Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

physical security Question 1 Many urban settings seem to discourage informal social control because: a. Designers prefer to rely on formal social control. b. Economic and political priorities took precedence over security. c. Crime rates dropped. d. It is no longer needed. Question 2 According to results of studies in Detroit, all features but _______ could help decrease the probability of crime: a. Condition and maintenance of buildings b. Mixtures of land use c. Pets on the premises d. Rates of pedestrian traffic Question 3 Crime Prevention Through Environmental Design (CPTED) should be treated with caution because: a. It takes too much time to implement. b. Most law enforcement agencies will not cooperate. c. It has been proven to be ineffective. d. Many projects may not be cost effective. Question 4 Building interior security strategies focus on providing defense against: a. Unauthorized entry to buildings b. Unauthorized entry to personal space c. Unauthorized entry to building sites d. Unauthorized entry to neighboring areas Question 5 CPTED current projects in cities across the country have: a. Kept businesses out of the area to discourage criminals from coming in b. Cut outside lighting c. Reduced opportunities for crime d. Cut transportation to keep criminals from getting to the area Question 6 A “rate” is often the same thing as a: a. Annual loss exposure b. Probability c. Frequency d. All of the above Question 7 _______________ are placed on or around the target to be protected. a. Interior sensors b. Intrusion sensors c. Interior boundary penetration sensors d. Point sensors Question 8 In a security survey, points of security concern may include: a. The neighboring buildings b. General purpose of the building c. All of the above d. The cost of the security system Question 9 When conducting a crime analysis, raw data about reported crimes and known offenders may come from: a. Crime and arrest reports b. Security officer reports c. Internet and newspaper sources d. All of the above Question 10 The most common type of lighting unit utilized in street lighting is: a. High-intensity sodium vapor lamp b. Incandescent lamp c. Mercury vapor lamp d. Metal halide lamps Question 11 Minimum security is designed to _______________ unauthorized external activity: a. Detect and impede some b. Impede some c. Impede all d. Detect and impede all Question 12 A design-reference threat: a. Is essential for cost-effective planning of a security system b. Defines the level of threat the facility’s physical protection system can handle c. Lists threats in order of credibility d. All of the above Question 13 Other components of protecting an objective include: a. Vault or other safe room b. High-security doors and windows c. Walls, ceilings, and floors d. All of the above Question 14 Research to justify a proposal of a security design/upgrade is based on: a. Area crime rates b. The company’s budget c. LLEA perception d. The company’s past experience Question 15 Structural protective barriers include (mark all that apply) a. Cliffs b. Walls c. Water obstacles d. Ditches Question 16 Functions of barriers Not include : a. Design layout b. Deny access c. Delay access d. Define boundaries Question 17 To harden an existing door against tool attack, the customary practice is to: a. Add steel bars inside the door. b. Add a two-cylinder dead bolt. c. Add steel bars to the outside of the door. d. Clad the door with sheet metal or steel plate. Question 18 In resistance to forced entry tests, it was determined that 4 pounds of explosives and 20-pound bolt cutters would penetrate a roof of 5 ½-inch thick concrete with steel reinforcing rods in _________ minutes. a. Approximately 5 b. Approximately 3 c. Approximately 7 d. Approximately 2 Question 19 The U.S. Nuclear Regulatory Commission requires that protected area fences be topped with: a. At least two strands of barbwire angled outward at 20–30o b. At least three strands of barbwire angled outward at 30–40o c. At least five strands of barbwire angled outward at 30–40o d. At least four strands of barbwire angled outward at 20–30o Question 20 What advantage(s) can come from having a river as a natural boundary, when used in conjunction with more traditional barriers such as fencing? a. Can better hear adversaries coming b. More difficult to approach than over ground c. All of the above d. Clear view to approach route Question 21 Personal defense strategies NOT include: a. Increased pedestrian traffic areas b. Police patrols c. Organizing and mobilizing citizens d. Urging people to carry minimal cash Question 22 Low-cost techniques to modify existing physical design include: a. Establishing audio and video surveillance b. Reducing public access points c. Installing security devices d. Building a new parking garage Question 