Classification of risk - ANSWER -Assest, exposure, losses
3 criteria of cost/benefit analysis - ANSWER -Cost, reliability, delay
Basic methods of fieldwork - ANSWER -Observing, questioning, analyzing, verifying, investigating,
evaluating
Business continuity planning (BCP) process - ANSWER -Readiness, prevention, response,
recovery/resumption
BCP process "readiness" - ANSWER -Assign accountability, perform risk assessment, agree on strategic
plans, crises management
BCP process "prevention" - ANSWER -Compliance with corporate policy, mitigation strtegies
BCP process "response" - ANSWER -Potential crisis recognition, notify teams, assess the situation,
declare a crisis, excute the plan, communication
BCP process "recovery/resumption" - ANSWER -Damage & impact assessment, resumption of critical &
remaining processes
BCP implementation & maintenance - ANSWER -Test & train, evaluate & maintain
General physical security measures - ANSWER -CPTED, physical barriers and site hardening, physical
entry and access control, security lighting, IDS, veideo surveillance, security personnel, security policies
and procedures
Designing PPS - ANSWER -Determine objectives, Design PPS, Analyze design, redesign PPS
Determine objectives - ANSWER -Facility characterization, threat detection, target identification
Design PPS - ANSWER -Detection, delay, response
Detection (design PPS) - ANSWER -exterior sensore, interior sensor, alarm assessment, alarm comm &
display, entry control
Delay (design PPS) - ANSWER -access delay
Response (design PPS) - ANSWER -response force, response force communication
Analyze PPS design - ANSWER -Analysis/evaluation (EASI)
Target identification techniques - ANSWER -Manual listing, logic diagram
,Vital area indentification - ANSWER -Fault tree
Detection perfrmance measures - ANSWER -Probability of detection, time for communication &
assessment, frequency of nuisance alarm
Delay performance measure - ANSWER -Time to defeat obstacales
Response performance measure - ANSWER -Probability of accurate communication to the response
force, time to communicate, probability of deployment to adversary location, time to deploy, reponse
force effectiveness
Exterior sensors vulnerability to defeat - ANSWER -Bypass, spoof
exterior sensors classification - ANSWER -Passive or active, covert or visable, Line of sight or terrain
following, volumetric or line detection, application
Exterior sensor fence groups - ANSWER -buried line, fence associated, freestanding
interior sensor classification - ANSWER -Passive or active, covert or visible, volumetric or line detection
interior sensor application - ANSWER -boundary-penetration, interior motion, proximity sensor
2 purposes of alarm assessment - ANSWER -Determine cause of alarm, provide additional information
3 levels of alarm resolution - ANSWER -detection, classification, identification
2 critical elements of alarm communication and display - ANSWER -transportation of data, display of
data in meaningful manner
Objectives of entry control - ANSWER -Permit only authorized persons to entry and exit, detec and
prevent contraband, provide information ot facilitate assessment and response
Types of barriers - ANSWER -Passive, guards, dispensable
Best height for barries - ANSWER -30 inches
Placement of roof barriers - ANSWER -10-12 inches below roof
5 parts of response - ANSWER -general considerations, contingency planning, communication,
interruption, neutralization
Types of PPS analysis - ANSWER -Quantitative (higher consequence of loss assets), Qualitative (lower
consequence of loss assests)
Defensible space - ANSWER -a residential environment whose physical characteristics fuction to allow
inhabitants to become key agents in ensuring security
2 basic social behaviors - ANSWER -Territoriality, natural surveillance
, 3 phases of vulnerability assessment - ANSWER -Planning, conducting, reporting
3 types of requirements in a system (vulnerability assessment) - ANSWER -Fuctional, constraint,
performance
Risk assesments should include - ANSWER -Risk analysis, risk identification, risk evaluation
2 types of protective barriers - ANSWER -Natural, structural
Types of key operated locks - ANSWER -Disc or wafer tumbler, pin tumbler, lever
Door lock types - ANSWER -Mortise, rim-mounted, tubular, cylindrical, unit
Types of lock attacks - ANSWER -Surreptitious techniques (picking), force
Attacks on bolts - ANSWER -Jimmying, punching, sawing, peeling
attacks on cylinders - ANSWER -pulling, lug pulling, twisting, drilling, punching, hammering
3 purposes of alarms - ANSWER -Perimeter protection, area/space protection, spot/object protection
Example of perimeter alarm protection - ANSWER -Door switches, glass break detectors, window
screens
Example of area/space alarm protection - ANSWER -Ultrasonic, microwave, PIR
Example of spot/object alarm protection - ANSWER -proximity detectors, vibration detectors
Security video systems aspect ratio - ANSWER -4x3 (16x9 wide screen)
2 types of video scanning - ANSWER -Raster, digital or pregressive
Chain link fence A-B-C-D method - ANSWER -Aids to security, Barriers for security, Controls, Deterrents
4 stages of a fire - ANSWER -Ignition, groth, fully developed, decay
5 network infrastructure devices - ANSWER -Hubs
Switches
Routers
Firewalls
Intrusion detection systems
Network configurations - ANSWER -Peer-to-peer, client sever
5 avenues to address risk - ANSWER -Risk avoidance
Risk transfer
Risk spreading