Test Flash Cards 5

(42 cards)

1
Q

What is the purpose of a security survey?

A

Determine and document the current security posture
Identify deficiencies and excesses in existing security measures
Compare the current posture with a determination of the appropriate level of security or protection needed
Recommend improvements in the overall situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are five criteria of good physical security survey reports?

A
  1. Accuracy
  2. Clarity
  3. Conciseness
  4. Timeliness
  5. Slant or pitch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two foundational principles of physical security design?

A
  1. Four D’s
  2. Layered security or defense-in-depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Four D’s?

A
  1. Deter
  2. Detect
  3. Delay
  4. Deny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a defense-in-depth approach?

A

An adversary must avoid or defeat a number of protective devices or features in sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is CPTED?

A

CPTED, or crime prevention through environmental design, is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the design concept?

A

The design concept incorporates the basis of design; documents the findings; conclusions, and recommendations from any initial surveys, and is the first opportunity to document the project’s design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is included in the typical construction documents (CD) phase package?

A

CD drawings
Specifications
Bill of quantities
Refined system budgets
Contract terms and conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three types of cost estimates?

A
  1. Budgetary estimates
  2. Preliminary design estimates
  3. Final design estimates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three forms of security systems procurement?

A
  1. Sole source
  2. Request for proposal (RFP)
  3. Invitation to bid (IFB)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are four constraints of all security projects?

A
  1. Scope
  2. Schedule
  3. Budget
  4. Quality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three major security purposes of lighting?

A
  1. To create a psychological deterrent
  2. To enable detection
  3. To enhance the capabilities of video surveillance systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four components of lighting systems?

A
  1. Lamp
  2. Luminaire
  3. Mounting hardware
  4. Electric power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is intrusion detection?

A

The process of detecting a person or vehicle attempting to gain unauthorized entry into an area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the basic building blocks of an intrusion detection system?

A

Sensors!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When conducting a security survey, which of the following should be a focus of the assessment?
1. Assets
2. Vulnerabilities
3. Threats
4. Consequences

A
  1. Vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This process requires consideration of the threat type, tactics, mode of operations, capabilities, threat level, and likelihood of occurrence. Threats come from malevolent humans, not accidental (safety-related) events. This process is BEST defined as which of the following?
1. Loss Event Profiles
2. Adversarial Sequence Diagrams
3. Design Basis Threat
4. Threat Risk Assessment

A
  1. Design Basis Threat
18
Q

In the design of a new high-rise structure and considering the life-safety aspects of the building, which of the following should rank as a first priority?
1. CPTED principles in the building design
2. Controlled access and surveillance for legitimate users
3. Fire detection, confinement, extinguishment, evacuation, and escape
4. Adversary deterrence, detection, denial, delay, and defense

A
  1. Fire detection, confinement, extinguishment, evacuation, and escape
19
Q

The property owners in a 20-unit townhouse complex implemented signage and designed the landscaping to deter unwanted activity and trespassing. They also designed the area to provide better sight-lines of the children’s playground from the inside of the residences. They intend to establish a sense of ownership, responsibility, and accountability with property owners, to increase vigilance in identifying trespassers. Which of the following CPTED terms BEST meets this community’s intent?
1. Target Attractiveness
2. Natural Territorial Reinforcement
3. Random Activity Theory
4. Neighborhood Watch

A
  1. Natural Territorial Reinforcement
20
Q

When designing a new multi-level parking garage, to increase visibility, both interior-to-exterior and exterior-to-interior to facilitate witness potential, and make the likely adversary fear exposure, is described in CPTED as which of the following?
1. Natural surveillance
2. Natural access control
3. Natural territorial reinforcement
4. Compartmentalizing

A
  1. Natural surveillance
21
Q

CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means. CPTED is a crime prevention theory grounded in environmental criminology. CPTED primarily focuses on which of the following PPS principles?
1. Deterrence
2. Detection
3. Delay
4. Response

