The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
What are the elements of a physical protection system?
A.
Determine, direct, dispatch, and report
B.
Deter, detect, delay, and response
C.
Display, develop, initiate, and apprehend
D.
Evaluate, determine, dispatch, and detain
Correct Answer
B. Deter, detect, delay, and response
Explanation A well-designed system provides protection-in-depth, minimizes the consequences of component failures, and exhibits balanced protection. The system itself typically has some elements that fall into the essence of deter–detect—delay–respond.
Rate this question:
2.
To successfully complete a vulnerability assessment, it is critical that protection
systems are well understood. This objective includes
A.
Threat definition, target identification, and facility characterization
B.
Threat definition, conflict control, and facility characterization
C.
Risk assessment, threat identifi cation, and incident review
D.
Threat identification, vulnerability appraisal, and access review
Correct Answer
A. Threat definition, target identification, and facility characterization
Explanation In the beginning, a good assessment requires the security professional to determine specific protection objectives. These objectives include threat definition, target identification, and facility characteristics.
Rate this question:
3.
Laminated glass is made from two sheets of ordinary glass bonded to a middle layer of resilient plastic. It may crack when it is struck, but the pieces of glass tend to stick to the plastic inner material. This glass is recommended in what type of locations?
A.
All exterior glass windows
B.
Interior boundary penetration and critical infrastructure facility
C.
Street-level windows, doorways, and other access areas
D.
Capacitance proximity, intrusion detection locations, and boundary penetration
sites
Correct Answer
C. Street-level windows, doorways, and other access areas
Explanation Laminated glass is recommended for installation in street-level windows, doorways, and other access areas.
Rate this question:
4.
Th e strategy of forming layers of protection around an asset or facility is
known as
A.
Secured perimeter
B.
Defense-in-depth
C.
Reinforced barrier deterrent
D.
Reasonable asset protection
Correct Answer
B. Defense-in-depth
Explanation In the concept of defense-in-depth, barriers are arraigned in layers with the level of security growing progressively higher as one comes closer to the center or the highest protective area. Defending an asset with a multiple postures can reduce the likelihood of a successful attack; if one layer of defense fails, another layer of defense will hopefully prevent the attack, and so on.
Rate this question:
5.
What crime reduction technique is used by architects, city planners,
landscapers, interior designers, and security professionals with the objective of
creating a physical environment that positively influences human behavior?
A.
Asset protection and vulnerability assessments
B.
Reducing vulnerability by protecting, off setting, or transferring the risk
C.
Crime prevention through environmental design
D.
Instituting employee screening and workplace violence programs
Correct Answer
C. Crime prevention through environmental design
Explanation Crime prevention through environmental design (CPTED) is a crime reduction technique that has several key elements applicable to the analysis of the building function and site design against physical attack. It is used by architects, city planners, landscapers, interior designers, and security professionals with the objective of creating a climate of safety in a community by designing a physical environment that positively influences human behavior.
Rate this question:
6.
The key to a successful physical protection system is the integration of:
A.
People, procedures, and equipment
B.
Technology, risk assessment, and human interaction
C.
Protecting, off setting, and transferring risk
D.
Detection, deterrence, and response
Correct Answer
A. People, procedures, and equipment
Explanation The key to a successful system is the integration of people, procedures, and equipment into a system that protects the targets from the threat. A well-designed system provides protection-in-depth, minimizes the consequences of component failures, and exhibits balanced protection.
Rate this question:
7.
What is the primary objective of controlling entry into a facility or area?
A.
Provide time management controls for all employees
B.
Ensure that only authorized persons are allowed to enter
C.
Keep potential hazards and contraband material out that could be used to
commit sabotage.
D.
Identification purposes
Correct Answer
B. Ensure that only authorized persons are allowed to enter
Explanation The primary function of an access control system (ACS) is to ensure that only authorized personnel are permitted inside the controlled area. This can also include the regulation and flow of materials into and out of specific areas. Persons subject to control can include employees, visitors, customers, vendors, and the public. Access control measures should be different for each application to fulfill specific security, cost, and operational objectives.
Rate this question:
8.
