PSP Assessment Test-1
0 of 140 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 140 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
When conducting a thorough vulnerability analysis, which of the following is a step in identifying preventive measures?
The process of assessing security-related risks from internal and external threats to an entity, its assets and personnel, is called a ________________.
This is considered the most common reliable tool for determining adequacy and foreseeability and focuses on:
- The risks to the physical assets and property
- The protection measures (against any risk) that comprise the realm of physical security
- Measuring three basic factors: quality, reliability and cost
This process is called a ________________.
These are described as the most important written instructions for the security force which express the policies of the protected enterprise, summarize required officer duties and provide a basis for site-specific training. They are called:
In the following formula, what does K equal?
K = Cp + Ct + Cr + Ci − I
Cp = cost of permanent replacement
Ct = cost of temporary substitute
Cr = total related costs (remove old asset, install new, etc.)
Ci = lost income cost
I = available insurance or indemnity
Which of the following processes places more focus on evaluating vulnerabilities?
Which of the following is suggested as part of evaluating Inadvertent Threats?
A measure which is based on a reference that involves at least two points, quantity over time, is called a ___________.
A list of the kinds of threats or hazards affecting the assets to be protected in an organization is called a _____ _______ Profile
Collecting site historical loss data, neighborhood makeup/historical loss data, overall geographical location, political and social conditions is involved in the process of determining a loss event’s ________.
When evaluating PPS solutions, including engineering design, hardware and software costs is part of ______________.
“A weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss event”, is a definition of which of the following?
The above matrix is an example of a _________ evaluation.
Which of the following is a TRUE statement regarding threats and vulnerabilities?
Which of the following is considered part of developing an effective PPS using security-in-depth principles of the 4-D’s?
Which of the following is considered a “Direct Cost” when considering the costs of loss?
Which of the following is considered an “Indirect Cost” when considering the costs of loss?
A risk mitigation technique which provides for purchasing insurance to mitigate the security risk, is BEST described as which of the following?
When applying risk mitigation techniques, it is often not practical to address all identified risks, so which of the following statements BEST explains how to mitigate the risk?
Based on simulation or actual tests, one can compute the time an access control system will take to process the peak number of access requests. For an efficient access control system, response time at any card reader should be no longer than ___________ at peak load.
“These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus”, they are BEST described as:
This type of drawing shows an area in map-like form to specify where at a particular site the security devices are located. What type of drawing is this?
A risk mitigation technique which provides for the application of physical security, policy and procedures, deployed security officers all integrated to mitigate the security risk, is BEST described as which of the following?
Which of the following is considered to have the most significant implementation cost as a risk mitigation measure?
Which of the following is considered the MOST IMPORTANT phase in the PPS Life Cycle Phase?
In this part of the Life Cycle Phase, security staff and other members of the project team develop all the necessary documentation to support the procurement of the PPS. This is BEST described in which phase?
When tests are performed by the implementation team which involve equipment, personnel, procedures, or any combination that simulate realistic conditions and provide conclusive evidence about the effectiveness of the security system, this is BEST described as which of the following?
When designing security for an elementary school, administration offices and classrooms should have a clear unobstructed view of parking lots and entry roads. In CPTED, this technique is BEST described as:
These devices are often magnetic, detect when when one part of the device is moved away from the other. An example would be a door position switch. This BEST describes which of the following?
This detector absorbs invisible light energy comparing actual energy to established background energy. What type of detector is this?
This detector can transmit and receive signals relying on consistent reception of transmitted or reflected energy. When energy levels change due to a reflection or deflection, an alarm is transmitted. This is called _________ detection.
__________ is primarily used to:
- Detect activities that call for a security response
- Collect images of an incident for later review
- Assist with incident assessment
Which of the following BEST fits this description of a video surveillance component: “This determines the clarity and size of the field of view.”
It is recommended by the IES (Illuminating Engineers Society of North America) that the recommended minimum level of lighting at a pedestrian entrance should be which of the following?
