• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/194

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

194 Cards in this Set

  • Front
  • Back

The purpose of physical security is to protect assets, whether they are?

ANS-


-tangible,


-intangible, or


-mixed and


-whether they take the form of people, property, or information.

To manage risk effectively, a security professional would eliminate or reduce the ...........................leading to loss?

ANS- total number of incidents

A goal of risk management is to manage loss.................. In fact, many professionals believe that “risk is the most significant factor that drives the deployment of security.

ANS- effectively at the least cost.

The solution is to develop a comprehensive assets protection strategy based on a?

ANS- strategic risk management approach.

A strategy should articulate—to all involved ————(Peterson, 2009).

ANS-


-what is being protected,


-why it is being protected,


-how it is being protected

The National Infrastructure Protection Center (2002) defines risk management as?

ANS- “a systematic and analytical process by which an organization identifies, reduces and controls its potential risks and losses.”

.......................should be a strong underlying consideration, regardless of whether a security professional is conducting an assessment, crafting a security program for an organization, building security into a facility, or drawing up a physical security system design

ANS- Risk management

National Infrastructure Protection Center (2002) further states that risk management?

ANS-


• offers a rational and defendable method for making decisions about expenditure of scarce resources and the selection of cost-effective countermeasures to protect valuable assets,


• improves the success rate of an organization’s security efforts, and


• helps security professionals and key decision makers answer the question “how much security is enough?”

Risk management should be a strong underlying consideration, regardless of whether a security professional is?

ANS-


-conducting an assessment,


-crafting a security program for an organization,


-building security into a facility,


-drawing up a physical security system design

The Risk management process begins by establishing the context of the risk through?

ANS-


-communication and consultation with stakeholders and then


-conducting a comprehensive risk assessment

The first step in risk assessment is?

ANS- identification and valuation of assets

The first step in establishing [any] effective [assets protection] program involves?

ANS- identifying the business’s assets.

No effective security program can be implemented without a thorough understanding ........of what is being protected—or should be protected.

ANS- on the part of both the asset owner and the security professional

All types of assets—————should be considered and incorporated into the risk assessment process

ANS-


-tangible,


-intangible,


-mixed

Too often, asset owners and security professionals focus exclusively on?

ANS-


-tangible assets or on


-those that appear on the accountant’s balance sheet

Security professionals and planners must incorporate the protection of ............into their facility and security systems designs.

ANS- intangible assets

Enterprises face a wide variety of threats, which fall into three categories namely:

ANS-


-intentional,


-natural,


-inadvertent.

Physical security planning should adopt an——————in other words, a balanced approach that looks at the big picture and identifies that in the context of risk, a hazard is a contributing factor to a peril.

ANS- all hazards perspective

Long-term assets protection strategies, however, must be based on.................threat assessment. According to Winkler (1997, p. 37)

ANS-


-a realistic,


-full scope


-balanced

Threat is an essential factor in your risk reduction formula, and you must consider it carefully. If you don’t, you’ll simply be flying blind when it comes to.........?

ANS- prioritizing countermeasures....

Vulnerability is commonly viewed as?

ANS-


-a security weakness,


-gaps in an asset’s protection or


-problem

One definition of.......... is “a weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss event”

ANS- vulnerability

vulnerability is a characteristic of the organization or facility. As such, it is generally something over which the organization can exercise at least....?

ANS- some degree of control.

Threats, on the other hand, are usually............. of the organization

ANS- outside the control

Risk analysis step of the security risk management process has two important roles namely:

ANS-


1)it introduces the concept of the impact of a loss event


2)to place the identified risks in some sort of priority or sequence of importance

The impact factor deals with the .............of the situation if something does occur

ANS- severity

The second role for risk analysis is to place the identified risks in some sort of priority or sequence of importance. This priority assists decision makers in?

ANS-


-determining which risks to address first or


-where to allocate resources in the most effective manner.

The priority may be organized by category :

ANS-


-risk of physical damage, risks to people, mission or operational risk, infrastructure risk, or


-level of projected mitigation cost, monetary value or suggested timeframe to address

The process of identifying potential areas of loss, and implementing countermeasures to mitigate the probability of the loss?

ANS- Risk analysis

Many corporate executives only want to hear about likely risks, but it is also important to consider....?

ANS- low-probability/high-consequence risks

Examples of low-probability/high-consequence risks are?

