The planning phase of a physical protection system implementation produces which two of the following very important work products?
A civil action based on the principle that one individual can expect certain behavior from another individual is known as:
Material Safety Data Sheet (MSDS) that must be available for each chemical at the work site contains which sections?
The measures of effectiveness of entry control include throughput, false acceptance rate, and:
What are restricted as to entrance or movement by all but authorized personnel and vehicles?
Which of the following costs are considered in the cost of loss formula [K = (Cp + Ct + Cr + Ci) - I] used to value assets?
What is the distance limitation for category-rated unshielded twisted pair (UTP) cable?
Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.
What refers to the number of employees over which any individual can exercise direct supervision effectively?
The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:
The FIRST step in the Enterprise Security Risk Management (ESRM) process is to:
The sites that are partially configured but are missing the central computer are called:
All physical barriers are designed to discourage three types of penetration. These types of penetration are:
With regard to the overall life of a lamp, the best lighting option for the parking area of a retail shopping center would be:
When selecting countermeasures for risk mitigation, the security practitioner should consider:
To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?
What incorporate a detection system, which can eliminate concerns over water damage and false activation of the system?
The contingency fee component of a bid package represents what percentage of the total cost figure?
Which of the following BEST mitigates the risk of power loss in a computer?
_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.
What generally means removing the risk to the company by paying for the protection of an insurance policy?
Who generally provide an advisory or service function to a line executive?
What involves walking or riding a given route to observe the condition of the facility?
What results from fearing the consequences of being caught; and is a product of reasoning?
In the procurement process, the pre-bid conference provides the contractor:
A study of BDP international has found that ___________ of shippers are factoring in additional time to comply with the Advanced Manifest System, which went into effect in February 2003. This Department of Homeland security rule requires the filing of complete import manifest documentation at least 24 hours before U.S.-bound ships are loaded at foreign ports.
When developing a maintenance plan and the associated service levels, a system owner should place the greatest emphasis for support on equipment that:
IP sends information across networks in packets, each containing between 1 and approximately:
The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.
The systems that utilized in communities that have a municipal alarm system are called:
A corporation is in need of security personnel to guard visitor parking lots, highly sensitive projects, and top-secret projects. What is the MOST viable and cost-effective security staffing strategy for the corporation?
The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.
A complete contingency planning program has which of the following major elements?
When exterior lighting is employed, an initial survey is conducted at lighting installation, and then
The basic function of an electronic security system ESS during an attempted or successful penetration is to
Which of the following is best for reducing the number of nuisance alarms?
Successful security design recognizes technological developments and integrates:
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?
Testing designed to determine whether a system is functional, has adequate sensitivity, and meets design and performance objectives accurately describes which of the following?
When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:
______________ has been defined as the impact of a loss as measured in dollars.
To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.
A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is
A Physical Security Professional ' s analysis of data collected during a risk analysis helps
As the project overseer in a major construction project, who is responsible for providing documentation for the final security system design?
Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:
In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.
To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:
What type of security officer order addresses a single subject in easy to understand terms, is made available at each guard station, and can be used to provide a basis for site-specific training?
Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?
Which of the following is NOT the activity and concern of a crisis management plan?
A threat source differentiates the potential of one facility to be attacked versus another in a different location. This activity is referred to as:
Successful implementation of any physical security construction project hinges largely on a well-defined and executed:
What signal the entry of persons into a facility or an area while the system is in operation?
When a bomb threat is received and identifies a specific floor as containing the bomb, the initial building evacuation should focus on the affected floor and:
At the conclusion of a project, which of the following types of drawings should be provided as part of the project execution?
Which of the following are the three types of cost estimates used in the implementation of a physical protection system?
The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:
What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?
In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is
System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?
To execute a project successfully, the project manager MUST balance which three competing factors?
When designing a security program, establishing performance requirements increases the effectiveness of the program by
In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:
Criteria for intrusion sensor performance is typically measured by which of the following?
What bulk explosive detection technology operates by spinning around a package and viewing the contents from different angles, making it the only available technology which calculates a material ' s mass, density, and mass absorption coefficient?
Which of the following is NOT the distinct action that fall into invasion of privacy?
Which of the following conditions affects the sensitivity of a capacitance proximity sensor?
According to best practices, who should offer a warranty that includes full maintenance of the equipment?
Coverage of what provides remuneration for losses due to employee dishonesty?
The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:
To protect against interruption of critical telecommunications systems, security professionals should recommend:
When developing a request for proposal (RFP), a specification that requires bidders to satisfy overall system effectiveness measure is referred to as:
Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?