Which type of camera has a static position and is always aimed at the desired field of view?
Which of the following statements is TRUE?
These can change often to meet the changing demands and conditions the overall organization or security department faces. They can be changed without high-level, time consuming executive review process. This BEST describes:
All human space has some designated purpose, and social, cultural, legal or physical definitions that prescribe acceptable behavior. This BEST describes:
Which of the following are the three (3) classifications to CPTED strategies?
Increasing visibility, both interior-to-exterior and exterior-to-interior to increase witness potential, and make the potential criminal fear exposure, is described in CPTED as which of the following?
This layer of security includes protective lighting, intrusion detection systems, signs, and sometimes the building walls itself. This BEST describes the which layer of protection?
“One of the basic CPTED strategies is to design multiple or concentric layers of security measures so that protected assets are behind multiple barriers”, is a definition of which of the following?
Which of the following is the BEST recommendation for the height of a security chain link fence for a high security environment?
Which of the following fences are considered for environments that require LOW security and protection?
The DOD K-ratings are important when considering which of the following?
Which of the following lighting systems have the BEST color rendition for night lighting?
Bidders’ instructions; system specifications; contract evaluation criteria; implementation schedule; equipment lists; security device schedules; door hardware and drawings form deliverables in which phase of the PPS Life Cycle Phase 6: Maintenance, Evaluation and Replacement?
It is recommended by the IES (Illuminating Engineers Society of North America) that the recommended minimum level of lighting in a covered parking structure should be which of the following?
When in the procurement stage, an invitation for bids (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is BEST described as:
These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called:
Which of the following is NOT one of the goals of the commissioning process:
Which of the following terms BEST meets this description? “This process corrects faults and returns the system to operation after a hardware or software component fails.
Large heavy planters, made of concrete and reinforced with steel bars and glass-fibre can be effective vehicle barriers. To effectively stop a 6804kg (15,000 lb) vehicle travelling at 80kph (50mph), the (DOD) K-rating should be which of the following?
Which of the following BEST meets this description, “These are made of reinforced fabrics that provide protection from flying glass and materials in an explosion.”
When an adversary defeats an access control point to avoid detection, this is BEST described as:
When developing a Business Continuity Plan (BCP), it is critical that management engage which kind of approach to the BCP?
Management decides to purchase insurance to cover losses which may be suffered as a result of a theft. This risk mitigation strategy is BEST defined as:
A risk analysis has recommended security countermeasures be hardened at security gates, by improving the training for security officers, adding additional CCV and barriers. This is BEST described as:
Which of the following statements BEST describes the “statement of work”?
A rule of thumb for CPU power is that the computer should be able to execute intrusion detection programs, run access control programs, monitor the status of all equipment, accomplish database transactions, and simultaneously produce at least _____ reports within two to five minutes.
Security devices have approximate power requirements, which of the following are the recommended power requirements for PTZ cameras?
What are the typical power requirements for most security systems?
Which of the following is a TRUE statement regarding the preliminary design estimate?
A successful security design recognizes technological developments and integrates three primary elements. Which of the following BEST describes the elements?
A “safe within a safe,” consisting of a sealed inner insulated repository where magnetic media are stored, inside an outer safe protected by a heavy wall of insulation must protect electronic media against which of the following?
An insulated records container for electronic records that can protect the contents up to 150oF (66oC) for 4-hours, is designated as which of the following?
When examining a facility design and considering a security fence, which is the least expensive fence that offers the best protection?
A chain link fence intended to discourage human penetration is generally not less than a recommended height. Which of the following BEST defines the height?
Which of the following statements is TRUE concerning managing the bid process?
The complete set of procurement (bid) documents consist of three (3) sections, they are:
This type of procurement is the most common method and based on a detailed design and construction documents and specifications. Certain vendors may be invited or it may be open to a list of prequalified vendors. The selection is not based on lowest bid and technical proposals are sought. This is referred to as:
The performance measurement of a project’s progress to specific point-in-time or the sum of the cumulative budgeted cost of a project compared to the actual cost of all work completed at a specific point in the schedule, is referred to as:
Project management involves:
Which of the following is the BEST definition for “scope creep”?
