Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
Unit 3 - Physical Security
What is "physical security planning"? Is is a recognized security process that is followed will result in the selection of _______ based on appropriateness. |
Countermeasures
p. 76 |
|
Unit 3 - Physical Security
Effective secruity lighting acts as a _______ to intruders. |
Deterrent
p. 78 |
|
Unit 3 - Physical Security
Polycardonate plastic is _______ and _______ resistive. |
Bullets and Burglar/vandal
p. 79 |
|
Unit 3 - Physical Security
There are three components to an intrusion detection system: detectors/sensors, system controls and _______ devices. |
System monitoring
p. 81 |
|
Unit 3 - Physical Security
Microwave detectors use high-frequency sound waves to establish a protected area. Ture or False |
True
p. 80 |
|
Unit 3 - Physical Security
Deadbolt locks should have a minimum of a 1/2" throw. True or False |
False
p. 82 |
|
Unit 3 - Physical Security
Card access systems permit accountability. True or False |
True
p. 81 |
|
Unit 3 - Physical Security
The most commonly used security fencing material is: a. Barbed wire b. Barbed tape c. Chain-link d. Welded wire mesh |
c. Chain-link
p. 85 |
|
Unit 3 - Physical Security
The minimum height of a security fence should be: a. 7 feet b. 6 feet c. 8 feet d. 9 feet |
a. 7 feet
p. 85 |
|
Unit 3 - Physical Security
Which of the following types of lighting are only lit on a as-required basis? a. Continuous b. Standby c. Moveable d. Emergancy |
b. Standby
p. 78 |
|
Unit 3 - Alarm Systems
In many cases, _______ _______ form the backbone of a facility's physical protection program. a. Alarm systems b. Covert surveillance c. Report writting d. Physical force |
a. Alarm systems.
P. 87 |
|
Unit 3 - Alarm Systems
The primary purpose of an alarm system is: a. To conduct area surveillance b. To serve as a physical barrier c. To provide early warning of an intruder d. Lower insurance rates |
c. To provide early warning of an intruder
P. 87 |
|
Unit 3 - Alarm Syaytems
According to the text material, the most effective security is provided with a: a. Technical approach b. Layered approach c. Large security force d. Key and lock program |
b. Layered approach
p. 87 |
|
Unit 3 - Alarm Systems
In more sophisticated alarm system, sensore are interfaced with electronic entry-contorl devices, CCTV, alarm reporting displays (both visual and audible) and _______ ________. a. Police patrols b. Aerial units c. Sniper teams d. Security lighting |
d. Security lighting
p. 87 |
|
Unit 3- Alarm Sytems
How many different types of alarm monitoring were examined in the text? a. Two b. Three c. Four d. Six |
c. Four
p. 87 - 88 |
|
Unit 3- Alarm Sytems
Which of the following is not a type of alarm monitoring? a. Central station b. Direct fire and police c. Satellite d. Proprietary |
c. Satellite
p. 87 -88 |
|
Unit 3- Alarm Sytems
Logging decices are used for: a. Recording system activities and faults b. Controlling CCTV cameras c. Recording time and attendance of security staff d. Access control to computer networks |
a. Recording system activities and faults
p. 88 |
|
Unit 3- Alarm Sytems
Alarm printers are typically: a. Of the color laser types b. Of the high-speed, continuous feed type c. Black and white and medium speed d. Eteremely expensive |
b. Of the high-speed, continuous feed type
P. 88 |
|
Unit 3- Alarm Sytems
A glass-break sensor is an example of: a. A permeter sensor b. A spot sensor c. An area sensor d. A volumetric device |
a. A permeter sensor
p. 88 |
|
Unit 3- Alarm Sytems
A duress alarm is also sometimes called: a. A reset button b. A panic button c. An activation switch d. A scilet partner |
b. A panic button
p. 89 |
|
Unit 3- Central Alarms
The main door to the dispatch center should be unlocked at all times. True or False |
False
p. 93 |
|
Unit 3- Central Alarms
What is the minimium number of operators suggested by the Underwritters' Labs and the NBFAA for any dispatch center? |
Two
p. 93 |
|
Unit 3- Central Alarms
The two most important tools in a dispatch center are the _______ and the _______. |
Telephone and Radio
p. 93 |
|
Unit 3- Central Alarms
All types of alarm signals are collected by the reciever int he dispatch center. True or False |
True
p. 93 |
|
Unit 3- Central Alarms
The time clock was replaced by the ________ in modern dispatch centers. |
Logging software
p. 93-94 |
|
Unit 3- Central Alarms
Some call boxes are equipped with a red light? True or False |
False
p. 94 |
|
Unit 3- Central Alarms
The _______ is a special telephone that connects the dispatch center with other agencies. |
Hotline
p. 94 |
|
Unit 3- Central Alarms
The access card reader can be remotely controlled by the dipatch center. True or False |
False
p. 94 |
|
Unit 3- Central Alarms
Name two orginizations that provide training for dispatchers. |
APCO and NENA
p. 94 |
|
Unit 3- Central Alarms
The _______ is at the heart of any security agency. |
Control center
p. 93 |
|
Unit 3- Access Control
The point of entry where security is posted to control access is often referred to as a: a. Storgae yard b. Lunch room c. Ckeckpoint d. Physical security |
c. Checkpoint
p. 96 |
|
Unit 3- Access Control
The policy for granting access should be kept: a. In a secure file cabinet inaccessible by security personnel b. In the site post orders c. In a fire resistant waste receptacle d. Posted in the facility lounge |
b. In the site post orders
p. 97 - 98 |
|
Unit 3- Access Control
The use of _______ and watermarking make the replication of company identification more difficult. |
Holograms
p. 97 |
|
Unit 3- Access Control
Signing in a security _______ at the front desk of a facility is a common form of controlling access. a. Control b. Guard c. Garage d. Register |
d. Register
p. 97 |
|
Unit 3- Access Control
Access control records should be kept: a. Until end of shift, then distroyed b. 7 years c. A period of time determined by your employer or the client d. 30 days |
c. A period determined by your employer or the client.
p. 97 |
|
Unit 3- Access Control
Advising the person that he or she has been denied access is an act best accomplished with diplomacy and _______ |
Respect
p. 97 |
|
Unit 3- Access Control
Besides its use as an audit trail, the register can be used by _______ in a facility emergency as a muster of who is inside. a. Emergency services (fire, EMS) b. Security management c. Facility management d. The criminal population |
a. Emergency services (fire, EMS)
p. 97 |
|
Unit 3- Access Control
The three most popular access card techologies are _______, proximity and wiegand cards. |
Magnetic strip
p. 99 |
|
Unit 3- Access Control
________ of regular occupants in a facility by the security officer is considered a very reliable form of controlling access. a. Arrest b. Recognition c. Search d. Control |
b. Recognition
p. 96 |
|
Unit 3- Access Control
_______ recongination technology is intergrated in CCTV systems to identify individuals who are wanted by law enforcement. |
Facial
p. 100 |