Physical Security Sample Questions. 1.The degree of protection desired in any installation is...
-
Upload
moris-buck-palmer -
Category
Documents
-
view
213 -
download
0
Transcript of Physical Security Sample Questions. 1.The degree of protection desired in any installation is...
![Page 1: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/1.jpg)
Physical SecurityPhysical Security
Sample Questions
![Page 2: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/2.jpg)
1. The degree of protection desired in any installation is predicated upon an analysis of the following two factors:
• a. Cost and environmental conditions
• b. Criticality and vulnerability
• c. Cost and vulnerability
• d. Cost and criticality
![Page 3: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/3.jpg)
1. The degree of protection desired in any installation is predicated upon an analysis of the following two factors:
• a. Cost and environmental conditions
• b. Criticality and vulnerability
• c. Cost and vulnerability
• d. Cost and criticality
![Page 4: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/4.jpg)
2. The process used by the security manager in establishing priorities of protection of assets is known as:
• a. Security survey
• b. Vulnerability study
• c. Risk analysis
• d. Inspection review
![Page 5: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/5.jpg)
2. The process used by the security manager in establishing priorities of protection of assets is known as:
• a. Security survey
• b. Vulnerability study
• c. Risk analysis
• d. Inspection review
![Page 6: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/6.jpg)
3. The type of fencing generally used for protection of permanent limited and exclusion areas is:
• a. Chain link
• b. Concertina
• c. Barbed wire
• d. Barbed tape
![Page 7: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/7.jpg)
3. The type of fencing generally used for protection of permanent limited and exclusion areas is:
• a. Chain link
• b. Concertina
• c. Barbed wire
• d. Barbed tape
![Page 8: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/8.jpg)
4. For general security usage, excluding the top guard, chain link fence should be:
• a. 7 gauge wire and a min. of 10 feet high
• b. 9 gauge wire and eight feet high
• c. 9 gauge wire and seven feet high
• d. 10 gauge wire and seven feet high
![Page 9: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/9.jpg)
4. For general security usage, excluding the top guard, chain link fence should be:
• a. 7 gauge wire and a min. of 10 feet high
• b. 9 gauge wire and eight feet high
• c. 9 gauge wire and seven feet high
• d. 10 gauge wire and seven feet high
![Page 10: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/10.jpg)
5. Excluding the top guard, standard barbed wire fencing intended to prevent human trespassing should be not less than:
• a. 7 feet high
• b. 6 feet high
• c. 10 feet high
• d. 8 feet high
![Page 11: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/11.jpg)
5. Excluding the top guard, standard barbed wire fencing intended to prevent human trespassing should be not less than:
• a. 7 feet high
• b. 6 feet high
• c. 10 feet high
• d. 8 feet high
![Page 12: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/12.jpg)
6. In a barbed wire fence, the distance between strands should not exceed:
• a. 4 inches
• b. 3 inches
• c. 5 inches
• d. 6 inches
![Page 13: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/13.jpg)
6. In a barbed wire fence, the distance between strands should not exceed:
• a. 4 inches
• b. 3 inches
• c. 5 inches
• d. 6 inches
![Page 14: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/14.jpg)
7. Standard barbed wire is twisted double-strand:
• a. 9 gauge wire
• b. 14 gauge wire
• c. 13 gauge wire
• d. 12 gauge wire (with 4 point barbs)
![Page 15: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/15.jpg)
7. Standard barbed wire is twisted double-strand:
• a. 9 gauge wire
• b. 14 gauge wire
• c. 13 gauge wire
• d. 12 gauge wire (with 4 point barbs)
![Page 16: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/16.jpg)
8. Top guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence at least:
• a. 2 feet
• b. 1 foot
• c. 3 feet
• d. 3-1/2 feet
![Page 17: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/17.jpg)
8. Top guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence at least:
• a. 2 feet
• b. 1 foot
• c. 3 feet
• d. 3-1/2 feet
![Page 18: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/18.jpg)
9. A top guard must consist of:
• a. 3 strands of barbed wire or tape
• b. 2 strands of barbed wire or tape
• c. 4 strands of barbed wire or tape
• d. 6 strands of barbed wire or tape
![Page 19: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/19.jpg)
9. A top guard must consist of:
• a. 3 strands of barbed wire or tape
• b. 2 strands of barbed wire or tape
• c. 4 strands of barbed wire or tape
• d. 6 strands of barbed wire or tape
![Page 20: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/20.jpg)
10. Strands of barbed wire or tape used as a top guard on a fence should be spaced:
• a. 2 inches apart
• b. 3 inches apart
• c. 4 inches apart
• d. 6 inches apart
![Page 21: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/21.jpg)
10. Strands of barbed wire or tape used as a top guard on a fence should be spaced:
• a. 2 inches apart
• b. 3 inches apart
• c. 4 inches apart
• d. 6 inches apart
![Page 22: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/22.jpg)
11. Which of the following characteristic of protective lighting is incorrect?
• a. Lighting is expensive to maintain
• b. It usually requires less intensity than working light
• c. It may also provide personal protection by reducing advantages of concealment
• d. It should not be used as a psychological deterrent only
![Page 23: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/23.jpg)