A contract document used in the architecture and building trades to organize the completion of a construction project, is called a:
Which of the following is part of the Installation, Operation and Training Phase of a systems installation?
Pre-delivery or factory acceptance test data is collected in which phase of the system implementation?
In a PPS implementation phase, the system objectives, functional requirements, operational improvements and economic justification are part of which phase?
When working with metrics, the acronym SMART is used. SMART stands for:
Organizations use three (3) common types of procurement actions: request for proposals, invitation for bids and which of the following?
In the life cycle phase concerning maintenance, evaluation and replacement of PPS components or systems, which of the following is a key step in the phase?
When comparing the project stage correlation to the Life Cycle Phase, which of the following, BEST correlates to the Life Cycle Phase 3 – “Procurement” Phase?
Which of the following definitions BEST describes “Work Breakdown Structure”?
“A detailed examination including risk assessment, vulnerability evaluation, cost-benefit analysis, and risk management alternatives, all performed to understand the nature of unwanted consequences.” This BEST defines which of the following?
“A particularly relevant form of risk assessment is the physical security assessment. It focuses on two things: the risks to the physical assets and property of an organization, and the protection measures (against any risk) that comprise the realm of physical security.” This is also called:
Security surveys are usually concerned with measuring at least three basic factors, which of the following BEST describes those factors?
The most common and reliable tool for determining adequacy and foreseeability is which of the following?
A comprehensive risk assessment focuses equally on assets, threats, vulnerabilities, and consequences, a security survey places more emphasis on which of the following?
The Security Metrics Evaluation Tool (MET) helps security professionals evaluate any metric according to a criteria, which includes Operational (Security) Criteria. Which of the following is part of that criteria?
Generally, a high-rise structure is considered to be one that extends higher than the maximum reach of available fire-fighting equipment. What is considered the effective height?
Which one of the following lamps has the BEST color rendition index?
Which one of the following lamps has the POOREST (LOWEST) color rendition index?
The ability of a lamp to discriminate, grade, and faithfully reproduce the colors seen in an object is known as color rendition and is measured as a color rendition index (CRI) on a scale. What CRI is considered “Good”?
In a mechanical cylinder lock mechanism, instead of grooves at the bottom of the plug, a side bar is moved into a cutout housing in the shell or withdrawn into grooves in the pins. The keys are specially cut at specific angles, making routine duplication of keys quite difficult, except on special equipment used by the manufacturer. This mechanism is BEST described as a:
A locking mechanism that will unlock under any failure condition, such as loss of power, failure of the mechanism itself and any connected control device is referred to as which of the following types of locks?
A critical on-site examination and analysis of an industrial plant, business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses, to determine the protection needed and to make recommendations to improve the overall security is known as a?
This process is designed to ensure that the selected solutions will mitigate real and specific vulnerabilities, provide a cost/benefit justification for each solution, identify all elements and resources required for each solution, provide a basis for the accurate and complete system specification that will be used to procure and implement the solutions. This process is the?
Premises liability is a civil action where a plaintiff will attempt to hold a landlord or property manager liable for injuries inflicted during a criminal attack committed on their premises. In this litigation, the plaintiff must prove the landlord/property manager breached their duty of care by failing to provide reasonable security measures. Which of the following is not an example of premises liability?
These detectors are designed to detect a certain temperature or rapid change in temperature they are a?
Air conditioning and ventilation systems, invariably involve the use of ducts for air distribution. The ducts in turn present the possibility of spreading fire, fire gases and smoke throughout the building or area served. What would you recommend to control this occurrence?
Your client is concerned about the confusion created by the existing fire alarm system when the evacuation alarm activates. The evacuation alarm sounds a bell which prompts an evacuation. Staff and wardens are generally going to two different assembly points, before the nature of the incident is known and the evacuation is slow. Feedback is often received that “we don’t know what is happening or where to go, we need more accurate and up to date information” What would you recommend?
