CISSP- Physical And Environmental Security

20 Questions | Total Attempts: 377

SettingsSettingsSettings
CISSP Quizzes & Trivia

Questions and Answers
  • 1. 
    What are the elements of a physical protection system?
    • A. 

      Determine, direct, dispatch, and report

    • B. 

      Deter, detect, delay, and response

    • C. 

      Display, develop, initiate, and apprehend

    • D. 

      Evaluate, determine, dispatch, and detain

  • 2. 
    To successfully complete a vulnerability assessment, it is critical that protection systems are well understood. Th is objective includes
    • A. 

      Threat definition, target identification, and facility characterization

    • B. 

      Threat definition, conflict control, and facility characterization

    • C. 

      Risk assessment, threat identifi cation, and incident review

    • D. 

      Threat identification, vulnerability appraisal, and access review

  • 3. 
    Laminated glass is made from two sheets of ordinary glass bonded to a middle layer of resilient plastic. When it is struck it may crack but the pieces of glass tend to stick to the plastic inner material. Th is glass is recommended in what type of locations?
    • A. 

      All exterior glass windows

    • B. 

      Interior boundary penetration and critical infrastructure facility

    • C. 

      Street-level windows, doorways, and other access areas

    • D. 

      Capacitance proximity, intrusion detection locations, and boundary penetration sites

  • 4. 
    Th e strategy of forming layers of protection around an asset or facility is known as
    • A. 

      Secured perimeter

    • B. 

      Defense-in-depth

    • C. 

      Reinforced barrier deterrent

    • D. 

      Reasonable asset protection

  • 5. 
    What crime reduction technique which is used by architects, city planners, landscapers, interior designers, and security professionals with the objective of creating a physical environment that positively infl uences human behavior?
    • A. 

      Asset protection and vulnerability assessments

    • B. 

      Reducing vulnerability by protecting, off setting, or transferring the risk

    • C. 

      Crime prevention through environmental design

    • D. 

      Instituting employee screening and workplace violence programs

  • 6. 
    The key to a successful physical protection system is the integration of
    • A. 

      People, procedures, and equipment

    • B. 

      Technology, risk assessment, and human interaction

    • C. 

      Protecting, off setting, and transferring risk

    • D. 

      Detection, deterrence, and response

  • 7. 
    What is the primary objective of controlling entry into a facility or area?
    • A. 

      Provide time management controls for all employees

    • B. 

      Ensure that only authorized persons are allowed to enter

    • C. 

      Keep potential hazards and contraband material out that could be used to commit sabotage.

    • D. 

      Identification purposes

  • 8. 
    Security lighting for CCTV monitoring generally requires at least 1 to 2 footcandles (fc) of illumination. What is the required lighting needed for safety considerations in perimeter areas such as parking lots or garages?
    • A. 

      3 fc

    • B. 

      5 fc

    • C. 

      7 fc

    • D. 

      10 fc

  • 9. 
    What would be the most appropriate interior sensor used for a building that has windows along the ground fl oor?
    • A. 

      Infrared glass-break sensor

    • B. 

      Ultrasonic glass-break sensors

    • C. 

      Acoustic and shock wave glass-break sensors

    • D. 

      Volumetric sensors

  • 10. 
    CCTV technologies make possible four distinct yet complementary functions. Th e fi rst is visual assessment of an alarm or other event. Th is permits the operator to assess the nature of the alarm before initiating a response. What are the other three functions of CCTV?
    • A. 

      Surveillance, deterrence, and evidentiary archives

    • B. 

      Intrusion detection, response, and remediation

    • C. 

      Optical, lighting, and safety

    • D. 

      Monitoring, inspection, and response

  • 11. 
    Businesses face new and complex physical security challenges across the full spectrum of operations. Although security technologies are not the answer to all organizational security problem, if applied appropriately what will they provide?
    • A. 

      Reducing electrical costs

    • B. 

      Th ey can enhance the security envelope and in the majority of cases will save the organization money

    • C. 

      Government tax incentives for increased physical protection systems

    • D. 

      Increased capital value of property with high-tech integrated technologies

  • 12. 
    vulnerability assessment tour of a facility is designed to gather information regarding the general layout of the facility, the location of key assets, information about facility operations and production capabilities, and locations and types of physical protection systems. During this tour and subsequent tours the assessment of any vulnerability of a facility or building should be done
    • A. 

      Determining where all the fi re exits are located

    • B. 

      Within the context of the defi ned threats and the value of the organization’s assets

    • C. 

      Counting the number of employees within the facility

    • D. 

      Determining the structural strength of the perimeter walls

  • 13. 
    Designing a new building to mitigate threats is simpler and more cost eff ective than retrofi tting an existing building. Important security benefi ts are achieved not by hardware and electronic devices but by shrewd site selection, proper placement of the building on the site, and careful location of building occupants and functions to minimize exposure to threat. Th ese factors also have the benefi t of reducing operating expenses over the lifetime of the building. An obvious example of this is planning for
    • A. 

      Limiting the number of entrances to the site that must be monitored, staffed and protected

    • B. 

      Reducing the cost associated with energy needs in providing the physical protection system

    • C. 

      Giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities

    • D. 

      Blast reinforcement fi lm on all perimeter windows

  • 14. 
    All visitors entering the facility should sign in and out on a visitor’s log, whether a pen and paper system or a computer-based system, to maintain accountability of who is in the facility. This system is also established for what other reasons?
    • A. 

      For the purpose of detection, accountability, and the necessity for response

    • B. 

      Access control and surveillance

    • C. 

      Timeframe of the visit, who was visited, and in the case of an emergency have accountability of everyone for safety purposes

    • D. 

      For planning assessment and the requirements of proper designation

  • 15. 
    What is the means of protecting the physical devices associated with the alarm system through line supervision, encryption, or tamper alarming of enclosures and components?
    • A. 

      Tamper protection

    • B. 

      Target hardening

    • C. 

      Security design

    • D. 

      UL 2050

  • 16. 
    When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. Th ese consist of __________________.
    • A. 

      Cable locks, encryption, password protection, and increased awareness

    • B. 

      Reducing vulnerability by protecting, off setting, or transferring the risk

    • C. 

      Operational readiness, physical protection systems, and standard operating processes

    • D. 

      Increase awareness, environmental design, and physical security

  • 17. 
    Personal identity verifi cation systems which use hand or fi ngerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication are
    • A. 

      Biometric devices

    • B. 

      Technological systems

    • C. 

      Phyiometric devices

    • D. 

      Physical analysis devices

  • 18. 
    Physical security is applied by using of physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property.
    • A. 

      Layers

    • B. 

      Methods

    • C. 

      Varieties

    • D. 

      Types

  • 19. 
    What would you call a comprehensive overview of a facility to include physical security controls, policy, procedures, and employee safety?
    • A. 

      Availability assessment

    • B. 

      Security survey

    • C. 

      Budgetary and financial performance

    • D. 

      Defense-in-depth

  • 20. 
    Which security control is most eff ective in curtailing and preventing “piggybacking” or “tailgating” as a means of unauthorized access?
    • A. 

      Cameras

    • B. 

      Turnstiles

    • C. 

      Keys

    • D. 

      Identification badges