11. Which of the following characteristic of protective lighting is incorrect?
• a. Lighting is expensive to maintain
• b. It usually requires less intensity than working light
• c. It may also provide personal protection by reducing advantages of concealment
• d. It should not be used as a psychological deterrent only
![Page 24: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/24.jpg)
12. Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
• a. Continuous
• b. Intermittent
• c. Standby
• d. Moveable
• e. Emergency
![Page 25: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/25.jpg)
12. Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
• a. Continuous
• b. Intermittent
• c. Standby
• d. Moveable
• e. Emergency
![Page 26: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/26.jpg)
13. A series of fixed luminaries arranged to flood a given area continuously during the hours of darkness with overlapping cones of light. It is called:
• a. Continuous lighting
• b. Intermittent lighting
• c. Standby lighting
• d. Moveable lighting
![Page 27: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/27.jpg)
13. A series of fixed luminaries arranged to flood a given area continuously during the hours of darkness with overlapping cones of light. It is called:
• a. Continuous lighting
• b. Intermittent lighting
• c. Standby lighting
• d. Moveable lighting
![Page 28: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/28.jpg)
14. Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
• a. 1.5 foot candles
• b. 2.0 foot candles
• c. 0.5 foot candles
• d. 1.0 foot candles
![Page 29: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/29.jpg)
14. Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
• a. 1.5 foot candles
• b. 2.0 foot candles
• c. 0.5 foot candles
• d. 1.0 foot candles
![Page 30: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/30.jpg)
15. The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as:
• a. Ultrasonic system
• b. Microwave system
• c. Electrostatic system
• d. Capacitance system
![Page 31: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/31.jpg)
15. The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as:
• a. Ultrasonic system
• b. Microwave system
• c. Electrostatic system
• d. Capacitance system
![Page 32: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/32.jpg)
16. The intrusion detection system which is used on a safe, wall and openings therein in an effort to establish an electrostatic field around the object to be protected is known as a:
• a. Ultrasonic system
• b. Microwave system
• c. Capacitance system
• d. Electro-mechanical system
![Page 33: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/33.jpg)
16. The intrusion detection system which is used on a safe, wall and openings therein in an effort to establish an electrostatic field around the object to be protected is known as a:
• a. Ultrasonic system
• b. Microwave system
• c. Capacitance system
• d. Electro-mechanical system
![Page 34: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/34.jpg)
17. Which of the following is not true with regard to lock and key systems?
• a. The lock is the most accepted and widely used security device of the basic safeguards in
protecting installations• b. The locking system should be backed up
with other security• c. A high-quality, pick-proof lock is
considered a positive bar to entry
• d. Most key locks can be picked by an expert in a few minutes
![Page 35: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/35.jpg)
17. Which of the following is not true with regard to lock and key systems?
• a. The lock is the most accepted and widely used security device of the basic safeguards in protecting installations
• b. The locking system should be backed up with other security
• c. A high-quality, pick-proof lock is considered a positive bar to entry
• d. Most key locks can be picked by an expert in a few minutes
![Page 36: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/36.jpg)
18. The type of lock generally used on automobiles, desks and cabinets is:
• a. Pin tumbler
• b. Warded
• c. Combination
• d. Wafer
![Page 37: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/37.jpg)
18. The type of lock generally used on automobiles, desks and cabinets is:
• a. Pin tumbler
• b. Warded
• c. Combination
• d. Wafer
![Page 38: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/38.jpg)
19. Which of the following is not true with regard to door latches:
• a. A deadbolt latch may be used on almost any door
• b. A deadbolt latch is easy to install
• c. A deadbolt latch is inexpensive
• d. Chain latches are highly recommended as effective security measures
![Page 39: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/39.jpg)
19. Which of the following is not true with regard to door latches:
• a. A deadbolt latch may be used on almost any door
• b. A deadbolt latch is easy to install
• c. A deadbolt latch is inexpensive
• d. Chain latches are highly recommended as effective security measures
![Page 40: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/40.jpg)
20. Inventories of key systems should be conducted at least:
• a. Annually
• b. Quarterly
• c. Semi-annually
• d. Monthly
![Page 41: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/41.jpg)
20. Inventories of key systems should be conducted at least:
• a. Annually
• b. Quarterly
• c. Semi-annually
• d. Monthly
![Page 42: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/42.jpg)
21. A sentry dog can normally not operate at full effectiveness at:
• a. Ammunition storage areas
• b. Gasoline storage areas
• c. Radar sites
• d. Warehouses
![Page 43: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/43.jpg)
21. A sentry dog can normally not operate a full effectiveness at:
• a. Ammunition storage areas
• b. Gasoline storage areas
• c. Radar sites
• d. Warehouses
![Page 44: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/44.jpg)
22. Non-insulated security containers must satisfactorily pass a drop test of:
• a. 15 feet
• b. 20 feet
• c. 22 feet
• d. 30 feet
![Page 45: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/45.jpg)
22. Non-insulated security containers must satisfactorily pass a drop test of:
• a. 15 feet
• b. 20 feet
• c. 22 feet
• d. 30 feet
![Page 46: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/46.jpg)
23. Which of the following is not an approved UL record safe classification:
• a. 350-4
• b. 350-3
• c. 350-2
• d. 350-1
![Page 47: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/47.jpg)
23. Which of the following is not an approved UL record safe classification:
• a. 350-4
• b. 350-3
• c. 350-2
• d. 350-1
![Page 48: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/48.jpg)
24. The acceptable vault construction of insulated doors is a minimum reinforced thickness of:
• a. 12”
• b. 10”
• c. 8”
• d. 6”
![Page 49: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/49.jpg)
24. The acceptable vault construction of insulated doors is a minimum reinforced thickness of:
• a. 12”
• b. 10”
• c. 8”
• d. 6”
![Page 50: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/50.jpg)
25. Which of the following would be an acceptable computer media storage classification:
• a. 350-4
• b. 450-4
• c. 250-4
• d. 150-4
![Page 51: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/51.jpg)
25. Which of the following would be an acceptable computer media storage classification:
• a. 350-4
• b. 450-4
• c. 250-4
• d. 150-4
![Page 52: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/52.jpg)
26. UL classified safes must be anchored to the floor or weigh at least:
• a. 750 lbs.
• b. 1,000 lbs.
• c. 1,250 lbs.
• d. 1,500 lbs.
![Page 53: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/53.jpg)
26. UL classified safes must be anchored to the floor or weigh at least:
• a. 750 lbs.
• b. 1,000 lbs.
• c. 1,250 lbs.
• d. 1,500 lbs.