This form of procurement is commonly used by government and other organisations whose procurement procedures require that projects competitively bid and that the award be given to the lowest, qualified, responsive bidder, no technical proposals or alternative solutions are sought, so the construction documents must be extremely explicit. It is a?
During the development of construction documents, it is common to set certain milestones at which progress is reviewed. These milestones may either target?
The specification of security systems must mirror and complement the actual systems design in such detail that the final implementation reflects what was intended and should give all bidders the same, complete understanding of the requirements. To standardise the specification, it should be divided up into three parts. These three parts are?
Which of the following is not an accomplishment of a security survey?
What is the purpose of conducting a preliminary survey?
The great majority of security survey work is done in the field. The rest is usually divided equally into planning the survey and writing the final report. Reduced to its simplest terms, field work is largely measurement of evaluation of the effectiveness of the security program under review. There are six basic forms or methods of field work. Which of the following is not one of these basic forms or methods?
You have recently been appointed as the Business Resilience Manager for a large corporation which has sites both locally and internationally. There are no business resilience plans in place for the business and at the time of your appointment, there have been no major business interruptions. You have met with the corporation’s risk management team and identified and rated the corporation’s risks in relation to business interruption. What is the next step you should take in formulating a Business Continuity Program for the corporation?
What is the major weakness of using twisted-pair cabling?
In the planning phase of a project, after the requirements document has been completed and the calendar of events agreed upon, what is the next task to be completed?
What is the primary purpose of an alarm communication and display system?
Which of the following is not a recommended method to manage projects?
In large organizations, corporate continuity planning policies and procedures are developed and instituted. People responsible for planning at each location or division are chosen. Planning guidelines, methods and templates are developed and distributed. Who trains the people responsible for planning at each location or division?
What role should a business continuity planning consultant play in the development of an organisation’s business continuity plan?
When conducting a PSS, the practitioner should start by obtaining a layout of the facility. Which depicts areas within the facility, access points, warehouses and any adjacent areas belonging to the facility. Which of the following is not applicable for the practitioner to obtain?
“Reasonableness” can be defined as:-
Which of the terms below best describe the following definition?
A field of management that focuses on establishing and maintaining consistency of a system or product’s performance and its functional and physical attributes with its requirements, design, and operational information throughout its life.
This document describes the actions to be taken by an organisation to protect employees, the public and assets from threats created by natural and man made disasters. In developing this document managers anticipate possible threats and make all the initial decisions ahead of time, so that in the event of an incident, they can focus their time and attention on the most important actions required. It is a?
The fact that security and life safety are different disciplines and that their priorities are sometimes in conflict with each other, is nowhere better demonstrated that at the stairwell exit door, where the need to maintain immediate (unhindered) exit from the stairwell at ground level provides an opportunity for a person who has perpetrated a crime within a building to make a rapid exit. To address this issue some authorities may allow the following.
Relative to construction features, resistance to impact and firearms is a principle reason for special construction. However, terrorist bombings have added the need to evaluate blast resistant design for new high profile construction. Materials capable of providing resistive capability include?
In disaster terms, what factor best describes a plant that may be vulnerable to lightweight construction – use of processes or materials that in themselves might be hazards or might generate hazardous by-products, storage of combustibles – such as lumber, floor layout and arrangements – such as crowding of equipment, use of highly critical equipment – such as machine tools, the critical skills of employees, inadequate exits for rapid clearance of buildings, lack of shelter areas and limited evacuation routes?
All equipment installed as part of a security project should be covered by a 12 month warranty from the date of issue of the certificate of practical completion. Included in the warranty should be a service level agreement covering the maximum amount of time that can elapse without financial penalty for the contractor to address a warranty issue. The recommended amount of time that should be included in the service level agreement is:
Objectives are concrete statements describing what the project is trying to achieve. The objective should be written at a level so that it can be evaluated at the conclusion of a project to see whether it was achieved or not. A well-worded objective will be:
Before conducting site testing, the contractor should provide a report to the customer describing results of functional tests, diagnostics and calibrations, including written certification that the installed, complete system has been calibrated and tested and is ready to begin site acceptance testing. How long before the testing is scheduled to begin should this report be supplied to the customer?
