SOLUTIONS GRADED A+
✔✔6 phases of a project life cycle - ✔✔1) Planning, 2) Design & Estimation, 3)
Procurement, 4) Installation, Operation and Training, 5) Commissioning & Warranty, 6)
Maintenance, Evaluation, Replacement.
✔✔What are the 3 determinants for proper lens selection? - ✔✔1) Format size of
imager, 2) Distance from camera to scene which defines focal length, 3) Field of view
also know as focal length.
✔✔What are the classes of lighting sources - ✔✔Natural & artificial
✔✔What are 6 applications of security lighting? - ✔✔1) Continuous which is most
common, 2) Standby, 3) Movable, 4) Emergency, 5) Glare projection, 6) Controlled
which illuminates limited space like roadway.
✔✔___________ uses an optical path rather than an electrical path for transmission. -
✔✔Fiber optics
✔✔______ make poor detectors but are good at assessment. - ✔✔Humans
✔✔The AC&D system must communicate the following 4 data points: - ✔✔1) Where the
alarm has occurred, 2) What or who caused the alarm, 3) When the alarm happened, 4)
Response required.
✔✔What are 7 types of network topologies? - ✔✔1) Bus or linear, 2) Mesh, 3) Ring, 4)
Star, 5) Fully Connected, 6) Tree, 7) Hybrid for which two common types are Star-Ring
and Star-Bus.
✔✔On graphic displays, no more than ___ windows should be visible at any one time. -
✔✔3
✔✔The physical equipment used to control the movement of people or material into an
area. - ✔✔Entry control
✔✔The process of managing databases or other records & determining the parameters
of authorized entry. - ✔✔Access control
✔✔What are 4 types of access badges used in personnel access control? - ✔✔1) Photo
ID badge, 2) exchange badge, 3) stored-image badge, 4) coded credential.
,✔✔What is the difference between biometric verification and recognition? -
✔✔Verification requires the person to initiate a claim of identity and presents biometric.
A Recognition just identifies person.
✔✔Any item that is prohibited from an area - ✔✔Contraband
✔✔What 2 methods can be used to actively detect metal? - ✔✔1) Continuous wave,
which is no longer available 2) Pulsed field.
✔✔What are 4 examples of the outermost protective layer of a PPS? - ✔✔1) Barriers, 2)
Lighting, 3) Signs, 4) Intrusion Detection.
✔✔Dispensable barriers are generally deployed where? - ✔✔Very close to the asset
being protected.
✔✔__________ follows detection in an effective PPS. - ✔✔Access delay
✔✔What is the key to effective guard use? - ✔✔Training
✔✔What is defined as defeat of the adversary? - ✔✔Neutralization.
✔✔What are the response force strategies? - ✔✔Containment, denial, and assault
✔✔What is a vital part of the response function? - ✔✔Communication.
✔✔What communication systems can provide a very high resistance to radio jamming?
- ✔✔Spread-spectrum systems
✔✔For the maximum psychological effect to be achieved... - ✔✔...the capabilities of the
protection system must be known to the criminal, that is, they must convince the
criminal that the odds of getting caught are high.
✔✔A system in the physical security context is a combination of what 3 parts? - ✔✔1)
People, 2) Procedures, 3) Equipment.
✔✔The three basic parts for determining a Threat Definition are: - ✔✔1) List the
information needed to define the threat, 2) Collect information of the potential threat, 3)
Organize the information to make it usable.
✔✔What are 4 necessary points of information about adversaries? - ✔✔1) Motivation
like ideological, economic, personal, 2) Potential goals based upon targets like theft,
espionage, extortion, kidnapping, etc, 3) Tactics like force, stealth, or deceit 4) Numbers
& capabilities like use of weapons, various tools they may use, etc.
,✔✔Adversaries are characterized in three broad groups: - ✔✔1) Outsiders like
terrorists, criminals, extremists or hackers, 2) Insiders, 3) Outsiders working in collusion
with insiders.
✔✔List the three types of insider threats: - ✔✔1) Passive, 2) Active non-violent, 3)
Active violent.
✔✔True or False: Outsider threats are responsible for the majority of security breaches
in both physical and computer security systems. - ✔✔False. Insider threats are
responsible for the majority of security breaches in both physical and computer security
systems.
✔✔What are three characteristics that an insider threat must have? - ✔✔1) System
knowledge that can be used to their advantage 2) Authorized access to the facility,
assets, or PPS without raising suspicions of others 3) Opportunity to choose the best
time to commit an act.
✔✔List 5 sources for the collection of threat information: - ✔✔1) Intelligence sources
like networking with law enforcement or other related services, 2) Crime analysis,
studies, 3) Professional organizations & services, 4) Published literature. 5)
Government directives and legislation.
✔✔What is the Security Principle regarding Threat Definition? - ✔✔A facility PPS is
designed based on the maximum credible threat to the facility.
✔✔What are three types of assets or targets? - ✔✔1) Valuable, 2) Required for
business continuity, 3) Difficult to replace.
✔✔True or False: The ease or difficulty of protecting against a particular threat are
considered BEFORE the items of Target Identification have been identified. - ✔✔False:
The ease or difficulty of protecting against a particular threat are considered AFTER the
items of Target Identification have been identified.
✔✔List at least four Undesirable Consequences to an inadequate PPS - ✔✔1) Loss of
life, 2) Theft of material or information, 3) Environmental damage due to release of
hazardous material by theft or sabotage, 4) Interruption of critical utilities or
communications, 5) Degraded business operations, 6) Workplace violence, extortion,
blackmail, 7) Building collapse, 8) Damage to reputation, 9) Legal Liability.
✔✔Locations in a facility containing equipment to be protected against are called
______ _______ - ✔✔vital areas
✔✔Priorities of targets are based on... - ✔✔Analysis of the consequence of the loss and
threat.
, ✔✔The strongest reason for a criminal to lose desire to break-in, etc. is... - ✔✔...the
threat of getting caught.
✔✔What are the two ways to prevent theft and sabotage? - ✔✔1) Deterring the
adversary, 2) Defeating the adversary.
✔✔Detection is the _________ of an adversary action. - ✔✔discovery
✔✔A PPS system works best if what two conditions are met? - ✔✔1) Detection is as far
from the target as possible, 2) Delays are in place near the target.
✔✔______________ is the process of determining whether the source of the alarm is
due to an attack or a nuisance alarm. - ✔✔Assessment
✔✔Detection without ____________ is not detection. - ✔✔assessment
✔✔True or False: Entry control is part of detection. - ✔✔True
✔✔What is a measure of entry control? - ✔✔Throughput (number of authorized people
allowed access per until time)
✔✔A False Acceptance Rate is ... - ✔✔...the rate at which false identities or credentials
are allowed entry.
✔✔The frequency of denying access to authorized people is the .... - ✔✔...false
rejection rate.
✔✔The probability of detection ____________ as the time before assessment
___________. - ✔✔decreases; increases
✔✔Any alarm not caused by an intrusion is a _____ _____. - ✔✔nuisance alarm.
✔✔Because not all alarms are caused by intrusion, what is necessary? -
✔✔Assessment.
✔✔Animals, birds, trees, rain, lightning, blowing debris, etc are all common sources of...
- ✔✔nuisance alarms
✔✔What is an alarm called when the source is unknown? - ✔✔False alarm. It could be
from equipment and is a form of nuisance alarms.