areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The strategy of forming layers of protection around an asset or facility is known as: A. Secured perimeter B. Defense in Depth C. Reinforced Barrier Deterrent D. Reasonable Asset protection

A

B. defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What crime reduction technique BEST creates a physical environment that positively influences human behavior? A. Asset protection and vulnerability assessments B. Reducing vulnerability by protecting, offsetting or transferring the risk C. Crime prevention through environmental design D. Instituting employee screening and workplace violence programs

A

C.crime prevention through environmental design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The key to a successful physical protection system is the integration of: A. people, procedures, and equipment B. technology, risk assessment, and human interaction C. protecting, offsetting, and transferring risk D. detection, deterrence, and response

A

A. people, procedures, and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary objective of controlling entry into a facility or area? A. provide time management controls for all employees B. ensure that only authorized persons are allowed to enter C. Keep potential hazards and contraband material our that could be used to commit sabotage D. Identification purposes

A

B. ensure that only authorized personnel allowed to enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For safety considerations in perimeter areas such as parking lots or garages what is the advised lighting? A. 3fc B. 5 fc C. 7 fc D. 10 fc

A

B. 5 fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would be the most appropriate interior sensor used for a building that has windows along the ground floor? A. infrared glass-break sensor B. ultrasonic glass-break sensors C. acoustic/shock glass-break sensors D. volumetric sensors

A

C. acoustic/shock glass-break sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following BEST describe three separate functions of CCTV? A. surveillance, deterrence, and evidentiary archives B. intrusion detection, detainment and response C. optical scanning, infrared beaming, and lighting D. monitoring, white balancing and inspection

A

A. surveillance, deterrence, and evidentiary archives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Although security technologies are not the answer to all organizational security problem, if applied appropriately what will they provide? A. the ability to reduce electrical costs B. they can enhance the security envelope and in the majority of cases will save the organization money C. government tax incentives for increased physical protection systems D. increased capital value of property with high-tech integrated technologies

A

B. they can enhance security envelope and in the majority of cases will save the organization money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A meaningful assessment of a facility or building should be used: A. to determine where all the fire exits are located B. within the context of the defined threats and the value of the organizations assets C. to count the number of employees within the facility D. to determine the structural strength of the perimeter walls

A

B. within the context of defined threats value of organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The BEST example of building a new facility for security is: A. limiting the number of entrances to the site that must be monitored, staffed and protected B. reducing the cost associated with energy needs in providing physical protection system C. giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities D. blast reinforcement film on perimeter windows

A

A. limiting the number of entrances to the site that must be monitored, staff, and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All visitor’s entering the facility sign in and out on a visitor’s log, this is established for what reason? A. for the purpose of detection, accountability, and the necessity for response B. access control and surveillance C. timeframe of the visit, who was visited, and in the case of an emergency have accountability of everyone for safety purposes D. for planning assessment and the requirement of proper designation

A

C. timeframe of the visit, who was visited, and in the case of an emergency have accountability of everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the BEST means of protecting physical devices associated with the alarm system? A. Tamper protection B. Target hardening C. Security Design D. UL 250

A

A. tamper protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. These BEST consist of: A. cable locks, encryption, password protection and increased awareness B. reducing vulnerability by protecting, offsetting or transferring the risk C. operational readiness, physical protection systems, standard operating processes D. increase awareness, environmental, design and physical security

A

A. cable locks, encryption, password protection, and increased awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Personal identity verification systems which use hand or fingerprint, handwriting, eye patter, voice, face, or any other physical characteristics for authentication are: A. biometric devices B. Technological systems C. Physiometric devices D. Physical analysis devices

A

A. biometric devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical security is applied by using ____ of physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property A. Layers B. Methods C. Varieties D. Types

A

A. layers of physical protection methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a comprehensive overview of a facility to include physical security controls, policy, procedures and employee safety? A. Availability assessment B. Security survey C. Budgetary and financial performance D. defense in depth

A

B. Security Survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which security control is most effective in curtailing and preventing “piggybacking” or tailgating as a means of unauthorized access? A. Cameras B. Turnstiles C. Keys D. Identification badges

A

B. turnstiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Design Phase of a site

A

Security professional should review all aspects of construction: land use, site planning, stand-off distance, controlled access zones, entry control and vehicular access, signage, parking, loading docks and service access, security lighting, and site utilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security Assessment

A

Also known as security survey, a vulnerability assessment, or a risk analysis. Comprehnsive review of the facility including physical security controls, policy, procedures, and employee safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security objectives

A

threat definition, target identification, and facility characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the threat?

