Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ASIS PSP: Verified Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A+
Geüpload op
25-06-2023
Geschreven in
2022/2023

Classification of risk - ANSWER -Assest, exposure, losses 3 criteria of cost/benefit analysis - ANSWER -Cost, reliability, delay Basic methods of fieldwork - ANSWER -Observing, questioning, analyzing, verifying, investigating, evaluating Business continuity planning (BCP) process - ANSWER -Readiness, prevention, response, recovery/resumption BCP process "readiness" - ANSWER -Assign accountability, perform risk assessment, agree on strategic plans, crises management BCP process "prevention" - ANSWER -Compliance with corporate policy, mitigation strtegies BCP process "response" - ANSWER -Potential crisis recognition, notify teams, assess the situation, declare a crisis, excute the plan, communication BCP process "recovery/resumption" - ANSWER -Damage & impact assessment, resumption of critical & remaining processes BCP implementation & maintenance - ANSWER -Test & train, evaluate & maintain General physical security measures - ANSWER -CPTED, physical barriers and site hardening, physical entry and access control, security lighting, IDS, veideo surveillance, security personnel, security policies and procedures Designing PPS - ANSWER -Determine objectives, Design PPS, Analyze design, redesign PPS Determine objectives - ANSWER -Facility characterization, threat detection, target identification Design PPS - ANSWER -Detection, delay, response Detection (design PPS) - ANSWER -exterior sensore, interior sensor, alarm assessment, alarm comm & display, entry control Delay (design PPS) - ANSWER -access delay Response (design PPS) - ANSWER -response force, response force communication

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ASIS PSP: Verified Questions and Answers
Classification of risk - ANSWER -Assest, exposure, losses

3 criteria of cost/benefit analysis - ANSWER -Cost, reliability, delay

Basic methods of fieldwork - ANSWER -Observing, questioning, analyzing, verifying, investigating,
evaluating

Business continuity planning (BCP) process - ANSWER -Readiness, prevention, response,
recovery/resumption

BCP process "readiness" - ANSWER -Assign accountability, perform risk assessment, agree on strategic
plans, crises management

BCP process "prevention" - ANSWER -Compliance with corporate policy, mitigation strtegies

BCP process "response" - ANSWER -Potential crisis recognition, notify teams, assess the situation,
declare a crisis, excute the plan, communication

BCP process "recovery/resumption" - ANSWER -Damage & impact assessment, resumption of critical &
remaining processes

BCP implementation & maintenance - ANSWER -Test & train, evaluate & maintain

General physical security measures - ANSWER -CPTED, physical barriers and site hardening, physical
entry and access control, security lighting, IDS, veideo surveillance, security personnel, security policies
and procedures

Designing PPS - ANSWER -Determine objectives, Design PPS, Analyze design, redesign PPS

Determine objectives - ANSWER -Facility characterization, threat detection, target identification

Design PPS - ANSWER -Detection, delay, response

Detection (design PPS) - ANSWER -exterior sensore, interior sensor, alarm assessment, alarm comm &
display, entry control

Delay (design PPS) - ANSWER -access delay

Response (design PPS) - ANSWER -response force, response force communication

Analyze PPS design - ANSWER -Analysis/evaluation (EASI)

Target identification techniques - ANSWER -Manual listing, logic diagram

,Vital area indentification - ANSWER -Fault tree

Detection perfrmance measures - ANSWER -Probability of detection, time for communication &
assessment, frequency of nuisance alarm

Delay performance measure - ANSWER -Time to defeat obstacales

Response performance measure - ANSWER -Probability of accurate communication to the response
force, time to communicate, probability of deployment to adversary location, time to deploy, reponse
force effectiveness

Exterior sensors vulnerability to defeat - ANSWER -Bypass, spoof

exterior sensors classification - ANSWER -Passive or active, covert or visable, Line of sight or terrain
following, volumetric or line detection, application

Exterior sensor fence groups - ANSWER -buried line, fence associated, freestanding

interior sensor classification - ANSWER -Passive or active, covert or visible, volumetric or line detection

interior sensor application - ANSWER -boundary-penetration, interior motion, proximity sensor

2 purposes of alarm assessment - ANSWER -Determine cause of alarm, provide additional information

3 levels of alarm resolution - ANSWER -detection, classification, identification

2 critical elements of alarm communication and display - ANSWER -transportation of data, display of
data in meaningful manner

Objectives of entry control - ANSWER -Permit only authorized persons to entry and exit, detec and
prevent contraband, provide information ot facilitate assessment and response

Types of barriers - ANSWER -Passive, guards, dispensable

Best height for barries - ANSWER -30 inches

Placement of roof barriers - ANSWER -10-12 inches below roof

5 parts of response - ANSWER -general considerations, contingency planning, communication,
interruption, neutralization

Types of PPS analysis - ANSWER -Quantitative (higher consequence of loss assets), Qualitative (lower
consequence of loss assests)

Defensible space - ANSWER -a residential environment whose physical characteristics fuction to allow
inhabitants to become key agents in ensuring security

2 basic social behaviors - ANSWER -Territoriality, natural surveillance

, 3 phases of vulnerability assessment - ANSWER -Planning, conducting, reporting

3 types of requirements in a system (vulnerability assessment) - ANSWER -Fuctional, constraint,
performance

Risk assesments should include - ANSWER -Risk analysis, risk identification, risk evaluation

2 types of protective barriers - ANSWER -Natural, structural

Types of key operated locks - ANSWER -Disc or wafer tumbler, pin tumbler, lever

Door lock types - ANSWER -Mortise, rim-mounted, tubular, cylindrical, unit

Types of lock attacks - ANSWER -Surreptitious techniques (picking), force

Attacks on bolts - ANSWER -Jimmying, punching, sawing, peeling

attacks on cylinders - ANSWER -pulling, lug pulling, twisting, drilling, punching, hammering

3 purposes of alarms - ANSWER -Perimeter protection, area/space protection, spot/object protection

Example of perimeter alarm protection - ANSWER -Door switches, glass break detectors, window
screens

Example of area/space alarm protection - ANSWER -Ultrasonic, microwave, PIR

Example of spot/object alarm protection - ANSWER -proximity detectors, vibration detectors

Security video systems aspect ratio - ANSWER -4x3 (16x9 wide screen)

2 types of video scanning - ANSWER -Raster, digital or pregressive

Chain link fence A-B-C-D method - ANSWER -Aids to security, Barriers for security, Controls, Deterrents

4 stages of a fire - ANSWER -Ignition, groth, fully developed, decay

5 network infrastructure devices - ANSWER -Hubs
Switches
Routers
Firewalls
Intrusion detection systems

Network configurations - ANSWER -Peer-to-peer, client sever

5 avenues to address risk - ANSWER -Risk avoidance
Risk transfer
Risk spreading

Geschreven voor

Vak

Documentinformatie

Geüpload op
25 juni 2023
Aantal pagina's
26
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
GuideStudy

Maak kennis met de verkoper

Seller avatar
GuideStudy Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
67
Laatst verkocht
-
GuideStudy

"Experienced and versatile tutor offering expert assistance across diverse subjects including nursing, chemistry, social sciences, and languages. Elevate your academic journey with personalized support for assessments, projects, and class assignments. Unlock your full potential through my dedicated guidance and achieve outstanding results."

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen