Physical Security Flashcards
From a physical security perspective, what is the very first factor to be considered in facility construction?
The building site itself.
An architect with knowledge of physical security.
The identity of experienced consultants.
An effective security plan.
A
Protection-in-depth is a concept that suggests that an adversary should be required to avoid or defeat a number of protective measures prior to achieving the desired goal. The effects produced on the adversary by a system that provides protection-in-depth will include all but the following:
To require more extensive preparation prior to attacking the system.
To create a system that assures detection and apprehension.
To create additional steps where the adversary may fail or abort the mission.
To increase uncertainty about the system or measures.
B
Crime Prevention Through Environmental Design (CPTED) techniques involve all of the
following strategies except:
Provide positive access controls to a designated space.
Re-designate the use of space to provide natural barriers
Provide clearly marked transitional zones.
Provide clear border definition of controlled space.
A
The degree of protection desired in any installation is predicated on an analysis of which of the following?
Criticality & Vulnerability.
Vulnerability & Environmental conditions.
Cost & Vulnerability.
Cost & Criticality.
A
The most widely used physical security device is a(n):
Video surveillance system.
Alarm system.
Fence.
Lock-and-key device.
D
Which of the following is considered to be the most resistant to a blast explosion?
Thick earthen barricades.
Wire-reinforced glass windows.
Steel-frame building walls.
Thick reinforced concrete walls.
D
What are the two major components in most mechanical locks?
The coded mechanism & The fastening device.
The deadbolt & The latch.
The bolt & The key.
The cylinder & The tumbler array.
A
Excluding the top guard, standard barbed wire fencing that is intended to prevent human
trespassing should not be less than:
8 feet high.
6 feet high.
9 feet high.
7 feet high.
D
Measured horizontally 6 inch above ground level and at least 30 feet outside the exclusion area to the barrier, the perimeter band of lighting must provide a minimum intensity of:
5 foot-candle.
1 foot-candle.
10 foot candle.
0.2 foot-candle.
D
The UL symbol “TRTL” indicates:
The type of locking devices used.
That the safe is resistant to torches.
That the safe is resistant to tools.
That the safe is resistant to both torches and tools.
D
The most vulnerable operational link in any identification system is:
Poor quality of identification badges.
Educational background of security officers.
Perfunctory performance of duty.
Not enough security officers assigned to control posts.
C
A system using inaudible sound waves to detect the presence of an intruder or other disturbances is known as a(n):
Ultrasonic motion detection system.
Vibration detection system.
Motion detection system.
Sonic motion detection system.
A
The type of sensor that is designed to place a current-carrying conductor between an intruder and an area to be protected is known as a(n):
Electromechanical sensor.
Vibration sensor.
Microwave sensor.
Capacitance sensor.
A
The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electrostatic field around an object to be protected is known as a(n):
Radio-frequency detection system.
Microwave detection system.
Ultrasonic detection system.
Capacitance detection system.
D
A personal identification method based on the length of each finger on one hand from base to tip and the width of the hand inside the thumb is called the:
Henry fingerprint system.
Bausch & Lomb method
Hand geometry identification.
Bertillon method.
C
A major task in assets protection is addressing concerns when considering a communications application and/or data storage. The strategies to mitigate damage to systems include divergent routing, including hot/cold sites.
What is the best description of a hot site?
Hot site storage is a term used when storing perishable goods at low temperatures in any hot environment.
In a hot site, the customer provides the hardware and other facilities for the communication or data storage.
A hot site can be defined as the backup site that stores the data in real-time and is quickly operable in case of an interruption.
A backup facility that has the necessary electrical and physical components of a computer facility but does not have the computer equipment in place.
C
The practice of having at least two authorized persons (each capable of detecting incorrect or unauthorized procedures with respect to the task being performed) present during any operation that affords access to a sensitive area is referred to as the:
Controlled access rule.
Two-man access procedure.
Two-man rule.
Information security rule
C
The use of a simple code word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:
Code one.
Security alert.
S.O.S.
Duress code.
D
What is the very first criterion in evaluating bids for security services?
Complying with the license criterion.
Complying with the submission deadline.
Complying with the price criterion.
Complying with all the required criteria.
B
An alarm system that is monitored by an outside company to provide electronicprotective services in which they provide the appropriate (response) actions is known as a(n):
Local alarm system.
Central station system.
Proprietary system.
Auxiliary system.
B
There are three basic goals of a physical security program:
(1) To reduce loss through the control of access.
(2) To limit interruptions in operations.
(3) The third and often most neglected goal is …..
A. to create an environment where vendors, employees, and patrons feel safe.
B. to ensure the security force is adequately staffed.
C. to investigate all reports of theft and fraud.
D. to ensure security staff is trained according to federal and state regulations.
A
Which of the following is a secondary function of a Physical Protection System (PPS)?
A. Detection.
B. Delay.
C. Deterrence.
D. Response.
C
What is the definition of design basis threat (DBT)?
A. An estimation of the likelihood of attack.
B. The adversary against which the utility must be protected.
C. Designing a PPS based on historical threat information.
D. Identifying critical assets before implementing security measures.
B
CPTED is considered a vital component of many security planning projects. There are three basic components to CPTED:
(1) Natural Surveillance.
(2) Boundary Definition or Territorial Reinforcement.
(3) The third is …..
A. Natural Measures.
B. Organizational Measures.
C. Natural Access Control.
D. Witness Potential.
C