22
Q

Which of the following lighting systems have the BEST color rendition for night lighting?
1. Mercury vapor
2. Metal halide
3. Low pressure sodium
4. High pressure sodium

23
Q

A security practitioner is designing a PPS for a hospital parking garage and is considering security lighting to enhance the CCV surveillance and monitoring. What is the BEST type of lighting to apply?
1. Metal Halide
2. Mercury vapor
3. LED
4. High Pressure Sodium

24
Q

This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this?
1. Passive infrared
2. Active infrared
3. Actie microwave
4. Passive microwave

A
  1. Passive infrared
25
This detector can use buried cable or transmitting and receiving signals relying on consistent reception of transmitted or reflected energy. When energy levels change due to a reflection or deflection, an alarm is transmitted. This is called ______ detection. 1. Capacitance 2. Microwave 3. Infrared 4. Vibration
2. Microwave
26
Which of the following statements BEST describes a CCV camera's "field of view"? 1. The location or area intended to be observed 2. The area visible through the camera lens 3. The view from the camera that is recorded 4. The function of a CCV camera which best controls color rendition
2. The area visible through the camera lens
27
Which of the following BEST fits this description of this video surveillance component: "This determines the clarity and size of the field of view." 1. The camera 2. The monitor 3. The recording equipment 4. The lens
4. The lens
28
Which of the following statements is TRUE? 1. Resolution relates to the length of time a recorded video is stored 2. Compression (codec) relates to picture clarity and the ability to distinguish key features 3. When selecting a video surveillance system, it is important to use a systems approach 4. When selecting a video surveillance system, it is important to use a components approach
3. When selecting a video surveillance system, it is important to use a systems approach
29
What characteristics drive the design of alarm communication systems? Select all that apply. 1. Ease of system use by personnel 2. Quantity of alarm data 3. High reliability needed for the system 4. Speed at which data must be delivered
2. Quantity of alarm data 3. High reliability needed for the system 4. Speed at which data must be delivered
30
Project integration management is:
Project plan development Project plan execution Integrated change control
31
Project quality management is:
Quality planning Quality assurance Quality control
32
Project human resource management is:
Organizational planning Staff acquisition Team development
33
Project communications management is:
Communications planning Information distribution Performance reporting Administrative closure
34
Project risk management is:
Risk management planning Risk identification Qualitative and quantitative risk analysis Risk response planning Risk monitoring and control
35
Project procurement management is:
Procurement and solicitation planning Solicitation Source selection Contract administration Contract closeout
36
What are the typical project constraints? Select all that apply. 1. Scope 2. schedule 3. Budget 4. Quality 5. Staffing
1. Scope 2. schedule 3. Budget 4. Quality
37
Which of the following are outcomes of the planning phase? Select all that apply 1. A set of security requirements or objectives 2. A risk assessment and risk mitigation plans 3. Procurement lists and purchase orders 4. The business case for the new or upgraded security systems.
1. A set of security requirements or objectives 2. A risk assessment and risk mitigation plans 4. The business case for the new or upgraded security systems
38
These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called: 1. Details diagrams 2. Plan drawings 3. Elevation drawings 4. Riser diagrams
4. Riser diagrams
39
When in the procurement stage, an invitation to bid (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. this is BEST described as: 1. Design estimation 2. Design specification 3. Design planning 4. Design evaluation
2. Design specification
40
"This process corrects faults and returns the system to operation after a hardware or software component fails." Which of the following terms BEST meets this description? 1. Remedial maintenance 2. Preventive maintenance 3. Emergency maintenance 4. Commissioned maintenance
1. Remedial maintenance
41
Which of the following are justifications for equipment replacement? Select all that apply. 1. Cost savings because new equipment is on sale 2. New features to improve security 3. New technology to reduce manpower 4. Equipment software is obsolete
2. New features to improve security 3. New technology to reduce manpower 4. Equipment software is obsolete
42