![Page 54: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/54.jpg)
27. A “re-lock” on a vault automatically stops the bolt mechanism from operating when:
• a. A switch is flipped
• b. A timer is used
• c. When there is an attack on the door or combination lock
• d. Locked by remote control
![Page 55: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/55.jpg)
27. A “re-lock” on a vault automatically stops the bolt mechanism from operating when:
• a. A switch is flipped
• b. A timer is used
• c. When there is an attack on the door or combination lock
• d. Locked by remote control
![Page 56: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/56.jpg)
28. Security vaults differ from safes in that:
• a. They are tested by Underwriters Laboratories for burglary resistance
• b. They do not have both fire and burglary resisting properties
• c. Steel is used
• d. They are permanently affixed to building
![Page 57: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/57.jpg)
28. Security vaults differ from safes in that:
• a. They are tested by Underwriters Laboratories for burglary resistance
• b. They do not have both fire and burglary resisting properties
• c. Steel is used
• d. They are permanently affixed to building
![Page 58: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/58.jpg)
29. The weakness of the burning bar as a burglar tool is:
• a. It will not burn through concrete
• b. Produces large volumes of smoke
• c. Actual heat is not intense enough
• d. It requires tanks of hydrogen
![Page 59: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/59.jpg)
29. The weakness of the burning bar as a burglar tool is:
• a. It will not burn through concrete
• b. Produces large volumes of smoke
• c. Actual heat is not intense enough
• d. It requires tanks of hydrogen
![Page 60: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/60.jpg)
30. Which of the following is not correct with regard to safes?• a. UL classification labels are removed
from all safes exposed to fires
• b. Record safes are designed to resist fires only
• c. Money safes have accredited fire resistance
• d. Quality equipment should be purchased only from reputable dealers
![Page 61: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/61.jpg)
30. Which of the following is not correct with regard to safes?
• a. UL classification labels are removed from all safes exposed to fires
• b. Record safes are designed to resist fires only
• c. Money safes have accredited fire resistance
• d. Quality equipment should be purchased only from reputable dealers
![Page 62: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/62.jpg)
31. The symbol “TRTL” indicates:
• a. Safe is resistant to torches
• b. Safe is resistant to tools
• c. Safe is resistant to both torches and tools
• d. Nothing pertaining to torches or tools
![Page 63: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/63.jpg)
31. The symbol “TRTL” indicates:
• a. Safe is resistant to torches
• b. Safe is resistant to tools
• c. Safe is resistant to both torches and tools
• d. Nothing pertaining to torches or tools
![Page 64: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/64.jpg)
32. Illumination intensity minimums for lighting of the perimeter of restricted area is:
• a. 0.15 foot candles
• b. 0.40 foot candles
• c. 1.00 foot candles
• d. 2.00 foot candles
![Page 65: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/65.jpg)
32. Illumination intensity minimums for lighting of the perimeter of restricted area is:
• a. 0.15 foot candles
• b. 0.40 foot candles
• c. 1.00 foot candles
• d. 2.00 foot candles
![Page 66: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/66.jpg)
33. The temperature at which paper may be destroyed is:
• a. 200 degrees F
• b. 250 degrees F
• c. 300 degrees F
• d. 350 degrees F
![Page 67: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/67.jpg)
33. The temperature at which paper may be destroyed is:
• a. 200 degrees F
• b. 250 degrees F
• c. 300 degrees F
• d. 350 degrees F
![Page 68: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/68.jpg)
34. Electronic process media can begin to deteriorate at:
• a. 100 degrees F
• b. 125 degrees F
• c. 150 degrees F
• d. 200 degrees F
![Page 69: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/69.jpg)
34. Electronic process media can begin to deteriorate at:
• a. 100 degrees F
• b. 125 degrees F
• c. 150 degrees F
• d. 200 degrees F
![Page 70: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/70.jpg)
35. The interior height of a vault should not exceed:
• a. 8 feet
• b. 9 feet
• c. 10 feet
• d. 12 feet
![Page 71: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/71.jpg)
35. The interior height of a vault should not exceed:
• a. 8 feet
• b. 9 feet
• c. 10 feet
• d. 12 feet
![Page 72: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/72.jpg)
36. A system using inaudible sound waves to detect the presence of an intruder or other disturbance of the inaudible sound system is known as:
• a. Motion detection system
• b. Sonic motion detection
• c. Ultrasonic motion detection
• d. Radio frequency motion detection
![Page 73: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/73.jpg)
36. A system using inaudible sound waves to detect the presence of an intruder or other disturbance of the inaudible sound system is known as:
• a. Motion detection system
• b. Sonic motion detection
• c. Ultrasonic motion detection
• d. Radio frequency motion detection
![Page 74: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/74.jpg)
37. The weakest area in a window is usually:
• a. The sash
• b. Frames
• c. Glass
• d. The putty
![Page 75: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/75.jpg)
37. The weakest area in a window is usually:
• a. The sash
• b. Frames
• c. Glass
• d. The putty
![Page 76: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/76.jpg)
38. Which of the following is considered to be the most resistant to blast from explosion?
• a. Thick brick or concrete walls
• b. Thick earthen barricades
• c. Steel-frame building walls
• d. Thick, reinforced concrete walls
![Page 77: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/77.jpg)
