Professional Documents
Culture Documents
In a security survey, points of security concern may include: General Purpose of the building
2. Which of the following is not a precaution you can take to reduce static electricity? Power
Line Conditioning
4. The estimated lifetime of a device or the estimated timeframe until a component within a
device gives out is called ________. Mean Time Between Failures (MTBF)
5. A security risk analysis is a more in-depth study than a security survey, and includes: All of the
above
6. When determining who will be admitted to the facility and who will be allowed unrestricted
access within it, vital areas requiring access controls include (mark all that apply): Vault or
7. In a security audit, the objective to auditing exterior access controls is: To determine if
sufficient controls are in place to deter and detect unauthorized access to the outside of the
facility
This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00
https://www.coursehero.com/file/48749863/Midterm1docx/
8. Match the following
A reduction of voltage by the utility company for a prolonged period of time. Brownout
Used to detect open windows or doors—many work on magnetic switches that close the
electrical circuit when the window is opened and moves the magnet away from the electrical
A power surge generated by a person or device contacting another device and transferring a
Electrostaticdischarge
Can assist in low-light conditions and augment closed circuit TV cameras to monitor an area at
The initial surge of current experienced when power supply resumes after failure. This can
A natural occurrence that happens when unwanted signals are generated in circuits that are in
This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00
https://www.coursehero.com/file/48749863/Midterm1docx/
Involves cutting a key to the maximum depth on all cuts and hammering the key with a
“Tomahawk” (a flexible hammer) to transfer maximum force to all of the pins so that they jump
Receiver diode picks up transmitted and “bounced” energy waves in an enclosure. Intruder
Most work on Passive Infrared technology. Various types may autodial an emergency number,
sound an alarm, or trigger lights when they sense motion. Motion Sensors
Basic functions include validating software and release levels (Firewall, Antivirus, Anti-Spam,
etc.) and providing login security to the device and the network. Network Access Control
(NAC)
Objects radiate infrared with the heat of their bodies. Detector notes the change and triggers an
Use of buried fiber and pressure plates to detect vehicles and persons travelling close to the
This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00
https://www.coursehero.com/file/48749863/Midterm1docx/
Microphones and other monitoring equipment are used to detect changes in sound or listen in to
Active infrared beam that triggers an alarm when the beam is broken. Photoelectric
Lighting with a battery supply that is automatically turned on when power goes out.
Standby/backup lighting
These form a separate rectangular metal piece that is inserted into the door jam. Strike/strike
plate
9. How high should a fence be to 100% prevent an intruder? The Fence Does not exist
10. When an intruder uses another person’s access card to gain entrance into a facility, this is
11. Which of the following is not true about intrusion detection systems (motion detectors,
12. In risk management, removing the source of a risk is called: risk avoidance
14. Data Centers should be humidity free to keep moisture out of computers. False
This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00
https://www.coursehero.com/file/48749863/Midterm1docx/
15. The main risks that physical security components combat are all of the following except:
16. The communication system for security force should include at least: all the above
17. The most costly countermeasure to reducing physical security risks is often _________.
personnel
18. Functions of barriers include (mark all that apply): Define Boundaries, Delay Access, Deny
Access
19. A static charge of ______ volts is able to cause disk drive data loss. 1500
20. Which of the following does not describe the use of security guards? they are not expensive
21. The vulnerability of a facility to damage or attack may be assessed by all of the following
This study source was downloaded by 100000852705357 from CourseHero.com on 12-07-2022 13:28:56 GMT -06:00
https://www.coursehero.com/file/48749863/Midterm1docx/
Powered by TCPDF (www.tcpdf.org)