Questions and CORRECT Answers
Ward - CORRECT ANSWER Prevents the use of an incorrect key entering or turning a lock
mechanism.
Physical Security - CORRECT ANSWER The part of security concerned with physical
measures that have been designed to protect people, equipment, materials, and documents from
damage, loss, or unauthorized access.
Procedure - CORRECT ANSWER A detailed instruction for carrying out security policies,
often presented as lists or steps to take.
Asset - CORRECT ANSWER Anything of value to the organization. It can have tangible
and/or intangible properties such as physical objects, people, or information.
Event - CORRECT ANSWER A noteworthy happening such as a security incident, safety
situation, medical emergency, or similar occurrence.
Adversary - CORRECT ANSWER An individual who has the intent to harm a person or
facility. There are two types; an outsider and an insider.
Neutralize - CORRECT ANSWER Cease the actions of an adversary.
outer layer - CORRECT ANSWER The outer layer may consist of barriers, protective
lighting, signage, and intrusion detection systems. The use of control measures at the perimeter
(outer layer) typically defines the property boundary and channel both people and vehicles to
designated access points.
middle layer - CORRECT ANSWER The middle layer comprises the exterior of the buildings
on the site and may include doors, windows, building facade, walls, and other openings such as
ventilation intakes and skylights
, inner layers - CORRECT ANSWER The inner layers often consist of window and door
protection devices, barriers and reinforced walls/doors, access control devices, intrusion
detection systems, video surveillance, protective lighting, and signage. Typically, the highest
value assets of an organization are located within the inner-most layer of security protection.
Barrier - CORRECT ANSWER A natural or manmade object designed to restrict or impede
movement of animals, people, or vehicles and/or materials.
Access Control - CORRECT ANSWER The process of implementing perimeters to control
and document people, vehicles, and materials for a protected area.
Video Surveillance - CORRECT ANSWER A surveillance system that captures visual images
and then transmits the images to monitors, recorders and control equipment. Includes CCTV
(Closed circuit television) and network-based video systems.
Design Basis Threat - CORRECT ANSWER The threat (tactics, weapons, tools, explosives,
or expertise) against which assets must be protected. It is the design of the protective measures
and procedures to prevent the threat from being successful.
Concept of design - CORRECT ANSWER Facility layout and utilization
Protection strategy
Structural and electronic security systems
Security officer operations and other human support
Physical security program management
Facility - CORRECT ANSWER One or more buildings that are related by function and
location to form an operating entity.
Risk Assessment - CORRECT ANSWER The process of assessing security-related risk from
internal and external threats to the organization, its people, or its assets.