38. Which of the following is considered to be the most resistant to blast from explosion?
• a. Thick brick or concrete walls
• b. Thick earthen barricades
• c. Steel-frame building walls
• d. Thick, reinforced concrete walls
![Page 78: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/78.jpg)
39. A type of glass used in street-level windows or displays where security is necessary and which is composed of two sheets of ordinary glass bonded to an intervening layer of plastic material is known as:
• a. Tempered glass
• b. Plastic coated glass
• c. Vinyl coated glass
• d. Laminated glass
![Page 79: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/79.jpg)
39. A type of glass used in street-level windows or displays where security is necessary and which is composed of two sheets of ordinary glass bonded to an intervening layer of plastic material is known as:
• a. Tempered glass
• b. Plastic coated glass
• c. Vinyl coated glass
• d. Laminated glass
![Page 80: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/80.jpg)
40. The type of glass which is often utilized for both safety and security purposes because it is 3 to 5 times stronger than regular glass and 5 times as resistant to heat is:
• a. Tempered glass
• b. Coated glass
• c. Plastic coated glass
• d. Reflected glass
![Page 81: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/81.jpg)
40. The type of glass which is often utilized for both safety and security purposes because it is 3 to 5 times stronger than regular glass and 5 times as resistant to heat is:
• a. Tempered glass
• b. Coated glass
• c. Plastic coated glass
• d. Reflected glass
![Page 82: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/82.jpg)
41. The mechanical lock longest in use and which has practically no security value is:
• a. The lever lock
• b. The warded lock
• c. The wafer tumbler lock
• d. The pin tumbler lock
![Page 83: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/83.jpg)
41. The mechanical lock longest in use and which has practically no security value is:
• a. The lever lock
• b. The warded lock
• c. The wafer tumbler lock
• d. The pin tumbler lock
![Page 84: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/84.jpg)
42. Probably the most widely-used lock for both exterior building doors and interior room doors is the:
• a. Warded lock
• b. Pin tumbler lock
• c. Disc tumbler lock
• d. Lever lock
![Page 85: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/85.jpg)
42. Probably the most widely-used lock for both exterior building doors and interior room doors is the:
• a. Warded lock
• b. Pin tumbler lock
• c. Disc tumbler lock
• d. Lever lock
![Page 86: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/86.jpg)
43. Which of the following is not an authentic characterization of the guard operation:
• a. Guards are costly• b. Guards are generally recognized as an essential
element in the protection of assets and personnel• c. Guards are the only element of protection
which can be depended upon to give complete security
• d. Guards can also perform as a public relations representative when properly trained
![Page 87: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/87.jpg)
43. Which of the following is not an authentic characterization of the guard operation:
• a. Guards are costly• b. Guards are generally recognized as an essential
element in the protection of assets and personnel• c. Guards are the only element of protection
which can be depended upon to give complete security
• d. Guards can also perform as a public relations representative when properly trained
![Page 88: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/88.jpg)
44. Each guard post that is manned 24 hours a day, 7 days a week requires:
• a. 3 guards
• b. 6 guards
• c. 2 guards
• d. 4.5 guards
![Page 89: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/89.jpg)
44. Each guard post that is manned 24 hours a day, 7 days a week requires:
• a. 3 guards
• b. 6 guards
• c. 2 guards
• d. 4.5 guards
![Page 90: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/90.jpg)
45. Usually in facilities where visitors are to be escorted, this is done by:
• a. Guards
• b. Individuals being visited
• c. Special escort service
• d. Supervisor of unit visited
![Page 91: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/91.jpg)
45. Usually in facilities where visitors are to be escorted, this is done by:
• a. Guards
• b. Individuals being visited
• c. Special escort service
• d. Supervisor of unit visited
![Page 92: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/92.jpg)
46. One of the main reasons for not arming private security guards is:
• a. The cost of extra equipment
• b. The extra salary costs
• c. Very few are qualified to handle them
• d. The typical business or government facility is not customarily a
place where violent crime occurs
![Page 93: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/93.jpg)
46. One of the main reasons for not arming private security guards is:
• a. The cost of extra equipment
• b. The extra salary costs
• c. Very few are qualified to handle them
• d. The typical business or government facility is not customarily a
place where violent crime occurs
![Page 94: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/94.jpg)
47. The argument usually used by contract guard representatives as a selling point in their service is:
• a. Better trained
• b. Non-union
• c. No administrative problems
• d. Reduction in cost
![Page 95: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/95.jpg)
47. The argument usually used by contract guard representatives as a selling point in their service is:
• a. Better trained
• b. Non-union
• c. No administrative problems
• d. Reduction in cost
![Page 96: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/96.jpg)
48. The most important written instructions for the guard force are known as:
• a. Memoranda
• b. Post orders
• c. High policy
• d. Operational orders
![Page 97: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/97.jpg)
48. The most important written instructions for the guard force are known as:
• a. Memoranda
• b. Post orders
• c. High policy
• d. Operational orders
![Page 98: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/98.jpg)
49. Which of the following should be a required criteria of post orders?
• a. Each order should deal with multiple subjects
• b. The orders should be detailed
• c. The orders should be written at the lowest level possible
• d. Orders should be indexed sparingly
![Page 99: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/99.jpg)
49. Which of the following should be a required criteria of post orders?
• a. Each order should deal with multiple subjects
• b. The orders should be detailed
• c. The orders should be written at the lowest level possible
• d. Orders should be indexed sparingly
![Page 100: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/100.jpg)
50. The guard’s primary record of significant events affecting facility protection is called:
• a. The guard log
• b. Ingress log
• c. Egress log
• d. Daily record manual
![Page 101: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/101.jpg)
50. The guard’s primary record of significant events affecting facility protection is called:
• a. The guard log
• b. Ingress log
• c. Egress log
• d. Daily record manual
![Page 102: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/102.jpg)
51. The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarms sources outside the room and in the field of the detector is:
• a. Acoustic detector
• b. Vibration detector
• c. Microwave motion detector
• d. Ultrasonic motion detector
![Page 103: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/103.jpg)
51. The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarms sources outside the room and in the field of the detector is:
• a. Acoustic detector
• b. Vibration detector
• c. Microwave motion detector
• d. Ultrasonic motion detector
![Page 104: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/104.jpg)
52. The sensor which is used when light air turbulence, vibration and motion outside the room are present is:
• a. Acoustic detector
• b. Vibration detector
• c. Microwave motion detector
• d. Ultrasonic motion detector
![Page 105: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/105.jpg)
52. The sensor which is used when light air turbulence, vibration and motion outside the room are present is:
• a. Acoustic detector
• b. Vibration detector
• c. Microwave motion detector
• d. Ultrasonic motion detector
![Page 106: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/106.jpg)
53. Foil used as a detector on a glass window to signal a surreptitious or forcible penetration is an example of :
• a. Microwave sensor
• b. Capacitance sensor
• c. Vibrator sensor
• d. Electro-mechanical sensor
![Page 107: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/107.jpg)
53. Foil used as a detector on a glass window to signal a surreptitious or forcible penetration is an example of :
• a. Microwave sensor
• b. Capacitance sensor
• c. Vibrator sensor
• d. Electro-mechanical sensor
![Page 108: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/108.jpg)
