• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
Unit 3 - Physical Security

What is "physical security planning"? Is is a recognized security process that is followed will result in the selection of _______ based on appropriateness.
Countermeasures

p. 76
Unit 3 - Physical Security

Effective secruity lighting acts as a _______ to intruders.
Deterrent

p. 78
Unit 3 - Physical Security

Polycardonate plastic is _______ and _______ resistive.
Bullets and Burglar/vandal

p. 79
Unit 3 - Physical Security

There are three components to an intrusion detection system: detectors/sensors, system controls and _______ devices.
System monitoring

p. 81
Unit 3 - Physical Security

Microwave detectors use high-frequency sound waves to establish a protected area.

Ture or False
True

p. 80
Unit 3 - Physical Security

Deadbolt locks should have a minimum of a 1/2" throw.

True or False
False

p. 82
Unit 3 - Physical Security

Card access systems permit accountability.

True or False
True

p. 81
Unit 3 - Physical Security

The most commonly used security fencing material is:

a. Barbed wire
b. Barbed tape
c. Chain-link
d. Welded wire mesh
c. Chain-link

p. 85
Unit 3 - Physical Security

The minimum height of a security fence should be:

a. 7 feet
b. 6 feet
c. 8 feet
d. 9 feet
a. 7 feet

p. 85
Unit 3 - Physical Security

Which of the following types of lighting are only lit on a as-required basis?

a. Continuous
b. Standby
c. Moveable
d. Emergancy
b. Standby

p. 78
Unit 3 - Alarm Systems

In many cases, _______ _______ form the backbone of a facility's physical protection program.

a. Alarm systems
b. Covert surveillance
c. Report writting
d. Physical force
a. Alarm systems.

P. 87
Unit 3 - Alarm Systems

The primary purpose of an alarm system is:

a. To conduct area surveillance
b. To serve as a physical barrier
c. To provide early warning of an intruder
d. Lower insurance rates
c. To provide early warning of an intruder

P. 87
Unit 3 - Alarm Syaytems

According to the text material, the most effective security is provided with a:

a. Technical approach
b. Layered approach
c. Large security force
d. Key and lock program
b. Layered approach

p. 87
Unit 3 - Alarm Systems

In more sophisticated alarm system, sensore are interfaced with electronic entry-contorl devices, CCTV, alarm reporting displays (both visual and audible) and _______ ________.

a. Police patrols
b. Aerial units
c. Sniper teams
d. Security lighting
d. Security lighting

p. 87
Unit 3- Alarm Sytems

How many different types of alarm monitoring were examined in the text?

a. Two
b. Three
c. Four
d. Six
c. Four

p. 87 - 88
Unit 3- Alarm Sytems

Which of the following is not a type of alarm monitoring?

a. Central station
b. Direct fire and police
c. Satellite
d. Proprietary
c. Satellite

p. 87 -88
Unit 3- Alarm Sytems

Logging decices are used for:

a. Recording system activities and faults
b. Controlling CCTV cameras
c. Recording time and attendance of security staff
d. Access control to computer networks
a. Recording system activities and faults

p. 88
Unit 3- Alarm Sytems

Alarm printers are typically:

a. Of the color laser types
b. Of the high-speed, continuous feed type
c. Black and white and medium speed
d. Eteremely expensive
b. Of the high-speed, continuous feed type

P. 88
Unit 3- Alarm Sytems

A glass-break sensor is an example of:

a. A permeter sensor
b. A spot sensor
c. An area sensor
d. A volumetric device
a. A permeter sensor

p. 88
Unit 3- Alarm Sytems

A duress alarm is also sometimes called:

a. A reset button
b. A panic button
c. An activation switch
d. A scilet partner
b. A panic button

p. 89
Unit 3- Central Alarms

The main door to the dispatch center should be unlocked at all times.

True or False
False

p. 93
Unit 3- Central Alarms

What is the minimium number of operators suggested by the Underwritters' Labs and the NBFAA for any dispatch center?
Two

p. 93
Unit 3- Central Alarms

The two most important tools in a dispatch center are the _______ and the _______.
Telephone and Radio

p. 93
Unit 3- Central Alarms

All types of alarm signals are collected by the reciever int he dispatch center.

True or False
True

p. 93
Unit 3- Central Alarms

The time clock was replaced by the ________ in modern dispatch centers.
Logging software

p. 93-94
Unit 3- Central Alarms

Some call boxes are equipped with a red light?

True or False
False

p. 94
Unit 3- Central Alarms

The _______ is a special telephone that connects the dispatch center with other agencies.
Hotline

p. 94
Unit 3- Central Alarms

The access card reader can be remotely controlled by the dipatch center.

True or False
False

p. 94
Unit 3- Central Alarms

Name two orginizations that provide training for dispatchers.
APCO and NENA

p. 94
Unit 3- Central Alarms

The _______ is at the heart of any security agency.
Control center

p. 93
Unit 3- Access Control

The point of entry where security is posted to control access is often referred to as a:

a. Storgae yard
b. Lunch room
c. Ckeckpoint
d. Physical security
c. Checkpoint

p. 96
Unit 3- Access Control

The policy for granting access should be kept:

a. In a secure file cabinet inaccessible by security personnel
b. In the site post orders
c. In a fire resistant waste receptacle
d. Posted in the facility lounge
b. In the site post orders

p. 97 - 98
Unit 3- Access Control

The use of _______ and watermarking make the replication of company identification more difficult.
Holograms

p. 97
Unit 3- Access Control

Signing in a security _______ at the front desk of a facility is a common form of controlling access.

a. Control
b. Guard
c. Garage
d. Register
d. Register

p. 97
Unit 3- Access Control

Access control records should be kept:

a. Until end of shift, then distroyed
b. 7 years
c. A period of time determined by your employer or the client
d. 30 days
c. A period determined by your employer or the client.

p. 97
Unit 3- Access Control

Advising the person that he or she has been denied access is an act best accomplished with diplomacy and _______
Respect

p. 97
Unit 3- Access Control

Besides its use as an audit trail, the register can be used by _______ in a facility emergency as a muster of who is inside.

a. Emergency services (fire, EMS)
b. Security management
c. Facility management
d. The criminal population
a. Emergency services (fire, EMS)

p. 97
Unit 3- Access Control

The three most popular access card techologies are _______, proximity and wiegand cards.
Magnetic strip

p. 99
Unit 3- Access Control

________ of regular occupants in a facility by the security officer is considered a very reliable form of controlling access.

a. Arrest
b. Recognition
c. Search
d. Control
b. Recognition

p. 96
Unit 3- Access Control

_______ recongination technology is intergrated in CCTV systems to identify individuals who are wanted by law enforcement.
Facial

p. 100