ANS-


-terrorist attacks,


-catastrophic workplace violence incidents, and


-major natural disasters

Again, the objective of a comprehensive assets protection strategy is to find the right balance between a focus on?

ANS- high- probability risks and low-probability (but high-consequence) risks

This step of protective measures includes the following tasks:

ANS-


-Select


-Test


-Implement


-Train

The National Infrastructure Protection Center (2002) notes, “Whereas a single countermeasure may seem intuitive to an analyst or security manager, alternative countermeasures should be identified and evaluated to select those which offer an .......................Options or option packages may be arranged by cost, urgency, convenience,.

ANS- optimal trade-off between risk reduction and cost.”

countermeasures should be identified and evaluated. Options or option packages may be arranged by....?

ANS-


-cost,


-urgency,


-convenience,


-aesthetics or some other factor

In many circumstances, recommended hardware, software, or procedures will have to be tested against several questions, such as these:

ANS-


— Does the solution operate as expected in this specific environment?


— Does the integration of different components of the overall system with one another seem to be successful?


— Is the solution operating as expected with other systems in the facility?


— Is the solution having the desired effect in terms of risk reduction?


— Are people (security staff, employees, and facility users) adapting well to the new solution?


— Can the short-term and long-term costs of operating the system be projected accurately

Factors to consider when implementing a solution include?

ANS-


1)notification of employees (and visitors if applicable),


2)cost of installation,


3)possible disruption to facilities or access to them,


4)possible downtime or partial facility closures,


5)the need for signage to support the new solution,


6)facility access for an installation team,


7)necessary changes to policies and procedures, and


8)the time needed for staff and employees to acclimate to the solution.

This training must be factored into the cost of the solution in terms of....?

ANS- time and money

Risk management must be recognized as............. that must regularly reevaluate changes in assets, threats, vulnerabilities, and loss event impact.

ANS- a cyclical process

Although other factors (such as budgets, culture, and politics) also matter, the primary basis of an organization’s assets protection strategy should always be.....?

ANS- risk.

Several concepts support risk mitigation strategies namely:

ANS-


1)the four Ds,


2)the five avenues to address risk, and


3)layered security.

This is a classic principle in crime prevention, and it applies equally well to almost any aspect of assets protection or security risk management?

ANS- The four Ds

The four Ds are?

ANS-


-deter,


-detect,


-delay, and


-deny.

The second objective, should deterrence fail, is to detect the attack, event, or situation. This can be done in a variety of ways?

ANS-


1)traditionally using surveillance and intrusion detection systems,


2)human observation, or


3)management system that is located on the outermost defensive layer to provide the earliest detection

Once an attack or attempt is in progress, security professionals want to delay the perpetrators (or the situation) enough either to?

ANS-


1)convince them to give up the attempt or


2)to allow an appropriate security, law enforcement, or other emergency response to the scene.

The ultimate objective is to .......... the potential adversary access to the target (the asset or facility).

ANS- deny

Denial is typically achieved through?

ANS-


1)access controls and other


2)physical, personnel-based, or technical security measures.

Five distinct avenues can be followed to address identified risks to various assets. The five avenues are?

ANS-


1)risk avoidance,


2)risk transfer,


3)risk spreading,


4)risk reduction, and


5)risk acceptance

Physical security is most closely associated with the avenue of?

ANS- risk reduction.

It simply involves removing any opportunity for the risk to cause a loss event?

ANS- Risk avoidance

This very effective practice avoids placing all or most of an organization’s assets (or assets under a particular category) in a single location or making them subject to a single threat event

ANS- Risk spreading

The typical examples of risk transfer are?

ANS-


1)the purchase of insurance


2) the act of making oneself a less attractive target than other potential targets (such as neighboring facilities).


3)Risks transferred to suppliers, vendors, or others through contract clauses or other formal agreements

Involves any security measures or other actions that would reduce the risk to assets?

ANS- Risk reduction

The most common and direct means of reducing risk is to?

ANS- decrease vulnerability

Among common risk reduction mechanisms are?

ANS-


1) decreasing vulnerability


2) security measures,


3)policy enforcement,


4)employee education and awareness.

After all risk spreading, risk transfer, and risk reduction measures have been implemented, some risk will remain since it is virtually impossible to eliminate all risk (except as discussed under risk avoidance). This remaining risk is termed?