23 Possible outcomes of a security event involving a sensor include (mark all that apply): a. The sensor successfully rebuffs a human-size object. b. The sensor successfully detects a human-size object. c. The sensor fails to ignore a smaller-than-human-size object d. The sensor fails to rebuff a human-size object. Question 24 Access control refers to (mark all that apply): a. Determining authorized entry parameters b. Physical equipment used to control movement of people or material c. Process of managing databases d. Ensuring that assets are not removed without proper authorization Question 25 A functional requirement addresses (mark all that apply): a. Terrain or facility layout b. Federal safety requirements c. Stakeholder, customer, and user needs and desires d. Product and level of detail Question 26 Once a system has been installed, it is supplemented by _____________ tests (mark all that apply). a. Communications b. Performance c. Operational d. Functional Question 27 What are some reasons to conduct a security review? Mark all that apply. a. To determine threats and risk, as well as the asset vulnerability b. To identify what assets need to be protected c. To prove to potential adversaries that assets are protected d. To demonstrate why security should be a budget line item Question 28 Recommendations for security classifications include (mark all that apply): a. Low b. Maximum c. Minimum d. Medium Question 29 12. Some of the advantages of citizen patrols are (mark all that apply): a. Use existing behavior patterns b. Tend to be short-lived c. May aggravate community tensions d. Effectively perform surveillance Question 30 During an audit of the interior access controls, verify that (mark all that apply): a. Verify that building access points below the third floor are secured to prevent entry. b. Verify that there are physical deterrents to impede vehicular access to lobbies or other glassed areas in buildings. c. Verify that all master level keys are adequately controlled. d. Verify that panic alarm devices are located in staffed lobbies. Question 31 Medium security facilities might include (mark all that apply): a. Bonded warehouse b. Large industrial manufacturing plants c. GoverBonded warehousesnment special research sites d. Small retail stores Question 32 High-level security would include (mark all that apply): a. Perimeter alarm b. Highly trained armed guards equipped with communication devices c. Controls to restrict access d. Varying degree of coordination with local law enforcement authorities Question 33 If a system includes a neutralization capacity, it will likely add to its security system (mark all that apply): a. Response force b. Advanced alarm system c. CCTV d. Coordination with local law enforcement Question 34 When determining who will be admitted to the facility and who will be allowed unrestricted access within it, vital areas requiring access controls include (mark all that apply): a. Vault or strong room b. Outside area leading to the facility c. The facility itself d. Alarm stations Question 35 The security plan should include (mark all that apply): a. Bi-annual assessments b. Description of the facility’s security organization c. Description of the facility’s security lighting d. Discussion of the budget needed to implement the plan Question 36 When formulating the approach to presenting the security design/upgrade plan, the format should be based on: a. Proposals from other security designers b. Time before the meeting c. Personal knowledge of the approving authority d. Personal experience Question 37 When planning a perimeter barrier, which are untrue? (Mark all that apply.) a. Fencing is usually more expensive than walls. b. To be more cost-effective, the perimeter fence or wall only needs illumination at the entrances. c. A security guard detail should support the perimeter security. d. Walls are more expensive than CCTV and exterior lighting. Question 38 Emergency door locking mechanism types include (mark all that apply): a. Panic bar with chains b. Access key and lock c. Panic bar replaced with a rim device d. Panic bar with stiles that overlap when the door closes Question 39 If the floor of the room where the asset is held is not penetration resistant, options include: a. All of the above b. Getting rid of the asset c. Moving the asset to another room on the ground floor or in the basement d. Increase floor’s thickness with rebar, reinforcing wire, and concrete Question 40 A minimum depth of 8 feet is recommended for a moat because (pick all that apply): a. Getting inside the moat would likely injure anyone trying to gain access to the facility. b. All of the above. c. It would be nearly impossible for any commercially available vehicle to climb out from that depth. d. large, bulky ladder would be needed to get to the top of the moat on the interior side.