A

Is it vandals, hackers, terrorists, internal employees, corporate spies of a combination

25
Q

Target Identification

A

What is the most vaulable asset that needs to be protected - prudent to prioritize and state impact and consequence of loss

26
Q

American Institute of Architects - key security concerns

A

Perform onsite interview and the following assessment: 1. Facility Security Control during and after hours of operation 2. Personel and contract security policies and procedures 3. Personnel screening 4. Site and building access control 5. Video surveillannce, assessment, and archiving 6. Natural surveillance opportunities 7. Protocols for responding to internal and external security incidents 8. Degree of integration of security and other building systems 9. Shipping and receiving security 10. Property identification and tracking 11. Proprietary information security 12. Computer Netweork Security 13. Workplace violence prevention 14. Mail screening operations, procedures and recommendations 15. Parking lot and site security 16. Data center security 17. COmmunications security 18. Executive protection 19. Business continuity planning and evacuation procedures

27
Q

Vulnerability Assessment

A

done within the context of the defined threats and the value of the organization’s assets.

28
Q

Most important goal in planning a site

A

Protection of life, property, and operations

29
Q

Site design

A

Integrate security and function to achieve a balance. Maximize efficiency while minimizing conflicts

30
Q

Crime Prevention through Environmental Design (CPTED)

A

Crime reduction technique with severla key elements applicable to the the analysis of the building function and site design against physical attack. Use one entrance for visitors. CCTV best deter crimes in facilities such as parking lots where there is a single exit. WIndows should not be palce adjacent to doors. Use laminated glass with window guards. Ground level windows should not be able to be open and should have bars and alarm systems. Magnetic switch alarms are available - windows up to the 4th floor should have this protection. Alson consider steel window frames. Tempered glass for entrance doors and adjacent panels - resist breakage. Wired glass - resistance to blunt objects. Laminated glass - two sheets of ordinary glass bonded to a middle layer of resistant plastic. Acoustic and shockwave sensors together is most effective

31
Q

New Zealand Ministry of Justice’s The Seven Qualities for Well Designed, Safer Places

A

Avoid using elements that create a poor image or a fortress like appearance. Integrate security features intrinsically, unobtrusively.

32
Q

Garages

A

Threats - crime and vehicles hitting pedestrians. Use CCTV. Lighting 10-12 foot candles over parked cars and 15 to 20 foot-candles in walking and driving aisles. Exterior lights - 12 feet above ground and point downward and paint walls white to reflect light. And lights should be strategically placed to reduce dark corenrs where criminals or attackers could hide. elevators and walups should be in a lobby outside of a controlled space.

33
Q

Infrared

A

Can not be seen by human eye, covert surveillance

34
Q

Primary function of Access Control System (ACS)

A

Ensure that only authorized personnel are permitted inside the controlled area. Goal is to limit the opportunity for a crime to be committed.

35
Q

Magnetic strip cards

A

Are easily duplicated

36
Q

Proximity cards

A

Use embedded antenna wire connected to a chip within the card

37
Q

Smart Cards

A

Credential cards with a microchip embedded in them. Can provide PIV - Personal Identity Verification

38
Q

CCTV

A

Provides immediate output, can be used for surveillance, assessment, deterrence, evidentiary archives

39
Q

3o frames per second

A

higher than what is needed for evidentiary and investigative purposes

40
Q

MPEG - Moving Picture Experts Group

A

most common compression algorithm - ration 10 to 100

41
Q

DVRs

A

Typically have 8 or 16 port versions - equals number of cameras that can be used

42
Q

Balanced Magnetic Switch - BMS

A

Uses a magnetic field to determine if an alarm signal is initiated - not susceptible to external magnetic fields, used on doors and windows

43
Q

Motion activated cameras

A

sends an alarm when intruder enters field of view

44
Q

Acoustic sensors

A

activated when building is secured and unoccupied

45
Q

Infrared linear beam sensors

A

a focused infrared red light beam is projected from an emitter and bounced off a reflector that is placed at the other side of the detection area

46
Q

Passive Infrared Sensors

A

most common - no beam is why it is called passive - picks up heat signatures - motion detector will not detect person standing still, also used a automatic request to exit locked doors

47
Q

Dual technology sensors

A

helps lower false alarm rates - integrated, redundant devices must react at the same time to cause an alarm

48
Q

Anti - passback

A

card reader is utilized on both entry and exit

49
Q

rim lock

A

associated with a dead bolt type of lock

50
Q

mortise lock

A

lock or latch that is recessed

51
Q

locking cylinders

A

pin tumbler contained within plug

52
Q

cipher lock

A

typically 5 to 10 digits

53
Q

false rejection

A

failure to recognize a legitimate user

54
Q

false acceptance

A

erroneous recognition - accepting an imposter

55
Q

hand geometry

A

tends to give high false accept rates

56
Q

iris scanning

A

most accurate and secure, people timid about having eyes scanned, throughput is 2 seconds

57
Q

retinal scanning

A

blood vessels back of the eye - takes 10 seconds - typically used in high end security application

58
Q

vascular patterns

A

ultimate palm reader - difficult to forge, contact-less, many and varied uses, capable of 1:1 and 1:many matches

59
Q

MTBF - Mean time before failure

A

latent damage of equipment - weakened by stress