ANS- residual risk.

One example of risk acceptance is the setting of........................... In addition, some organizations have established a formal process for risk acceptance.

ANS- shrinkage tolerance levels in the retail industry.

The principle of layered security, also known as................. applies to physical, logical, and converged environments.

ANS- defense-in-depth,

The principle of layered security, also known as defense-in-depth, applies to?

ANS-


-physical,


-logical, and


-converged environments.

physical security approach that requires a criminal to penetrate or overcome a series of security layers before reaching the target.

ANS- Layered security

There is no room for complacency in the field of security risk management. This field involves constantly?

ANS-


-monitoring,


-evaluating,


-advising on, and


-adjusting the risk mitigation strategy and its components.

The physical security program should be designed to be as .................... as possible, considering the dynamic nature of today’s global business and organizational environment.

ANS- scalable and agile

The mitigation measures strategy consists of a suite of solutions including such elements as the following:

ANS-


• physical (structural) security (barriers, locks, access control, etc.)


• electronic security systems


• security officers


• policy and procedures/business practices


• employee training and awareness


• layout, design, and architecture and engineering


• CPTED (crime prevention through environmental design)


• contracts and clauses


• legal and financial posturing


• insurance


• personnel security


• information security (IT and non-IT)


• travel security


• liaison and relationships


• business continuity and crisis preparedness

At the most basic level, the purpose of physical security is to protect assets, whether they are tangible, intangible, or mixed and whether they take the form of?

ANS- people, property, or information

That part of security concerned with physical measures designed to safeguard people; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident.

ANS- Physical security

Physical security measures aim to either prevent a................... that can be inflicted should an incident occur.

ANS-


-direct assault on premises or


-reduce the potential damage and injuries

Finally, the Facilities Physical Security Measures Guideline (2009, p. 3) defines a physical security measure as?

ANS- a “device, system, or practice of a tangible nature designed to protect people and prevent damage to, loss of, or unauthorized access to assets.

Physical security measures must be considered in the context of their ability to?

ANS-


1)deter an adversary,


2)detect an attack,


3)delay an attack, and


4)deny an adversary access to the target

In some locations these measures may already be in place to some degree. However, external and internal threats to organisations (and their staff) will constantly evolve and so?

ANS- all procedures and technology should be kept under constant review

For most organisations the recommended response will involve a sensible mix of?

ANS- general good housekeeping alongside appropriate investments in CCTV, intruder alarms and lighting that deter as well as detect

The purpose of physical security is to protect assets, whether they are?

ANS-


-tangible,


-intangible, or


-mixed and


-whether they take the form of people, property, or information.

That part of security concerned with physical measures designed to safeguard people; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against a security incident.

ANS- physical security

The Facilities Physical Security Measures Guideline (2009, p. 3) defines a physical security measure as a?

ANS- “device, system, or practice of a tangible nature designed to protect people and prevent damage to, loss of, or unauthorized access to assets.”

Physical security measures must be considered in the context of their ability to?

ANS-


-deter an adversary,


-detect an attack,


-delay an attack, and


-deny an adversary access to the target.

An effective physical security strategy employs four basic functions in an orchestrated and tailored manner. These functions are:

ANS-


• controlling access


• observing an area, situation, or event


• detecting events


• responding to situations

Relates to any technique used to limit or otherwise manage access to an area, facility, compound, system, person, or other asset ?

ANS- Controlling access

....................is necessary to detect an approaching threat (such as an intruder or a storm), characterize the threat, aid in formulating a response, and assist in investigative efforts after an incident or event.

ANS- Observation

This function works in close partnership with the observation function to identify an event (or impending event) and provide timely and appropriate notification.

ANS- Detecting events

The effort to neutralize, contain, or mitigate an event. It may also include an assessment that the event does not require immediate action.

ANS- Responding

For every specific project, security professionals must consider all potentially applicable measures as part of their overall protection strategy—and view them in terms of their contribution to ?

ANS-


-deterrence,


-detection,


-delay, and


-denial.

The functions and components of physical security may be found in any of the following formats:

ANS-


-structural,


-electronic or


-human.

The functions and components of physical security may be found in any of the following formats: structural, electronic or human. Structural components are?

ANS-

The functions and components of physical security may be found in any of the following formats: structural, electronic or human. Structural components are?