physical security

 Question 1

Many urban settings seem to discourage informal social control because:

a.

Designers prefer to rely on formal social control.

b.

Economic and political priorities took precedence over security.

c.

Crime rates dropped.

d.

It is no longer needed.

Question 2

According to results of studies in Detroit, all features but _______ could help decrease the probability of crime:

a.

Condition and maintenance of buildings

b.

Mixtures of land use

c.

Pets on the premises

d.

Rates of pedestrian traffic

Question 3

Crime Prevention Through Environmental Design (CPTED) should be treated with caution because:

a.

It takes too much time to implement.

b.

Most law enforcement agencies will not cooperate.

c.

It has been proven to be ineffective.

d.

Many projects may not be cost effective.

Question 4

Building interior security strategies focus on providing defense against:

a.

Unauthorized entry to buildings

b.

Unauthorized entry to personal space

c.

Unauthorized entry to building sites

d.

Unauthorized entry to neighboring areas

Question 5

CPTED current projects in cities across the country have:

a.

Kept businesses out of the area to discourage criminals from coming in

b.

Cut outside lighting

c.

Reduced opportunities for crime

d.

Cut transportation to keep criminals from getting to the area

Question 6

A “rate” is often the same thing as a:

a.

Annual loss exposure

b.

Probability

c.

Frequency

d.

All of the above

Question 7

_______________  are placed on or around the target to be protected.

a.

Interior sensors

b.

Intrusion sensors

c.

Interior boundary penetration sensors

d.

Point sensors

Question 8

In a security survey, points of security concern may include:

a.

The neighboring buildings

b.

General purpose of the building

c.

All of the above

d.

The cost of the security system

Question 9

When conducting a crime analysis, raw data about reported crimes and known offenders may come from:

a.

Crime and arrest reports

b.

Security officer reports

c.

Internet and newspaper sources

d.

All of the above

Question 10

The most common type of lighting unit utilized in street lighting is:

a.

High-intensity sodium vapor lamp

b.

Incandescent lamp

c.

Mercury vapor lamp

d.

Metal halide lamps

Question 11

Minimum security is designed to _______________ unauthorized external activity:

a.

Detect and impede some

b.

Impede some

c.

Impede all

d.

Detect and impede all

Question 12

A design-reference threat:

a.

Is essential for cost-effective planning of a security system

b.

Defines the level of threat the facility’s physical protection system can handle

c.

Lists threats in order of credibility

d.

All of the above

Question 13

Other components of protecting an objective include:

a.

Vault or other safe room

b.

High-security doors and windows

c.

Walls, ceilings, and floors

d.

All of the above

Question 14

Research to justify a proposal of a security design/upgrade is based on:

a.

Area crime rates

b.

The company’s budget

c.

LLEA perception

d.

The company’s past experience

Question 15

Structural protective barriers include (mark all that apply)

a.

Cliffs

b.

Walls

c.

Water obstacles

d.

Ditches

Question 16

Functions of barriers Not include :

a.

Design layout

b.

Deny access

c.

Delay access

d.

Define boundaries

Question 17

To harden an existing door against tool attack, the customary practice is to:

a.

Add steel bars inside the door.

b.

Add a two-cylinder dead bolt.

c.

Add steel bars to the outside of the door.

d.

Clad the door with sheet metal or steel plate.

Question 18

In resistance to forced entry tests, it was determined that 4 pounds of explosives and 20-pound bolt cutters would penetrate a roof of 5 ½-inch thick concrete with steel reinforcing rods in _________ minutes.

a.

Approximately 5

b.

Approximately 3

c.

Approximately 7

d.

Approximately 2

Question 19

The U.S. Nuclear Regulatory Commission requires that protected area fences be topped with:

a.

At least two strands of barbwire angled outward at 20–30o

b.

At least three strands of barbwire angled outward at 30–40o

c.

At least five strands of barbwire angled outward at 30–40o

d.

At least four strands of barbwire angled outward at 20–30o

Question 20

What advantage(s) can come from having a river as a natural boundary, when used in conjunction with more traditional barriers such as fencing?

a.

Can better hear adversaries coming

b.

More difficult to approach than over ground

c.

All of the above

d.

Clear view to approach route

Question 21

Personal defense strategies NOT include:

a.

Increased pedestrian traffic areas

b.

Police patrols

c.

Organizing and mobilizing citizens

d.

Urging people to carry minimal cash

Question 22

Low-cost techniques to modify existing physical design  include:

a.

Establishing audio and video surveillance

b.

Reducing public access points

c.

Installing security devices

d.

Building a new parking garage

Question 23

Possible outcomes of a security event involving a sensor include (mark all that apply):

a.

