Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Electronic Security Systems: Multiple Choice Questions and Answers, Exams of Security Analysis

A series of multiple choice questions and answers related to electronic security systems. It covers various aspects of security systems, including access control, intrusion detection, and data transmission. The questions are designed to test knowledge of security system components, features, and best practices. This resource can be valuable for students and professionals seeking to understand the fundamentals of electronic security systems.

Typology: Exams

2024/2025

Available from 02/22/2025

Shantelle
Shantelle ๐Ÿ‡บ๐Ÿ‡ธ

5

(2)

3K documents

1 / 16

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SPeD - Electronic Security Systems
Which of the following require(s) any system-associated cabling that
extends beyond protected area perimeter to be installed in rigid
conduit?
a) SCIF
b) Top Secret/Secret Collateral Open Storage
c) Arms Room
d) Magazine - โœ” โœ” All Apply:
a) SCIF
b) Top Secret/Secret Collateral Open Storage
c) Arms Room
d) Magazine
What can an Automated Access Control Systems (AACS) do to protect
assets in a facility?
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download Electronic Security Systems: Multiple Choice Questions and Answers and more Exams Security Analysis in PDF only on Docsity!

SPeD - Electronic Security Systems

Which of the following require(s) any system-associated cabling thatextends beyond protected area perimeter to be installed in rigid conduit?a) SCIF

b) Top Secret/Secret Collateral Open Storage c) Arms Room d) Magazine - โœ” โœ” All Apply: a) SCIF b) Top Secret/Secret Collateral Open Storage c) Arms Room d) MagazineWhat can an Automated Access Control Systems (AACS) do to protect assets in a facility?

a) Allow authorized personnel to enter a controlled area after verifyingcredentials

b) Assist in preventing unauthorized personnel from entering acontrolled area

c) Communicate with CCTV for assessment purposes d) Communicate with an IDS to sound an alarm to alert securitypersonnel of unauthorized entry attempts - โœ” โœ” All Apply: a) Allow authorized personnel to enter a controlled area after verifyingcredentials

b) Assist in preventing unauthorized personnel from entering acontrolled area

c) Communicate with CCTV for assessment purposes d) Communicate with an IDS to sound an alarm to alert securitypersonnel of unauthorized entry attempts A high-security facility requires an Automated Access Control Systems(AACS) that makes it extremely difficult to duplicate the user's form of

c) Biometric - โœ” โœ” b) Credential Which Automated Access Control Systems (AACS) feature would youimplement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โœ” โœ” b) Anti-Passback Which Automated Access Control Systems (AACS) feature would youimplement to prevent individual card holders from entering a selected empty controlled area unaccompanied?a) Two-Person Rule

b) Anti-Passback c) REX Device

d) Anti-Tailgating - โœ” โœ” a) Two-Person Rule Which Automated Access Control Systems (AACS) feature would youimplement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorizedperson's credentials grants access? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โœ” โœ” d) Anti-Tailgating Which Automated Access Control Systems (AACS) feature would youimplement to facilitate egress from a controlled area? a) Two-Person Rule b) Anti-Passback c) REX Device d) Anti-Tailgating - โœ” โœ” c) REX Device (Request-to-Exit)

c) fence associated sensor - โœ” โœ” a) open terrain sensor Which exterior IDS sensor is usually the least expensive? a) open terrain sensor b) buried line sensor c) fence associated sensor - โœ” โœ” c) fence associated sensor Which exterior IDS sensor is also known as a line-of-sight sensor? a) open terrain sensor b) buried line sensor c) fence associated sensor - โœ” โœ” a) open terrain sensor Which type of sensor would be most effective in protecting apredominantly secured window? a) BMS/HSS b) glass break sensor c) passive infrared sensor

d) dual technology sensor - โœ” โœ” b) glass break sensor Which sensor is used on doors, roofs, hatches and windows?a) BMS/HSS

b) glass break sensor c) passive infrared sensor d) dual technology sensor - โœ” โœ” a) BMS/HSS Which sensor detects heat signatures of intruders and is the mostcommon interior volumetric sensor? a) BMS/HSS b) glass break sensor c) passive infrared sensor d) dual technology sensor - โœ” โœ” c) passive infrared sensor

b) alarm assessment c) surveillance - โœ” โœ” access control You received a request to add a CCTV system to a building on yourinstallation, which questions do you ask? - โœ” โœ” a) will the CCTV system be used inside or outsideb) Will the CCTV system be used in a very well lit area, in low lighting, or in the dark?c) Will the system require a person to man the monitor at all times An ESS is a component of an overall physical protection system. T/F - โœ” True โœ” An ESS must be comprised of at least two or more subsystems.Therefore a stand alone automated access control system, for example, would not constitute an ESS. T/F -of ONE or more subsystems. โœ” โœ” False - An ESS is comprised An effective ESS must ensure that the time between detection of anintrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur. T/F - โœ” โœ” True Assets, threats, and vulnerabilities are all part of the risk calculation.T/F - โœ” โœ” True Threats against an asset are determined when you conduct a sitesurvey. T/F - โœ” โœ” False-Threats against an asset are determined

through a "threat assessment". Vulnerabilities can be determinedduring a site survey. You must consider operational and maintenance costs of an ESS whencomparing the value of an asset to be protected versus the cost of the ESS to protect an asset. T/F - โœ” โœ” True You are tasked with planning an ESS for a DoD facility. What regulatoryguidance documents(s) should be your primary reference? a) DoDM 5100.76 Physical Security of Sensitive Conventional Arms,Ammunition & Explosives

b) UFC, 4-021-02, Electronic Security Systems c) ICS 705-1, Physical & Technical Security Standards for a SCIF d) DoD Manual on ESS Planning -Security Systems โœ” โœ” b) UFC, 4-021-02 Electronic Which of the following should you conduct to test the placement of theIDS sensors? a) acceptance test b) nuisance alarm

a) proprietary station b) local alarm c) central station d) police connection - โœ” โœ” c) central station Requires roving security forcesa) proprietary station

b) local alarm c) central station d) police connection - โœ” โœ” b) local alarm Wireline Data Transmission Media (DTM), which is good for most ESSdata transmission needs has a high bandwidth. T/F - โœ” โœ” False Which of the following are considerations when planning for a DataTransmission Media (DTM) link? a) What is the bandwidth of each ESS subsystem being connected?

b) What level of security will be required? c) Is there an interruptible power supply? d) Can you use existing networks or will you need to create a newpathway? - โœ” โœ” All Apply: a) What is the bandwidth of each ESS subsystem being connected? b) What level of security will be required? c) Is there an interruptible power supply? d) Can you use existing networks or will you need to create a newpathway? A wireless network is more secure than a hard wired network. T/F - โœ” False โœ” Software-based integration is the preferred Data Transmission Media(DTM), method for most projects. T/F - โœ” โœ” True A Data Transmission Media (DTM), allows all automated access controlsystems to communicate with a control center. T/F - โœ” โœ” True

Which of the following must have vibration sensors on the walls todetect boundary penetration attempts? a) SCIF b) Top Secret/Secret Collateral Open Storage c) Arms Room d) Magazine - โœ” โœ” d) Magazine