ANS-


-Barriers


-Fencing


-Bollards


-Terrain


-Locks


-Design, architecture, engineering


-CPTED


-Landscaping


-Lighting


-Glass treatment

human barrier might be a?

ANS-


-riot control line or


-human barricade

Under fencing Alternatives to standard chain link fencing should be considered according to the site’s?

ANS-


-purpose,


-application,


-setting,


-security objectives

Increasingly,.............. fencing is being used in low- to moderate-risk situations.

ANS- decorative

These devices may be fixed or active (e.g., pop-up) Some are solely functional; others blend security with architectural attractiveness.

ANS- Bollards.

Natural barriers may be highly effective in certain applications. Terrain barriers can be ?

ANS -


-preexisting (completely natural) or


-constructed (e.g., a berm built up intentionally).

Locking systems should be appropriate to the doors and other hardware involved, as well as the setting and security objectives. True or false?

ANS- True

Often one finds a mismatch between a door system and the corresponding locking system. Such a mismatch can?

ANS-


-reduce decrease security,


-increase costs, and


-represent a maintenance challenge.

If there are windows on either side of the door, an effective lock to use is a?

ANS- double- cylinder keyed deadbolt.

A wide array of structural security measures can be built into facilities simply by exploiting?

ANS-


-design features and


-applying architecture and engineering techniques

An element of CPTED, landscaping can be used as an effective tool in deterrence, detection, and delay of intruders. Landscaping also assists in?

ANS-


-guiding pedestrian traffic


-indicating the demarcation between public, semi-private, and private spaces within a facility

Both security and nonsecurity lighting should be considered in terms of their effect on ?

ANS-


-deterrence, detection, and delay, as well as


-support for observation and security response

Depending on the security objective such as.............. a variety of glass treatments should be considered.

ANS- blast mitigation

These include films, glazing, tinting, and the type of glass itself?

ANS- Glass treatment

window treatments include ?

ANS-


-blast curtains,


-blinds, and


-meshes

Although it is listed under electronic components, surveillance can also be?

ANS- natural

electronic surveillance is a key element of many security strategies, but it must be viewed as more than just cameras. Other considerations include?

ANS-


-power,


-field of view,


-getting the output where it needs to be,


-camera control,


-analytics,


-storage,


-maintenance, and


-scalability.

Like surveillance, access control is typically thought of as electronic, but it may also be ?

ANS-


-natural,


-structural,


-human, or


-mixed/hybrid.

Some common electronic access control elements are?

ANS-


-card readers,


-key pads,


-biometric systems,

Another key element of most electronic access control systems is?

ANS-


-an access database and


-a mechanism for communications between the reader, database (whether local or remote), and locking device.

........................are important considerations in electronic access control systems.

ANS-


-Maintenance,


-database updates,


-configuration, and


-scalability

........................are important considerations in electronic access control systems.

ANS-


-Maintenance,


-database updates,


-configuration, and


-scalability

An intrusion detection system (IDS) generally includes?

ANS-


-sensors,


-alarms or annunciators, and


-a communications or transmission mechanism.

It is important to match IDS elements to the ?

ANS-


-purpose of the system,


-type of facility or space being protected, and


-surrounding environment.

.....................are a significant issue in IDS operation.

ANS- False positives and false negatives

Poor .................can sometimes render a system completely ineffective.

ANS- initial design or installation

Communications layouts should not only meet normal operational needs but also consider the impact of ?

ANS-


-power outages


-telecommunications outages,


-IT network downtime,


-competing users, and


-other factors that could adversely affect communications abilities for both people and electronic systems.

A security officer force must be carefully crafted to ensure ?

ANS- effectiveness and efficiency

Key planning factors for security officer force include ?

ANS-


-staffing levels,


-officer selection,


-training,


-equipment,


-post orders,


-specific officer functions,


-quality control,


-quality assurance, and


-supervision

In many organizations, security responsibilities are not limited to security officers and staff members. Other departments e.g., ..........................may play a large or small role in the protection strategy, and individual employees throughout the organization may be assigned security duties in addition to their primary work.

ANS-


-facilities,


-maintenance,


-reception,


-legal,


-risk management, and


-IT

Both written logs and automated systems are used in..............................., which is usually a part of the security officer or reception operation.

ANS- Visitor management/control

In today’s environment, automated systems are much more effective and can be integrated with other systems, such as?

ANS-


-incident management,


-access control, and


-investigations.