54. The type of sensor designed to place a current-carrying conductor between an intruder and an area to be protected is known as:
• a. Electro-mechanical sensor
• b. Microwave sensor
• c. Capacitance sensor
• d. Audio sensor
![Page 109: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/109.jpg)
54. The type of sensor designed to place a current-carrying conductor between an intruder and an area to be protected is known as:
• a. Electro-mechanical sensor
• b. Microwave sensor
• c. Capacitance sensor
• d. Audio sensor
![Page 110: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/110.jpg)
55. The kind of sensor which is based on the Doppler Principle - named after the Austrian scientist who originated the concept is:
• a. Electro-mechanical sensor
• b. Microwave sensor
• c. Capacitance sensor
• d. Audio sensor
![Page 111: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/111.jpg)
55. The kind of sensor which is based on the Doppler Principle - named after the Austrian scientist who originated the concept is:
• a. Electro-mechanical sensor
• b. Microwave sensor
• c. Capacitance sensor
• d. Audio sensor
![Page 112: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/112.jpg)
56. The sound wave sensor is commonly referred to as :
• a. Proximity detector
• b. Radar
• c. Vibration detector
• d. Ultrasonic detector
![Page 113: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/113.jpg)
56. The sound wave sensor is commonly referred to as :
• a. Proximity detector
• b. Radar
• c. Vibration detector
• d. Ultrasonic detector
![Page 114: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/114.jpg)
57. The type of sensor which is not influenced by exterior noise; which reacts only to movement within a protected area; and which can be adjusted so the movement of air caused by fire will activate an alarm is known as:
• a. Proximity detector
• b. Ultrasonic sensor
• c. Electro-mechanical sensor
• d. Audio sensor
![Page 115: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/115.jpg)
57. The type of sensor which is not influenced by exterior noise; which reacts only to movement within a protected area; and which can be adjusted so the movement of air caused by fire will activate an alarm is known as:
• a. Proximity detector
• b. Ultrasonic sensor
• c. Electro-mechanical sensor
• d. Audio sensor
![Page 116: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/116.jpg)
58. A personal identification method based on the length of each finger of one hand from base to tip and the width of the hand inside the thumb is called the:
• a. Henry fingerprint system
• b. Hand geometry identification
• c. The Bertillion method
• d. Basch-Lomb method
![Page 117: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/117.jpg)
58. A personal identification method based on the length of each finger of one hand from base to tip and the width of the hand inside the thumb is called the:
• a. Henry fingerprint system
• b. Hand geometry identification
• c. The Bertillion method
• d. Basch-Lomb method
![Page 118: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/118.jpg)
59. A visual indicator that shows from which of several zones or buildings an alarm signal has originated is called:
• a. An annunciator
• b. Contact device
• c. Break alarm
• d. Cross alarm
![Page 119: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/119.jpg)
59. A visual indicator that shows from which of several zones or buildings an alarm signal has originated is called:
• a. An annunciator
• b. Contact device
• c. Break alarm
• d. Cross alarm
![Page 120: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/120.jpg)
60. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:
• a. Parabolic microphone
• b. Special audio device
• c. Contact microphone
• d. Surreptitious microphone
![Page 121: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/121.jpg)
60. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:
• a. Parabolic microphone
• b. Special audio device
• c. Contact microphone
• d. Surreptitious microphone
![Page 122: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/122.jpg)
61. Which of the following is not true with regard to establishing an identification of personnel system to control movement?
• a. The ID card or badge should be designed in a relatively complicated manner to avoid duplication
• b. The ID card should be designed as simple as possible
• c. Procedures should be designed to show employees what to do when ID card is lost
• d. Details should be prepared and disseminated as to where, when, and how the badge should be worn
![Page 123: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/123.jpg)
61. Which of the following is not true with regard to establishing an identification of personnel system to control movement?
• a. The ID card or badge should be designed in a relatively complicated manner to avoid duplication
• b. The ID card should be designed as simple as possible
• c. Procedures should be designed to show employees what to do when ID card is lost
• d. Details should be prepared and disseminated as to where, when, and how the badge should be worn
![Page 124: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/124.jpg)
62. The most vulnerable link in any identification system is?
• a. Poor quality of badges
• b. Perfunctory performance of duty
• c. Badges not large enough
• d. Educational background of security officers
![Page 125: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/125.jpg)
62. The most vulnerable link in any identification system is?
• a. Poor quality of badges
• b. Perfunctory performance of duty
• c. Badges not large enough
• d. Educational background of security officers
![Page 126: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/126.jpg)
63. The use of a simple word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is called?
• a. Word alert
• b. Security alert
• c. Code one
• d. Duress code
![Page 127: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/127.jpg)
63. The use of a simple word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is called?
• a. Word alert
• b. Security alert
• c. Code one
• d. Duress code
![Page 128: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/128.jpg)
64. The practice of having at least 2 authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed will be present during any operation that affords access to sensitive areas is called:
• a. The sensitive material rule
• b. Controlled presence rule
• c. Two-man rule
• d. Controlled access rule
![Page 129: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/129.jpg)
64. The practice of having at least 2 authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed will be present during any operation that affords access to sensitive areas is called:
• a. The sensitive material rule
• b. Controlled presence rule
• c. Two-man rule
• d. Controlled access rule
![Page 130: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/130.jpg)
65. Unavoidable drainage ditches, culverts, vents, ducts and other openings should be protected by securely fastened welded bar grills when the have a cross-sectional area greater than:
• a. 10 square inches
• b. 48 square inches
• c. 64 square inches
• d. 96 square inches
![Page 131: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/131.jpg)
65. Unavoidable drainage ditches, culverts, vents, ducts and other openings should be protected by securely fastened welded bar grills when the have a cross-sectional area greater than:
• a. 10 square inches
• b. 48 square inches
• c. 64 square inches
• d. 96 square inches
![Page 132: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/132.jpg)
65. Between the perimeter barrier and exterior structures should be a clear zone of:
• a. 10 feet
• b. 15 feet
• c. 30 feet
• d. 20 feet
![Page 133: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/133.jpg)
65. Between the perimeter barrier and exterior structures should be a clear zone of:
• a. 10 feet
• b. 15 feet
• c. 30 feet
• d. 20 feet
![Page 134: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/134.jpg)
66. As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:
• a. 50 feet
• b. 40 feet
• c. 30 feet
• d. 20 feet
![Page 135: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/135.jpg)
66. As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:
• a. 50 feet
• b. 40 feet
• c. 30 feet
• d. 20 feet
![Page 136: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/136.jpg)
67. Measured horizontally 6 inches above the ground and at least 30 feet outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:
• a. 0.5 foot candles
• b. 0.3 foot candles
• c. 0.4 foot candles
• d. 0.2 foot candles
![Page 137: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/137.jpg)
67. Measured horizontally 6 inches above the ground and at least 30 feet outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:
• a. 0.5 foot candles
• b. 0.3 foot candles
• c. 0.4 foot candles
• d. 0.2 foot candles
![Page 138: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/138.jpg)
68. Which of the following principles of protective lighting is not correct?
• a. Lighting should not be used alone. It should be used with other measures such as fixed security posts, fences, etc.
