You are on page 1of 5

1.

In a security survey, points of security concern may include: General Purpose of the building

2. Which of the following is not a precaution you can take to reduce static electricity? Power

Line Conditioning

3. __________ are the last line of defense in physical security. People

4. The estimated lifetime of a device or the estimated timeframe until a component within a

device gives out is called ________. Mean Time Between Failures (MTBF)

5. A security risk analysis is a more in-depth study than a security survey, and includes: All of the

above

6. When determining who will be admitted to the facility and who will be allowed unrestricted

access within it, vital areas requiring access controls include (mark all that apply): Vault or

strong room, Alarm stations

7. In a security audit, the objective to auditing exterior access controls is: To determine if

sufficient controls are in place to deter and detect unauthorized access to the outside of the

facility

This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00

https://www.coursehero.com/file/48749863/Midterm1docx/
8. Match the following

A reduction of voltage by the utility company for a prolonged period of time. Brownout

Used to detect open windows or doors—many work on magnetic switches that close the

electrical circuit when the window is opened and moves the magnet away from the electrical

switch. Electrical circuits

A power surge generated by a person or device contacting another device and transferring a

high voltage shock.

Electrostaticdischarge

Can assist in low-light conditions and augment closed circuit TV cameras to monitor an area at

night. Infrared/night vision lighting

The initial surge of current experienced when power supply resumes after failure. This can

damage equipment or cause breakers to trip/fail. In rush current

A natural occurrence that happens when unwanted signals are generated in circuits that are in

close proximity. Interference (Noise)

This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00

https://www.coursehero.com/file/48749863/Midterm1docx/
Involves cutting a key to the maximum depth on all cuts and hammering the key with a

“Tomahawk” (a flexible hammer) to transfer maximum force to all of the pins so that they jump

into open position.Lock Bumping

Receiver diode picks up transmitted and “bounced” energy waves in an enclosure. Intruder

disrupts the waves and activates the alarm. Microwave

Most work on Passive Infrared technology. Various types may autodial an emergency number,

sound an alarm, or trigger lights when they sense motion. Motion Sensors

Basic functions include validating software and release levels (Firewall, Antivirus, Anti-Spam,

etc.) and providing login security to the device and the network. Network Access Control

(NAC)

Objects radiate infrared with the heat of their bodies. Detector notes the change and triggers an

alarm. Passive Infrared

Use of buried fiber and pressure plates to detect vehicles and persons travelling close to the

buried cable. Pressure/motion sensitive

This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00

https://www.coursehero.com/file/48749863/Midterm1docx/
Microphones and other monitoring equipment are used to detect changes in sound or listen in to

a facility . Sounds and vibration

Active infrared beam that triggers an alarm when the beam is broken. Photoelectric

A short period of low voltage. Sag/Dip

Lighting with a battery supply that is automatically turned on when power goes out.

Standby/backup lighting

These form a separate rectangular metal piece that is inserted into the door jam. Strike/strike

plate

9. How high should a fence be to 100% prevent an intruder? The Fence Does not exist

10. When an intruder uses another person’s access card to gain entrance into a facility, this is

called ______________. piggybacking

11. Which of the following is not true about intrusion detection systems (motion detectors,

vibration sensors, light beams)? they are foolproof

12. In risk management, removing the source of a risk is called: risk avoidance

13. Which control helps to ensure that a criminal is caught? locks

14. Data Centers should be humidity free to keep moisture out of computers. False

This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00

https://www.coursehero.com/file/48749863/Midterm1docx/
15. The main risks that physical security components combat are all of the following except:

Denial of Service attack

16. The communication system for security force should include at least: all the above

17. The most costly countermeasure to reducing physical security risks is often _________.

personnel

18. Functions of barriers include (mark all that apply): Define Boundaries, Delay Access, Deny

Access

19. A static charge of ______ volts is able to cause disk drive data loss. 1500

20. Which of the following does not describe the use of security guards? they are not expensive

21. The vulnerability of a facility to damage or attack may be assessed by all of the following

except: security budget

This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00

https://www.coursehero.com/file/48749863/Midterm1docx/
Powered by TCPDF (www.tcpdf.org)

You might also like