.............................is a key process that should not be neglected or left as an afterthought in a comprehensive physical security strategy.

ANS- Visitor management

The security operations center strategy is an important part of any physical security planning process since it affects and is affected by all other elements of the plan:

ANS-


-structural measures,


-electronic systems, and


-the human element.

These hubs for security-related information are also called :

ANS- control centers and fusion centers

These hubs for security-related information are also called :

ANS- control centers and fusion centers


particularly concerned with the identification and correction of any interaction or interface problems between components or subsystems and the optimization of the components so as to give maximum performance of the total system.

ANS- systems integration

The.................. forms the basis for the concept of integrated security and protection strategies

ANS- systems approach

All the following levels of integration are highly relevant to the security profession and the development of physical security strategies.

ANS-


• integrated electronic security systems


• integrated physical security elements


• integrated security programs


• integration in enterprise risk management

The development of a new security system, or the evaluation of an existing system, involves the methodical solution of a complex systems engineering problem. The following must be done.

ANS-


-objectives must be specified.


-a solution must be developed.


-the validity of the solution must be verified.

It is not uncommon, even in some low-security settings, to have video surveillance systems, access control systems, sensors, alarms, and other elements interacting with one another and often working in concert. As Rogers implies, this complexity although beneficial also requires ?

ANS-


-great attention to detail


-significant planning and testing

Why are organizations integrating physical security devices for access control, monitoring and process control into the IT infrastructure.

ANS-


-reducing costs,


-increasing efficiencies


-making better use of technology investments,

The collision of two different technology worlds, each coming from a separate management approach and protection philosophy, doesn’t always come together easily. The differences in design, functionality, implementation, maintenance and management can present conflicts, possibly resulting in ?

ANS- a security breach involving IT systems, the security systems or both

It is crucial to make sure the system’s software is acceptable and can be supported by the?

ANS- organization’s IT resources.

In summary, integration in electronic security systems represents both a blessing and a new set of challenges. Careful planning and close collaboration throughout a project’s life cycle are becoming more and more critical to ensuring a successful outcome. True or false?

ANS- True

The following are implications of increasing integration:

ANS-


-cost factors,


-dependency issues,


-new challenges in securing the security systems.

The multiple elements of physical security must be................ to operate as part of a comprehensive physical security strategy.

ANS- integrated

Physical security elements are generally categorized as ?

ANS-


-electronic security systems,


-structural security measures,


-human capital.

Successful organizations realize that their greatest security resources are their.............

ANS- employees

Operating procedures tailored to various threat levels must be developed before any systems are ?

ANS- purchased or installed.

The final and broadest aspect of integrated assets protection comes at the enterprise level with the concept of?

ANS- enterprise risk management.

A foundational element of an integrated assets protection strategy is ?

ANS- security architecture and design

Security architecture and design can be applied to ?

ANS-


-new construction,


-renovation,


-expansion.

security professionals work with architects, engineers, general contractors, and others throughout the process, using the results of?

ANS- a risk assessment.

..............are examples of early security and force protection design.

ANS- Castles

Castles are examples of early security and force protection design. Design factors considered in these defensive strongholds include the following:

ANS-


• location (geography, terrain, and positioning)


• structural design (size, shape, building materials, etc.)


• clear zones for surveillance, threat detection, and standoff


• access control (e.g., moats, drawbridges, and limited access points)


• defensive points for the deployment of weaponry


• multiple layers or zones of protection

When beginning a new project, the first priority is to determine the?

ANS- client’s requirements.

In engineering client’s requirements, includes such concepts as?.

ANS-


-site layout,


-the size of the structure needed,


-the number of people to be housed,


-the activities to be performed in the building

The overall objective is to include appropriate tools and other available measures in a tailored physical security strategy according to the........................ of a facility

ANS-


-mission,


-nature,


-location,


-threat profile

In security design, the basic factors to know from the outset are the following:

ANS-


• governing codes and regulations


• protection requirements


• type of construction


• site layout


• material selection


• utilities


• life safety

Among the organizations that have issued guidelines on design for commercial use are?

ANS-


-the Federal Emergency Management Agency (FEMA)


-the American Society of Civil Engineers (ASCE)

necessary part of developing a design is to conduct a?

ANS- risk assessment.

The basic assessment approach should incorporate some evaluation of ?

