









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of multiple choice questions and answers related to electronic security systems. It covers various aspects of security systems, including access control, intrusion detection, and data transmission. The questions are designed to test knowledge of security system components, features, and best practices. This resource can be valuable for students and professionals seeking to understand the fundamentals of electronic security systems.
Typology: Exams
1 / 16
This page cannot be seen from the preview
Don't miss anything!
Which of the following require(s) any system-associated cabling thatextends beyond protected area perimeter to be installed in rigid conduit?a) SCIF
b) Top Secret/Secret Collateral Open Storage c) Arms Room d) Magazine - โ โ All Apply: a) SCIF b) Top Secret/Secret Collateral Open Storage c) Arms Room d) MagazineWhat can an Automated Access Control Systems (AACS) do to protect assets in a facility?
a) Allow authorized personnel to enter a controlled area after verifyingcredentials
b) Assist in preventing unauthorized personnel from entering acontrolled area
c) Communicate with CCTV for assessment purposes d) Communicate with an IDS to sound an alarm to alert securitypersonnel of unauthorized entry attempts - โ โ All Apply: a) Allow authorized personnel to enter a controlled area after verifyingcredentials
b) Assist in preventing unauthorized personnel from entering acontrolled area
c) Communicate with CCTV for assessment purposes d) Communicate with an IDS to sound an alarm to alert securitypersonnel of unauthorized entry attempts A high-security facility requires an Automated Access Control Systems(AACS) that makes it extremely difficult to duplicate the user's form of
c) Biometric - โ โ b) Credential Which Automated Access Control Systems (AACS) feature would youimplement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โ โ b) Anti-Passback Which Automated Access Control Systems (AACS) feature would youimplement to prevent individual card holders from entering a selected empty controlled area unaccompanied?a) Two-Person Rule
b) Anti-Passback c) REX Device
d) Anti-Tailgating - โ โ a) Two-Person Rule Which Automated Access Control Systems (AACS) feature would youimplement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorizedperson's credentials grants access? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โ โ d) Anti-Tailgating Which Automated Access Control Systems (AACS) feature would youimplement to facilitate egress from a controlled area? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โ โ c) REX Device (Request-to-Exit)
c) fence associated sensor - โ โ a) open terrain sensor Which exterior IDS sensor is usually the least expensive? a) open terrain sensor b) buried line sensor c) fence associated sensor - โ โ c) fence associated sensor Which exterior IDS sensor is also known as a line-of-sight sensor? a) open terrain sensor b) buried line sensor c) fence associated sensor - โ โ a) open terrain sensor Which type of sensor would be most effective in protecting apredominantly secured window? a) BMS/HSS b) glass break sensor c) passive infrared sensor
d) dual technology sensor - โ โ b) glass break sensor Which sensor is used on doors, roofs, hatches and windows?a) BMS/HSS
b) glass break sensor c) passive infrared sensor d) dual technology sensor - โ โ a) BMS/HSS Which sensor detects heat signatures of intruders and is the mostcommon interior volumetric sensor? a) BMS/HSS b) glass break sensor c) passive infrared sensor d) dual technology sensor - โ โ c) passive infrared sensor
b) alarm assessment c) surveillance - โ โ access control You received a request to add a CCTV system to a building on yourinstallation, which questions do you ask? - โ โ a) will the CCTV system be used inside or outsideb) Will the CCTV system be used in a very well lit area, in low lighting, or in the dark?c) Will the system require a person to man the monitor at all times An ESS is a component of an overall physical protection system. T/F - โ True โ An ESS must be comprised of at least two or more subsystems.Therefore a stand alone automated access control system, for example, would not constitute an ESS. T/F -of ONE or more subsystems. โ โ False - An ESS is comprised An effective ESS must ensure that the time between detection of anintrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur. T/F - โ โ True Assets, threats, and vulnerabilities are all part of the risk calculation.T/F - โ โ True Threats against an asset are determined when you conduct a sitesurvey. T/F - โ โ False-Threats against an asset are determined
through a "threat assessment". Vulnerabilities can be determinedduring a site survey. You must consider operational and maintenance costs of an ESS whencomparing the value of an asset to be protected versus the cost of the ESS to protect an asset. T/F - โ โ True You are tasked with planning an ESS for a DoD facility. What regulatoryguidance documents(s) should be your primary reference? a) DoDM 5100.76 Physical Security of Sensitive Conventional Arms,Ammunition & Explosives
b) UFC, 4-021-02, Electronic Security Systems c) ICS 705-1, Physical & Technical Security Standards for a SCIF d) DoD Manual on ESS Planning -Security Systems โ โ b) UFC, 4-021-02 Electronic Which of the following should you conduct to test the placement of theIDS sensors? a) acceptance test b) nuisance alarm
a) proprietary station b) local alarm c) central station d) police connection - โ โ c) central station Requires roving security forcesa) proprietary station
b) local alarm c) central station d) police connection - โ โ b) local alarm Wireline Data Transmission Media (DTM), which is good for most ESSdata transmission needs has a high bandwidth. T/F - โ โ False Which of the following are considerations when planning for a DataTransmission Media (DTM) link? a) What is the bandwidth of each ESS subsystem being connected?
b) What level of security will be required? c) Is there an interruptible power supply? d) Can you use existing networks or will you need to create a newpathway? - โ โ All Apply: a) What is the bandwidth of each ESS subsystem being connected? b) What level of security will be required? c) Is there an interruptible power supply? d) Can you use existing networks or will you need to create a newpathway? A wireless network is more secure than a hard wired network. T/F - โ False โ Software-based integration is the preferred Data Transmission Media(DTM), method for most projects. T/F - โ โ True A Data Transmission Media (DTM), allows all automated access controlsystems to communicate with a control center. T/F - โ โ True
Which of the following must have vibration sensors on the walls todetect boundary penetration attempts? a) SCIF b) Top Secret/Secret Collateral Open Storage c) Arms Room d) Magazine - โ โ d) Magazine