• b. Glaring lights should be in the eyes of the intruder
• c. A large amount of light should be focused on security patrol routes
• d. Adequate, even light should be upon bordering areas
![Page 139: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/139.jpg)
68. Which of the following principles of protective lighting is not correct?
• a. Lighting should not be used alone. It should be used with other measures such as fixed security posts, fences, etc.
• b. Glaring lights should be in the eyes of the intruder
• c. A large amount of light should be focused on security patrol routes
• d. Adequate, even light should be upon bordering areas
![Page 140: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/140.jpg)
69a. Piers and docks located on an installationshould be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
• a. 1.5 foot candles• b. 2.0 foot candles • c. 0.5 foot candles • d. 1.0 foot candles
![Page 141: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/141.jpg)
69a. Piers and docks located on an installationshould be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
• a. 1.5 foot candles• b. 2.0 foot candles • c. 0.5 foot candles • d. 1.0 foot candles
![Page 142: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/142.jpg)
69b. The water approaches (extending to a distance of 100 feet from the pier) should be illuminated to at least:
• a. 0.5 foot candles
• b. 2.0 foot candles• c. 1.5 foot candles• d. 1.0 foot candles
![Page 143: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/143.jpg)
69b. The water approaches (extending to a distance of 100 feet from the pier) should be illuminated to at least:
• a. 0.5 foot candles
• b. 2.0 foot candles• c. 1.5 foot candles• d. 1.0 foot candles
![Page 144: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/144.jpg)
70. Before installing protective lighting adjacent to navigable waters, the the following agency should be consulted for approval:
• a. Bureau of Customs• b. Transportation Department• c. Local Police Department• d. U.S. Coast Guard
![Page 145: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/145.jpg)
70. Before installing protective lighting adjacent to navigable waters, the the following agency should be consulted for approval:
• a. Bureau of Customs• b. Transportation Department• c. Local Police Department• d. U.S. Coast Guard
![Page 146: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/146.jpg)
71. An alarm system in which the installation-owned system is a direct extension of the civil police and/or fire alarm system is known as:
• a. Local alarm system• b. Central station system• c. Auxiliary system• d. Proprietary system
![Page 147: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/147.jpg)
71. An alarm system in which the installation-owned system is a direct extension of the civil police and/or fire alarm system is known as:
• a. Local alarm system• b. Central station system• c. Auxiliary system• d. Proprietary system
![Page 148: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/148.jpg)
72. Which of the following types of locking devices is generally considered to have the poorest security value:
• a. Key locks• b. Cypher locks• c. Conventional combination locks• d. Manipulation-resistant combination locks
![Page 149: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/149.jpg)
72. Which of the following types of locking devices is generally considered to have the poorest security value:
• a. Key locks• b. Cypher locks• c. Conventional combination locks• d. Manipulation-resistant combination locks
![Page 150: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/150.jpg)
73. Money safes are classified by both Underwriters Laboratories (UL) and:
• a. The Bureau of Standards• b. The Insurance Services Office (ISO)• c. The FBI• d. The Federal Reserve Board
![Page 151: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/151.jpg)
73. Money safes are classified by both Underwriters Laboratories (UL) and:
• a. The Bureau of Standards• b. The Insurance Services Office (ISO)• c. The FBI• d. The Federal Reserve Board
![Page 152: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/152.jpg)
74. Vaults will usually be designed to meet fire protection standards specified by:
• a. American Society for Industrial Security• b. National Fire Protection Association• c. Local fire department• d. All of the above
![Page 153: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/153.jpg)
74. Vaults will usually be designed to meet fire protection standards specified by:
• a. American Society for Industrial Security• b. National Fire Protection Association• c. Local fire department• d. All of the above
![Page 154: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/154.jpg)
75. A major study on private security was prepared by:
• a. International Association of Chiefs of Police
• b. American Society for Industrial Security• c. Private Security Task Force of the National
Advisory Committee on Criminal Justice Standards and Goals
• d. The Brookings Institute
![Page 155: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/155.jpg)
75. A major study on private security was prepared by:
• a. International Association of Chiefs of Police
• b. American Society for Industrial Security• c. Private Security Task Force of the
National Advisory Committee on Criminal Justice Standards and Goals
• d. The Brookings Institute
![Page 156: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/156.jpg)
76. According to a Rand Corporation study made in 1971 regarding guards, the typical private guard is:
• a. An aging black male• b. Poorly educated and poorly paid• c. Well educated and poorly paid• d. Middle-aged white
![Page 157: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/157.jpg)
76. According to a Rand Corporation study made in 1971 regarding guards, the typical private guard is:
• a. An aging black male• b. Poorly educated and poorly paid• c. Well educated and poorly paid• d. Middle-aged white
![Page 158: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/158.jpg)
Significant NotesSignificant Notes
Physical Security
![Page 159: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/159.jpg)
One 100 watt light bulbequals approximately
1700 lumens
![Page 160: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/160.jpg)
Illuminance
a. measured in Lux, representing the number of lumens per square meter or Foot-candles (FC), the number of Lumens per square foot
b. One Foot-candle is equal to 10.76 Lux(approximately to a ratio of 1:10)
![Page 161: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/161.jpg)
Candle power - one candle power is the amount of light emitted by one standard candle
Lumen - One lumen is the amount of light required to light an area of one square foot to one candle power
Foot candle - One foot candle equals one lumen of light per square foot of space. The intensity of illumination is measured in foot candles
![Page 162: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/162.jpg)
Specifications:carries the most weight and is considered the controlling document of the construction
![Page 163: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/163.jpg)
Three basic types of glass:
1. Sheet Glass : least expensive and most vulnerable to breakage
2. Plate Glass : mirrors
3. Float Glass : most recent advance in glass manufacture
![Page 164: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/164.jpg)
Tempered Glass:a. treated to resist breakageb. 3 to 5 times stronger
Laminated Glass:a. used in Detention Facilitiesb. Highly shatter resistant
![Page 165: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/165.jpg)
Bullet resisting glass:a. Laminated glassb. “spalding” will not occur
** small fragments that fall off the backside of the material
![Page 166: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/166.jpg)
Acrylic glass:a. good for bullet resisting
applicationsb. not good for burglary
resistance
![Page 167: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/167.jpg)
SAFES:Class M: 1/4 hrClass 1: 1/2 hrClass 2: 1 hrClass 3: 2 hrs
Note: A burglary safe is not normally fire rated
![Page 168: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/168.jpg)
4 stages of fire
1. Incipient stage2. Smoldering stage3. Flame stage4. Heat stage
![Page 169: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/169.jpg)
Color RenditionThe ability of a lamp to faithfully reproduce the colors seen in an object
measured as a Color Rendition Index (CRI) on a scale of 0 to 100
![Page 170: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/170.jpg)
Color Rendition IndexIncandescent : 100Halogen : 100Fluorescent : 75-100Metal Halide : 70Mercury Vapor: 50High pressure sodium: 20Low pressure sodium : 5
![Page 171: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/171.jpg)
Protective Lighting
• There are 8,760 hours in a year
• a lamp that is on for 8 hours a day will burn for 2,290 hours per year
![Page 172: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/172.jpg)
A cost benefit analysis is a direct comparison of the costs of the operation of the security unit and all security measures with the amount of corporate property saved or recovered as well as reduction of losses caused by injuries and lost production time.
![Page 173: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/173.jpg)
No security measure should be recommended which is not
cost effective
![Page 174: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/174.jpg)
The perimeter band of lighting must provide a minimum intensity of 0.2 foot candles, measured horizontally 6 inches above ground, at least 30 feet outside the exclusion area barrier
![Page 175: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/175.jpg)
The basic principles of operation of intrusion detection systems are:
a. Breaking an electrical circuitb. Interrupting a light beamc. Detecting soundd. Detecting vibratione. Detecting a change in
capacitance due to penetration of an electrostatic field
![Page 176: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/176.jpg)
The three main lines of defense for physical security are:
a. Perimeter barriers - located at outer edge of property - first line of defense
b. Exterior walls, ceilings, roofs and floors of buildings themselves, considered the second line of defense
c. Interim areas within the building
![Page 177: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/177.jpg)
The most frequently used fencing for security purposes is
chain-link fencing
![Page 178: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/178.jpg)
An advantage of chain-link fencing is that it affords visibility on both sides of the perimeter barrier to police and security officer
![Page 179: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/179.jpg)
The cone of illumination from light source should be directed downward and away from the structure or area protected and away from security personnel assigned to such protection
![Page 180: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/180.jpg)
Specifications regarding use of chain-link fences are as follows:
a. Must be constructed of 7 foot material excluding top guard
b. Must be of 9 gauge or heavierc. Mesh openings are not to be larger than 2” per sided Should be a twisted and barbed salvage at top and
bottome. Must be securely fastened to rigid metal or
reinforced concrete posts set in concrete f. Must reach within 2 inches of hard ground or paving g. On soft ground must reach below surface deep
enough to compensate for shifting soil or sand
![Page 181: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/181.jpg)
Any safe that weighs less than 750 pounds should be anchored to building structure
![Page 182: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/182.jpg)
Combination to safe locks and padlocks should be changed at least
once each 12 month period and on the loss or possible compromise of the combination, or on the discharge, suspension or reassignment of any
person having knowledge of combination
![Page 183: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/183.jpg)
Inventories of key systems should be conducted at least
annually
![Page 184: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/184.jpg)
There is a similarity between physical security surveys and crime prevention surveys, but one of the differences is that physical security measures are oriented more toward the security of property and facilities whereas crime prevention measures focus on the deterrence of criminal activity regardless of the physical safeguards available.
![Page 185: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/185.jpg)
The number of personnel required to cover a single post around the clock providing coverage for three eight-hour shifts is 4-1/2 (5 actual persons). This allows for vacations, sick leave, etc.
![Page 186: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/186.jpg)
Where possible, the parking area should be separated from all other areas of the facility
![Page 187: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/187.jpg)
A vibration sensor detects forced entry through metal barriers placed over windows and ventilators or attempts to drill, saw or cut through walls, ceilings, floors or doors
![Page 188: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/188.jpg)
As a general rule, windows less than 18 feet from the ground or less than 14 feet from trees, poles or adjoining buildings should be protected if they are larger than 96 square inches in area
![Page 189: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/189.jpg)
Signs are advisable at no more than 100 foot intervals along the perimeter stating that the property is not open to the public and intruders will be prosecuted
![Page 190: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/190.jpg)
A clear zone of 50 feet or more should exist between the perimeter barrier and structures within the protected area except when a building wall constitutes part of the perimeter barrier
![Page 191: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/191.jpg)
Gaseous discharge lamps are mercury vapor lamps (soft blue light) and sodium vapor lamps (soft yellow light). They require 2-5 minutes to light when cold and longer periods to re-light when hot.