ANS-


-asset value,


-threat,


-vulnerability to determine risk to the facility

A simple equation for calculating risk is?

ANS- Risk = Vulnerability x Threat x Asset Value

Since it is not possible to protect against every risk, the client must provide the?

ANS-


-necessary level of protection,


-set acceptable levels of risk,


-implement reasonable mitigation measures based on cost versus benefit.


The threat (e.g., tactics and associated weapons, tools, or explosives) against which assets within a building must be protected and upon which the security engineering design of the building is based?

ANS- design basis threat (DBT)

The client may not want to release the details of the risk assessment and will simply provide?

ANS- the design basis threat (DBT)

An important aspect of physical security is the.................,Security officers represent a key component of the strategy in most instances, but it is critical to match the right people with the specific role (in the strategy) and requirements of the position.

ANS- people element

Sebyan Black makes the point that................... is essential. This means carefully selecting the right individual for each security position whenever possible.

ANS- “the right fit”

The “right fit “can have a wide variety of positive effects, including ?

ANS-


-scheduling,


-client satisfaction,


-retention,


-increased effectiveness

Integrated security systems have three major defining attributes:(pg 140)

ANS-


• They comprise numerous subsystems together into one complete, highly coordinated, high- functioning system.


• They involve both integration of components and integration of functions.


• They utilize a communications infrastructure or medium (usually via an IT network).

Norman (2007, p. 4) distinguishes two categories integrated security systems:(Pg 140)

ANS-


• convergence-based integrated security systems


• enterprise integrated security systems

A successful security design recognizes technological developments on all fronts (not only electronic security systems) and integrates three primary elements namely:

ANS-


-architectural aspects,


-security systems,


-operational factors.

Technology does not replace manpower but rather ?

ANS-


-acts as a force multiplier to augment personnel capabilities


-provide checks and balances to offset individual wrongdoing.

The human element of security, which relates to.........................., must be integrated into the system during the design phase, not after the system has been designed and implemented.

ANS-


-decision-making,


-common sense,


-awareness

The following are some steps that can assist in preventing repeat victimization:

ANS-


• Quickly remove signs of victimization.


• Improve physical security.


• Block easy access to targets.


• Protect especially vulnerable targets.


• Regulate access to high-risk assets or areas.

Routine activity theory suggests that the presence of capable guardians may deter crime. Criminals generally avoid targets or victims who are perceived to be ?

ANS-


-armed,


-capable of resistance,


-potentially dangerous

In second generation CPTED, the legitimate activity supports employed in first generation CPTED are reinforced by developing community cohesion and a more permanent sense of neighborliness. True or false?

ANS- True

Second generation CPTED employs four main strategies (Saville & Cleveland, 2013) namely?

ANS-


• Cohesion.


• Capacity threshold.


• Community culture.


• Connectivity.

The following are some steps that can assist in preventing repeat victimization:

ANS-


• Quickly remove signs of victimization.


• Improve physical security.


• Block easy access to targets.


• Protect especially vulnerable targets.


• Regulate access to high-risk assets or areas.

Preventive maintenance includes these activities:

ANS-


— keeping electromechanical equipment (fans, filters, backup batteries, door hardware, etc.) operating correctly


— replacing hardware components to keep the equipment up to current specifications (such as engineering changes)


— updating system and application software


— testing and analyzing system reports (error logs, self-tests, system parameters, performance measures, etc.)


— maintaining system documentation

Often the best solution is to select a single contractor to take responsibility for the maintenance requirements of the system. As the single point of contact, the contractor will diagnose the cause of the problem and manage the process of getting it resolved. True or false?

ANS- True

Hardware and software system maintenance may be done by

ANS-


-the equipment manufacturer,


-a system integrator,


-a maintenance contractor,


-the users,

It is essential to develop guidelines to identify who is responsible for?

ANS-


-fault identification,


-problem diagnosis and verification,


-fault correction,


-repair testing,


-repair logging,


-maintenance coordination and tracking

When contracting for maintenance services, the customer and the contractor should do the following:

ANS-


• Agree on the basis of the contract document.


• Document in detail the components of the systems that are to be maintained.


• Set out the service levels for each component or subsystem.


• Define roles and responsibilities of the parties to the agreement.


• Agree on pricing and payments.


• Set out how the agreement will be managed and administered.