As a security consultant, a company has engaged you to conduct a security review with a view to upgrading their existing security systems. The company has experienced several security breaches but to date only minor damage has occurred and nothing of significant value has been stolen. The company employee who has engaged you is an ex-police officer with 25 years service. This is his first position outside the force and has several facility related roles including security management. He has been with the company for two years and reports to the Executive Manager Risk and Audit who in turn reports to the company’s Board of Directors. You have conducted an initial interview with this person and have set out how you intend to approach the task. You have advised him that the first thing you need to do is develop data to assist in the identification of risk. He agrees and gives you free reign to collect data as you see fit as long as it complies with company policy. Which of the following techniques would you not use to collect your data?
Which of the following is considered to be the biggest loss in dollar terms to business terms in the U.S.?
What is the most prevalent type of crime committed against business in the U.S.?
Which of the following would not be exhibited in a well engineered PPS?
In a completely balanced physical protection system the minimum time to penetrate each barrier would be equal and:-
How long does it typically take for a mercury vapor lamp to restrike (re-energise)?
You are asked to improve the security of the perimeter fence of a facility due to reports of persons trespassing around the exterior perimeter of the fence. Upon examining the fence you notice that it is fixed into a solid rock base, with 3 strands of barbed wire over the top (inclusive height 8ft). It is well lit at night and with lighting extending beyond the perimeter and the fence is in excellent condition. There is a large amount of bushes, trees and other vegetation that is growing close to the fence and the surrounding area is full of local wildlife. The perimeter is monitored by CCTV. The facility is concerned about the cost of an alarm system on the fence and your physical security assessment does not deem the facility needs to install an expensive detection system on the perimeter under the current threat environment. However the facility has indicated that they are willing to consider an alarm system in their next capital upgrade. In the first instance, what would you recommend?
Why are contractors required to respond to the specified design and then if they wish, provide alternatives as additional solutions?
Project management is a major skill and it is required of anyone who undertakes business continuity planning. The ability to schedule and manage resources, time and people will help the project to a successful conclusion. What are the first three steps that need to be carried out by the project manager to produce an effective plan?
What is the major issue with having a business continuity planning consultant develop an organisation’s business continuity plan?
One definition of crime prevention (British home office crime prevention program) is “the anticipation, recognition and appraisal of a crime risk and the initiation of action to reduce or remove it. The only difference of course between crime prevention and a survey is that:
The task of the identification of critical assets, subsequent vulnerabilities, likely risk and functional requirements, analysing security requirements and formulating solutions or countermeasure concepts to reduce or eliminate vulnerabilities and mitigate risk is completed in the?
These are the perceived exposures created when a potential threat source targets a specific asset for attack, taking into consideration the organisations existing asset protection scheme, they are also known as weaknesses in an organisations asset protection plan. They are known as?
Using interchangeable or removable core locks, severely limiting the use of a single control or a grand master key, using multiple controls and multiple masters, establishing multiple key blanks, setting up single zones, maintaining strict master key controls, keeping control of zone master keys, limiting access to control keys, paying particular attention to exterior doors and maintaining lock quality and complexity of combination schemes are components of a?
You are called to investigate a series of false alarms occurring every evening within an office which is protected by ultrasonic alarms. Upon attending the office after hours you see evidence of rodent activity within the office that is centered around the protection area of the detector. What would you do in the first instance?
These type of sensors consist of a microphone and electronic amplifier/processor. Some units have a pulse counting and time interval feature and other types have the capacity for actually listening to the protected premises from a monitoring station. When the sound level increases beyond the limit normally encountered, such as picking up the noise created by a burglar during an attempt to break into a protected area, the unit signals and alarm. It is a?