Security lighting for CCTV monitoring generally requires at least 1 to 2 footcandles (FC) of illumination. What is the required lighting needed for safety
considerations in perimeter areas such as parking lots or garages?
A.
3 fc
B.
5 fc
C.
7 fc
D.
10 fc
Correct Answer
B. 5 fc
Explanation Lights used for CCTV monitoring generally require at least one to two footcandles of illumination, whereas the lighting needed for safety considerations in exterior areas such as parking lots or garages substantially greater (at least 5 fc).
Rate this question:
9.
What would be the most appropriate interior sensor used for a building that
has windows along the ground floor?
A.
Infrared glass-break sensor
B.
Ultrasonic glass-break sensors
C.
Acoustic and shock wave glass-break sensors
D.
Volumetric sensors
Correct Answer
C. Acoustic and shock wave glass-break sensors
Explanation Glass-break sensors are a good intrusion detection device for buildings with a lot of glass windows and doors with glass panes. The use of dual-technology glass break sensors—acoustic and shock wave—is most effective. The reason is that if the only acoustic is used and an employee pulls the window blinds up, it can set off a false alarm; but if it is set to a dual-alarm system both acoustic and shock sensors will need to be activated before an alarm is triggered.
Rate this question:
10.
CCTV technologies make possible four distinct yet complementary functions.
Th e first is a visual assessment of an alarm or other event. This permits
the operator to assess the nature of the alarm before initiating a response.
What are the other three functions of CCTV?
A.
Surveillance, deterrence, and evidentiary archives
B.
Intrusion detection, response, and remediation
C.
Optical, lighting, and safety
D.
Monitoring, inspection, and response
Correct Answer
A. Surveillance, deterrence, and evidentiary archives
Explanation Uses of CCTV systems for security services include several diff erent functions: surveillance, assessment, deterrence, and evidentiary archives.
Rate this question:
11.
Businesses face new and complex physical security challenges across the full
spectrum of operations. Although security technologies are not the answer
to all organizational security problems, if applied appropriately what will they
provide?
A.
Reducing electrical costs
B.
Th ey can enhance the security envelope and in the majority of cases will
save the organization money
C.
Government tax incentives for increased physical protection systems
D.
Increased capital value of property with high-tech integrated technologies
Correct Answer
B. Th ey can enhance the security envelope and in the majority of cases will
save the organization money
Explanation These days, all businesses face new and complex physical security challenges across the full spectrum of operations. Although security technologies are not the answer to all organizational security problems, if applied appropriately, they can enhance the security envelope and, in the majority of cases, will save the organization money.
Rate this question:
12.
A vulnerability assessment tour of a facility is designed to gather information
regarding the general layout of the facility, the location of key assets, information
about facility operations and production capabilities, and locations and
types of physical protection systems. During this tour and subsequent tours
the assessment of any vulnerability of a facility or building should be done
A.
Determining where all the fi re exits are located
B.
Within the context of the defi ned threats and the value of the organization’s
assets
C.
Counting the number of employees within the facility
D.
Determining the structural strength of the perimeter walls
Correct Answer
B. Within the context of the defi ned threats and the value of the organization’s
assets
Explanation The assessment of any facility or building's vulnerability should be done within the context of the defined threats and the value of the organization’s assets. Each element of the facility should be analyzed for vulnerabilities to each threat, and a vulnerability rating should be assigned. A vulnerability assessment may change the value rating of assets due to identifying critical nodes or some other factor that makes the organization’s assets more valuable.
Rate this question:
13.
Designing a new building to mitigate threats is simpler and more cost-effective than retrofitting an existing building. Important security benefits are achieved not by hardware and electronic devices but by shrewd site selection, proper placement of the building on the site, and careful location of the building occupants and functions to minimize exposure to the threat. These factors also have the benefit of reducing operating expenses over the lifetime of the building.
An obvious example of this is planning for:
A.
Limiting the number of entrances to the site that must be monitored,
staffed and protected
B.
Reducing the cost associated with energy needs in providing the physical
protection system
C.
Giving employees easy access to the facility without their knowledge of the
security components used in monitoring their activities
D.