In some cases, the supplier of the maintenance service is also the supplier of the hardware and software or an agent of that supplier. However, usually the systems.................. takes responsibility for ongoing maintenance as the prime contractor.

ANS- integrator

The goals of system maintenance agreements is to ?

ANS-


1)ensure that the security system operates at its optimum capability with minimum downtime.


2)minimize the number of different parties involved in managing the maintenance program.

Maintenance contractors usually have a scale of fees for the support of their products and for the delivery of their services. These fees may be arrived at from a mix of factors, including?

ANS-


-the complexity of the security system,


-the cost of spare parts,


-the estimated number of failures per annum,


-the product usage frequency,


-the number of security system users,


-the age of the security system.

The payment cycle for maintenance costs may vary according to the scope and nature of the service required. One approach might consist of a fixed fee for an advance period (month, quarter, or year) plus an allowance or a formula for the following:

ANS-


• discounts for the economies of longer-term contracts


• credits when target response times are not met


• additional costs associated with travel, accommodation, or work not covered by the agreement


• call-outs outside agreed business hours

Not typically covered in a maintenance agreement are such items as ?

ANS-


-misuse,


-vandalism,


-lack of training


-due to turnover,


-acts of God,

Routine activity theory suggests that the presence of capable guardians may deter crime. Criminals generally avoid targets or victims who are perceived to be ?

ANS-


-armed,


-capable of resistance,


-potentially dangerous

The security manager should ?

ANS-


-regularly review the agreement,


-measure the provider’s performance,


-address the agreement’s scope.

The review should cover the following issues:

ANS-


• supplier performance against service levels and system performance for the previous period


• call logging and account management


• changes to the services or service levels that are required by the customer ,recommended by the supplier


• changes to the list of equipment or software on the system


• customer’s future plans for the system (including staffing, new developments, upgrades, special events, or changing priorities

As a rule of thumb, about............. of the capital cost of equipment for a location should be allocated each year for spare parts purchases.

ANS- 5 percent

The contractor should provide the customer with a manual that describes maintenance for all equipment, including?

ANS-


-inspection,


-periodic preventive maintenance,


-fault diagnosis,


-repair or replacement of defective components.

Since security subsystems require power, an.......... power source consisting of batteries or generators must be available

ANS- auxiliary

In most cases, immediate and automatic switchover will not occur if a generator is the sole source of backup power; batteries are required, and the generator assumes the role once it obtains full power. True or false?

ANS- True

Records of these tests should include ?

ANS-


-the test date,


-name of the person conducting the test,


-results.

To justify the replacement cost, the security manager should consider such factors such as ?

ANS-


-the cost of maintenance,


-lack of spare parts,


-obsoleteness of hardware and software,


-operating costs,


-unreliability

Project implementation begins immediately following the selection of a contractor. Project implementation involves these steps:

ANS-


• site preparation


• contractor coordination


• installation


• testing and warranty issues


• training

The most important step in installing physical protection system (PPS)elements is ?

ANS- site preparation and planning

In second generation CPTED, the legitimate activity supports employed in first generation CPTED are reinforced by developing community cohesion and a more permanent sense of neighborliness. True or false?

ANS- True

contractor should be instructed not to take any corrective action without ?

ANS- written permission from the customer

No building system relates to as many other building systems as does the ?

ANS- security system

No building system relates to as many other building systems as does the ?

No building system relates to as many other building systems as does the ?

Second generation CPTED employs four main strategies (Saville & Cleveland, 2013) namely?

ANS-


• Cohesion.


• Capacity threshold.


• Community culture.


• Connectivity.

Psychomotor development requires ?

ANS-


repetition,


practice,


refresher courses

...................concerns the relevance of the learning to the job environment, thereby ensuring that what is learned in the classroom is put to use.

ANS - Transfer

The following is a good outline of the essential elements of a successful security system maintenance program:

ANS-


maintenance,


evaluation,


replacement.

Remedial maintenance includes these measures:

ANS-—


—- establishing a maintenance function that acts on and logs requests from users in the event of a system problem


— investigating the problem


— resolving the problem directly or managing the resolution if third- party service is required


— restoring the system or returning its use to the customer


— updating documentation with respect to the problem and its resolution

This consists of scheduled maintenance to keep the hardware and software in good operating condition

ANS- Preventive maintenance.

This corrects faults and returns the system to operation in the event that a hardware or software component fails

ANS- Remedial maintenance.