Questions and CORRECT Answers
What are the 3 Risk Identification elements? - CORRECT ANSWER Assets, exposure, losses
What are 3 factors in a cost/benefit analysis? - CORRECT ANSWER 1) Cost, 2) Reliability -
evidence of the benefits for example benchmarking, 3) Delay, meaning the costs of time to make
it operational.
Basic methods of field work - CORRECT ANSWER Observing, questioning, analyzing,
verifying, investigating, evaluating
6 Processes in BCP process. - CORRECT ANSWER 1) Readiness, 2) prevention, 3) response,
4) recovery/resumption, 5) test and train, 6) evaluation and maintenance.
5 Tasks in BCP process "Readiness". - CORRECT ANSWER 1) Assign accountability, 2)
perform risk assessment, 3) conduct business impact assessment, 4) agree on strategic plans, 5)
crisis management and response team.
3 Tasks in BCP process "Prevention". - CORRECT ANSWER 1) Compliance with corporate
policy, 2) Mitigation strategies, 3) Avoidance, Deterrence and Detection.
7 Tasks in BCP process "Response". - CORRECT ANSWER 1) Potential crisis recognition,
2) notify teams, 3) assess the situation, 4) declare a crisis, 5) execute the plan, 6) communication,
7) resource management.
3 Tasks in BCP process "Recovery/resumption". - CORRECT ANSWER 1) Damage &
impact assessment, 2) resumption of critical & remaining processes, 3) return to normal
operations.
2 Tasks in BCP process "Evaluation & Maintenance". - CORRECT ANSWER 1) Develop
BCP Review Schedule, 2) Develop BCP Maintenance Schedule.
,What are 8 main categories of physical security approaches? - CORRECT ANSWER 1)
CPTED, 2) physical barriers and site hardening, 3) physical entry and access control, 4) security
lighting, 5) IDS, 6) video surveillance, 7) security personnel, 8) security policies and procedures.
What are two ways to defeat a sensor? - CORRECT ANSWER 1) Bypass, 2) Spoof.
What are 5 exterior sensor classifications? - CORRECT ANSWER 1) Passive or active, 2)
covert or visible, 3) line of sight or terrain following, 4) volumetric or line detection, 5)
application
What are 3 clusters of application of exterior sensors? - CORRECT ANSWER 1) Buried line,
2) Fence associated, 3) Freestanding.
What are 4 interior sensor classifications? - CORRECT ANSWER 1) Passive or active, 2)
covert or visible, 3) volumetric or line detection, 4) application
What are 3 clusters of application of interior sensors? - CORRECT ANSWER 1) Boundary-
penetration, 2) Interior motion, 3) Proximity sensor.
What are the 4 objectives of an access control system? - CORRECT ANSWER 1) Permit only
authorized persons to enter and exit, 2) Detect and prevent contraband, 3) Provide information to
facilitate assessment and response, 4) Detect and prevent removal of assets.
Best height and spacing for barriers. - CORRECT ANSWER 30 inches but no more than 38
inches high with spacing between 36 and 48 inches..
Best placement of roof barriers? - CORRECT ANSWER 10-12 inches below roof.
,Each component of the Risk Assessment must be evaluated in one, or both, of 2 ways. -
CORRECT ANSWER 1) Quantitative involves higher consequence of loss assets, 2)
Qualitative involves a lower consequence of loss assets and is less expensive.
What is the definition of a Defensible Space? - CORRECT ANSWER The environment is
compartmentalized into smaller zones associated with CPTED.
Risk Assessments describe risks in what 3 steps? - CORRECT ANSWER 1) Risk analysis, 2)
Risk identification, 3) Risk evaluation.
What are 5 categories of protective barriers? - CORRECT ANSWER 1) Natural which are
mostly passive or non-moveable, 2) structural which can be active or passive for example a
removeable bollard is passive, 3) human, 4) dispensable, which could be active - such as foam,
5) animals.
What are 3 types of key operated locks? - CORRECT ANSWER 1) Disc or wafer tumbler, 2)
pin tumbler, 3) lever
Door lock types - CORRECT ANSWER Mortise, rim-mounted, tubular, cylindrical, unit
What are 3 types of lock attacks? - CORRECT ANSWER 1) Surreptitious like picking, 2)
Force, 3) Impression or try key also known as jingle key.
What are 5 types of attacks on bolts? - CORRECT ANSWER 1) Jimmying, 2) punching, 3)
sawing, 4) peeling and 5) loiding which is inserting something thin between strike and latch bolt.
attacks on cylinders - CORRECT ANSWER pulling, lug pulling, twisting, drilling, punching,
hammering
What are three types of areas alarms are use to protect? - CORRECT ANSWER 1) Perimeter
protection, 2) area/space protection, 3)spot/object protection.
, Example of area/space alarm protection - CORRECT ANSWER Ultrasonic, microwave, PIR
Example of spot/object alarm protection - CORRECT ANSWER proximity detectors,
vibration detectors
2 types of video scanning. - CORRECT ANSWER Raster, digital or progressive
4 stages of a fire - CORRECT ANSWER 1) Ignition, 2) growth, 3) fully developed, 4) decay
4 stages of a project - CORRECT ANSWER 1) Feasibility, 2) Development, 3) Execution, 4)
Close out
Physical security system intend to do what (4+ Ds)? - CORRECT ANSWER Deter, Detect -
includes assess, Delay - includes response, Deny and sometimes Defend/Destroy/Neutralize.
6 phases of a project life cycle - CORRECT ANSWER 1) Planning, 2) Design & Estimation,
3) Procurement, 4) Installation, Operation and Training, 5) Commissioning & Warranty, 6)
Maintenance, Evaluation, Replacement.
What are the 3 determinants for proper lens selection? - CORRECT ANSWER 1) Format size
of imager, 2) Distance from camera to scene which defines focal length, 3) Field of view also
know as focal length.
What are the classes of lighting sources - CORRECT ANSWER Natural & artificial
What are 6 applications of security lighting? - CORRECT ANSWER 1) Continuous which is
most common, 2) Standby, 3) Movable, 4) Emergency, 5) Glare projection, 6) Controlled which
illuminates limited space like roadway.