![Page 192: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/192.jpg)
A light source for perimeter fence lighting should be located sufficiently within the protected area and above the fence so the light pattern will cover a ground area
![Page 193: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/193.jpg)
Barriers
• Two major categories– Structural– Natural
• Three basic purposes– Deter/delay– Psychological deterrent– Supplement and/or complement security needs
![Page 194: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/194.jpg)
Barriers
• When the greatest degree of security is essential, two lines of structural barriers should be installed on the perimeter. These barriers should be separated by not less than 15 feet and not more than 150 feet for best protection and control
![Page 195: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/195.jpg)
Barriers
• Four types of fencing authorized for use in protecting restricted areas are:– Chain-link– Barbed wire– Concertina– Barbed tape
![Page 196: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/196.jpg)
Barriers• Chain-link
– Must be 7 foot high excluding top guard– 9 gauge or heavier– Mesh openings not to be larger than 2 inches– twisted and barbed salvage at top and bottom– fastened to rigid metal or reinforced concrete
posts set in concrete– Must reach within 2” of hard ground or paving– Soft ground - reach deep enough to compensate
for shifting soil
![Page 197: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/197.jpg)
Barriers• Chain-link
• Most frequently used fencing for security purposes
• Disadvantage of chain-link fencing is that it creates an “institution-like atmosphere”
![Page 198: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/198.jpg)
Barriers• Barbed wire
• Standard barbed wire is twisted, double-strand, 12 gauge wire, with 4 point barbs spaced an equal distance apart– Not be less than 7 feet high, excluding top guard– Firmly attached to posts not more than 6’ apart– Distance between strands not more than 6” and at
least one wire will be interlaced vertically and midway between posts.
![Page 199: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/199.jpg)
Barriers• Concertina wire
• Is a commercially manufactured wire coil of high-strength-steel barbed wire clipped together at intervals to form a cylinder
• Opened concertina wire is 50 feet long and 3 feet in diameter
![Page 200: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/200.jpg)
Barriers• Barbed tape
• Composed of three things– Barbed wire– Barbed tape dispenser– Concertina tape
• Barbed tape is fabricated from a steel strip with a minimum breaking system of 500 lbs.
• 7/16” barbs spaced at 1/2” intervals along each side
![Page 201: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/201.jpg)
Barriers• Top Guard
• An overhang of barbed wire or barbed tape along the top of the fence, facing outward and upward at approximately a 45-degree angle.
• Top guard supporting arms will be permanently affixed to the top of the fence posts to increase the overall height of the fence at least one foot.
![Page 202: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/202.jpg)
Barriers• Top Guard
• Three strands of barbed wire, spaced 6 inches apart, must be installed on the supporting arms
![Page 203: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/203.jpg)
Barriers• Manhole covers
• 10 inches or more in diameter, must be secured to prevent unauthorized opening
• Over 50% of all break-ins are through window glass
![Page 204: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/204.jpg)
Alarms
• Fail-Safe– A term applied to a system designed so that if a
component fails to function properly the system will, by a signal or otherwise, indicate its incapacity
• False Alarm– Activation of sensors for which no cause can be
determined
![Page 205: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/205.jpg)
Alarms
• Microwave Sensor– A radio/radar frequency (RF) transmitter
having a frequency range of GHz, which detects motion
• Passive Ultrasonic Sensor– Detects the sound of forced entry throughout
walls, ceilings and doors
![Page 206: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/206.jpg)
Alarms
• Ultrasonic– The frequency range of sound that is above the
capabilities of normal human hearing. In intrusion detection systems, it usually varies between 21,500 and 26,000 Hz
![Page 207: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/207.jpg)
Alarms
• Types of alarm systems
– Electro-mechanical - Metallic foil, Magnet Switches, Wire Service Detection, Pressure Mats, Ribbons or Wafers
– Volumetric - Capacitance, Vibration, Microwave, Ultrasonic, Passive Infrared, Photo Electric
![Page 208: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/208.jpg)
Alarms
• Types of alarm detection systems– Local alarm system - activate a visual or
audible signal in the immediate vicinity of the object of protection
– Auxiliary system - the installation-owned system is a direct extension of the police and/or fire alarm system. This is the least effective system
![Page 209: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/209.jpg)
Alarms
• Types of alarm detection systems– Central station system - Alarms are
transmitted to a central station outside the installation from which appropriate action is taken such as notifying local police or fire departments
![Page 210: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/210.jpg)
Alarms
• Types of alarm detection systems– Proprietary system - Similar to the central
station system, except is owned by and is located on the installation. The response to the alarm is by the installation’s own security or fire-fighting personnel
• It has been estimated that 90-98% of all alarms are false
![Page 211: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/211.jpg)
Protective Lighting
• Protective lighting should enable security force personnel to observe without being seen.
• Four general types of protective lighting: – Continuous - most common– Standby– Movable– Emergency
![Page 212: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/212.jpg)
Protective Lighting
• Continuous Lighting (CL)– Two primary methods of employing CL
• Glare projection
• Controlled lighting
• Quartz Lamps– Emit a very bright white light and snap in rapidly– Excellent for use along perimeters and in critical
areas– Frequently used at very high wattage
![Page 213: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/213.jpg)
Protective Lighting
• Floodlights– Directional, with some diffusion to light specific
areas
• Searchlights– concentrated beam, used for illumination of
boundaries
![Page 214: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/214.jpg)
Protective Lighting
• Fresnels– Wide beam units for long horizontal strips. They
project a narrow beam approximately 180 degrees in the horizontal and from 15 -30 degrees in the vertical plane. An appropriate application is to light parameters since little light is lost vertically
• Street Lights– Diffused light widely used in parking areas
![Page 215: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/215.jpg)
Safes and Vaults
• UL Money Safe Classifications– TL-15 - 750 pounds or anchored / Body is 1”
steel or equal – TL-30 - 750 pounds or anchored – TRTL-30 - At least 750 pounds– TRTL-30X6 - At least 750 pounds / 6 sides– TXTL-60 - At least 1,000 pounds / resist attack
with 8 oz of nitroglycerin or it’s equal
![Page 216: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/216.jpg)
Safes and Vaults
• Burglary-resistive safe– As a general rule, require the door be made of
steel at least 1-1/2 inches thick
• Vaults are described as enlarged safes
• Alarms for vaults:– Capacitance – Vibration
![Page 217: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/217.jpg)
Locks and Key Systems• Cypher locks - digital combination door
locking device
• Disc tumbler locks - often called wafer locks
• Lever locks - Used in safe deposit boxes and are difficult to pick
![Page 218: Physical Security Sample Questions. 1.The degree of protection desired in any installation is predicated upon an analysis of the following two factors:](https://reader036.fdocuments.in/reader036/viewer/2022070323/56649d975503460f94a80a83/html5/thumbnails/218.jpg)
Locks and Key Systems
• In selecting combination numbers, multiples and simple ascending or descending arithmetical series should be avoided