Blast reinforcement fi lm on all perimeter windows
Correct Answer
A. Limiting the number of entrances to the site that must be monitored,
staffed and protected
Explanation Gates exist to facilitate and control access. Gates need to be controlled to ensure that only authorized persons and vehicles pass through. It is best to minimize the number of gates and access points because any opening is always a potential vulnerability. Each gate requires resources whether it uses electronic access control or a guard. The fewest number of entry points, the better the control of the facility.
Rate this question:
14.
All visitors entering the facility should sign in and out on a visitor’s log,
whether a pen and paper system or a computer-based system, to maintain
accountability of who is in the facility. This system is also established for what other reasons?
A.
For the purpose of detection, accountability, and the necessity for response
B.
Access control and surveillance
C.
Timeframe of the visit, who was visited, and in the case of an emergency
have accountability of everyone for safety purposes
D.
For planning assessment and the requirements of proper designation
Correct Answer
C. Timeframe of the visit, who was visited, and in the case of an emergency
have accountability of everyone for safety purposes
Explanation All visitors entering the facility should sign in and out on a visitor’s log to maintain accountability of who is in the facility, the timeframe of the visit, who they visited, and in the case of an emergency have the accountability of everyone for safety purposes.
Rate this question:
15.
What are the means of protecting the physical devices associated with the
alarm system through line supervision, encryption, or tamper alarming of
enclosures and components?
A.
Tamper protection
B.
Target hardening
C.
Security design
D.
UL 2050
Correct Answer
A. Tamper protection
Explanation Tamper protection is the means of protecting the physical devices associated with the alarm system through line supervision, encryption or tamper alarming of enclosures and components.
Rate this question:
16.
When using a piece of portable computing equipment or media, regardless of whether it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed to maintain the equipment's security. These consist of __________________.
A.
Cable locks, encryption, password protection, and increased awareness
B.
Reducing vulnerability by protecting, off setting, or transferring the risk
C.
Operational readiness, physical protection systems, and standard operating
processes
D.
Increase awareness, environmental design, and physical security
Correct Answer
A. Cable locks, encryption, password protection, and increased awareness
Explanation When using a piece of portable computer equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed to maintain the security of the equipment: use a cable lock, do not leave the equipment unattended or unsecured, use strong passwords, and encrypt data.
Rate this question:
17.
Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for
authentication is
A.
Biometric devices
B.
Technological systems
C.
Phyiometric devices
D.
Physical analysis devices
Correct Answer
A. Biometric devices
Explanation Biometric devices rely on measurements of biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns.
Rate this question:
18.
Physical security is applied by using physical protective measures
to prevent or minimize theft, unauthorized access, or destruction of
property.
A.
Layers
B.
Methods
C.
Varieties
D.
Types
Correct Answer
A. Layers
Explanation The primary goal of a physical protection program is to control access into the facility. In the concept of defense-in-depth, barriers are arraigned in layers, with the level of security growing progressively higher as one comes closer to the center or the highest protective area. Defending an asset with a multiple postures can reduce the likelihood of a successful attack; if one layer of defense fails, another layer of defense will hopefully prevent the attack, and so on.
Rate this question:
19.
What would you call a comprehensive overview of a facility to include physical
security controls, policy, procedures, and employee safety?
A.
Availability assessment
B.
Security survey
C.
Budgetary and financial performance
D.
Defense-in-depth
Correct Answer
B. Security survey
Explanation Before any project begins there must be an assessment made in order to put together an operational plan and a practical approach to securing the facility. This security assessment can also be called a security survey, vulnerability assessment, or risk analysis.
Rate this question:
20.
Which security control is most effective in curtailing and preventing “piggybacking” or “tailgating” as a means of unauthorized access?
A.
Cameras
B.
Turnstiles
C.
Keys
D.
Identification badges
Correct Answer
B. Turnstiles
Explanation A common and frustrating loophole in an otherwise secure access control systems can be the ability of an unauthorized person to follow through a checkpoint behind an authorized person, called “piggybacking” or “tailgating.” One solution is an airlock-style arrangement called a mantrap, in which a person opens one door and waits for it to close before the next door opens. Another available system is a turnstile, which can be used as a supplemental control to assist a guard or receptionist while controlling access into a protected area.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.