The sensor successfully rebuffs a human-size object.

b.

The sensor successfully detects a human-size object.

c.

The sensor fails to ignore a smaller-than-human-size object

d.

The sensor fails to rebuff a human-size object.

Question 24

Access control refers to (mark all that apply):

a.

Determining authorized entry parameters

b.

Physical equipment used to control movement of people or material

c.

Process of managing databases

d.

Ensuring that assets are not removed without proper authorization

Question 25

A functional requirement addresses (mark all that apply):

a.

Terrain or facility layout

b.

Federal safety requirements

c.

Stakeholder, customer, and user needs and desires

d.

Product and level of detail

Question 26

Once a system has been installed, it is supplemented by _____________ tests (mark all that apply).

a.

Communications

b.

Performance

c.

Operational

d.

Functional

Question 27

What are some reasons to conduct a security review? Mark all that apply.

a.

To determine threats and risk, as well as the asset vulnerability

b.

To identify what assets need to be protected

c.

To prove to potential adversaries that assets are protected

d.

To demonstrate why security should be a budget line item

Question 28

Recommendations for security classifications include (mark all that apply):

a.

Low

b.

Maximum

c.

Minimum

d.

Medium

Question 29

12.      Some of the advantages of citizen patrols are (mark all that apply):

a.

Use existing behavior patterns

b.

Tend to be short-lived

c.

May aggravate community tensions

d.

Effectively perform surveillance

Question 30

During an audit of the interior access controls, verify that (mark all that apply):

a.

Verify that building access points below the third floor are secured to prevent entry.

b.

Verify that there are physical deterrents to impede vehicular access to lobbies or other glassed areas in buildings.

c.

Verify that all master level keys are adequately controlled.

d.

Verify that panic alarm devices are located in staffed lobbies.

Question 31

Medium security facilities might include (mark all that apply):

a.

Bonded warehouse

b.

Large industrial manufacturing plants

c.

GoverBonded warehousesnment special research sites

d.

Small retail stores

Question 32

High-level security would include (mark all that apply):

a.

Perimeter alarm

b.

Highly trained armed guards equipped with communication devices

c.

Controls to restrict access

d.

Varying degree of coordination with local law enforcement authorities

Question 33

If a system includes a neutralization capacity, it will likely add to its security system (mark all that apply):

a.

Response force

b.

Advanced alarm system

c.

CCTV

d.

Coordination with local law enforcement

Question 34

When determining who will be admitted to the facility and who will be allowed unrestricted access within it, vital areas requiring access controls include (mark all that apply):

a.

Vault or strong room

b.

Outside area leading to the facility

c.

The facility itself

d.

Alarm stations

Question 35

The security plan should include (mark all that apply):

a.

Bi-annual assessments

b.

Description of the facility’s security organization

c.

Description of the facility’s security lighting

d.

Discussion of the budget needed to implement the plan

Question 36

When formulating the approach to presenting the security design/upgrade plan, the format should be based on:

a.

Proposals from other security designers

b.

Time before the meeting

c.

Personal knowledge of the approving authority

d.

Personal experience

Question 37

When planning a perimeter barrier, which are untrue? (Mark all that apply.)

a.

Fencing is usually more expensive than walls.

b.

To be more cost-effective, the perimeter fence or wall only needs illumination at the entrances.

c.

A security guard detail should support the perimeter security.

d.

Walls are more expensive than CCTV and exterior lighting.

Question 38

Emergency door locking mechanism types include (mark all that apply):

a.

Panic bar with chains

b.

Access key and lock

c.

Panic bar replaced with a rim device

d.

Panic bar with stiles that overlap when the door closes

Question 39

If the floor of the room where the asset is held is not penetration resistant, options include:

a.

All of the above

b.

Getting rid of the asset

c.

Moving the asset to another room on the ground floor or in the basement

d.

Increase floor’s thickness with rebar, reinforcing wire, and concrete

Question 40

A minimum depth of 8 feet is recommended for a moat because (pick all that apply):

a.

Getting inside the moat would likely injure anyone trying to gain access to the facility.

b.

All of the above.

c.

It would be nearly impossible for any commercially available vehicle to climb out from that depth.

d.

large, bulky ladder would be needed to get to the top of the moat on the interior side.

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now