CISSP Quiz: Physical And Environmental Security!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cindymurray
C
Cindymurray
Community Contributor
Quizzes Created: 8 | Total Attempts: 15,187
| Attempts: 1,084 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication is

Explanation

Biometric devices rely on measurements of biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns. 

Submit
Please wait...
About This Quiz
CISSP Quiz: Physical And Environmental Security! - Quiz

This CISSP Quiz focuses on Physical and Environmental Security, assessing knowledge in protection systems, vulnerability assessments, and crime prevention through design. It evaluates the integration of people, procedures,... see moreand equipment to enhance security measures. see less

2. What is the primary objective of controlling entry into a facility or area?

Explanation

The primary function of an access control system (ACS) is to ensure that only authorized personnel are permitted inside the controlled area. This can also include the regulation and flow of materials into and out of specific areas. Persons subject to control can include employees, visitors, customers, vendors, and the public. Access control measures should be different for each application to fulfill specific security, cost, and operational objectives.

Submit
3. What are the elements of a physical protection system?

Explanation

A well-designed system provides protection-in-depth, minimizes the consequences of component failures, and exhibits balanced protection. The system itself typically has some elements that fall into the essence of deter–detect—delay–respond. 

Submit
4. Businesses face new and complex physical security challenges across the full spectrum of operations. Although security technologies are not the answer to all organizational security problems, if applied appropriately what will they provide?

Explanation

These days, all businesses face new and complex physical security challenges across the full spectrum of operations. Although security technologies are not the answer to all organizational security problems, if applied appropriately, they can enhance the security envelope and, in the majority of cases, will save the organization money. 

Submit
5. When using a piece of portable computing equipment or media, regardless of whether it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed to maintain the equipment's security. These consist of __________________.

Explanation

When using a piece of portable computer equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed to maintain the security of the equipment: use a cable lock, do not leave the equipment unattended or unsecured, use strong passwords, and encrypt data. 

Submit
6. Physical security is applied by using physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property.

Explanation

The primary goal of a physical protection program is to control access into the facility. In the concept of defense-in-depth, barriers are arraigned in layers, with the level of security growing progressively higher as one comes closer to the center or the highest protective area. Defending an asset with a multiple postures can reduce the likelihood of a successful attack; if one layer of defense fails, another layer of defense will hopefully prevent the attack, and so on. 

Submit
7. What crime reduction technique is used by architects, city planners, landscapers, interior designers, and security professionals with the objective of creating a physical environment that positively influences human behavior?

Explanation

Crime prevention through environmental design (CPTED) is a crime reduction technique that has several key elements applicable to the analysis of the building function and site design against physical attack. It is used by architects, city planners, landscapers, interior designers, and security professionals with the objective of creating a climate of safety in a community by designing a physical environment that positively influences human behavior. 

Submit
8. CCTV technologies make possible four distinct yet complementary functions. Th e first is a visual assessment of an alarm or other event. This permits the operator to assess the nature of the alarm before initiating a response. What are the other three functions of CCTV?

Explanation

Uses of CCTV systems for security services include several diff erent functions: surveillance, assessment, deterrence, and evidentiary archives. 

Submit
9. A vulnerability assessment tour of a facility is designed to gather information regarding the general layout of the facility, the location of key assets, information about facility operations and production capabilities, and locations and types of physical protection systems. During this tour and subsequent tours the assessment of any vulnerability of a facility or building should be done

Explanation

The assessment of any facility or building's vulnerability should be done within the context of the defined threats and the value of the organization’s assets. Each element of the facility should be analyzed for vulnerabilities to each threat, and a vulnerability rating should be assigned. A vulnerability assessment may change the value rating of assets due to identifying critical nodes or some other factor that makes the organization’s assets more valuable.

Submit
10. Designing a new building to mitigate threats is simpler and more cost-effective than retrofitting an existing building. Important security benefits are achieved not by hardware and electronic devices but by shrewd site selection, proper placement of the building on the site, and careful location of the building occupants and functions to minimize exposure to the threat. These factors also have the benefit of reducing operating expenses over the lifetime of the building. An obvious example of this is planning for:

Explanation

Gates exist to facilitate and control access. Gates need to be controlled to ensure that only authorized persons and vehicles pass through. It is best to minimize the number of gates and access points because any opening is always a potential vulnerability. Each gate requires resources whether it uses electronic access control or a guard. The fewest number of entry points, the better the control of the facility. 

Submit
11. Th e strategy of forming layers of protection around an asset or facility is known as

Explanation

In the concept of defense-in-depth, barriers are arraigned in layers with the level of security growing progressively higher as one comes closer to the center or the highest protective area. Defending an asset with a multiple postures can reduce the likelihood of a successful attack; if one layer of defense fails, another layer of defense will hopefully prevent the attack, and so on. 

Submit
12. Which security control is most effective in curtailing and preventing "piggybacking" or "tailgating" as a means of unauthorized access?

Explanation

A common and frustrating loophole in an otherwise secure access control systems can be the ability of an unauthorized person to follow through a checkpoint behind an authorized person, called “piggybacking” or “tailgating.” One solution is an airlock-style arrangement called a mantrap, in which a person opens one door and waits for it to close before the next door opens. Another available system is a turnstile, which can be used as a supplemental control to assist a guard or receptionist while controlling access into a protected area. 

Submit
13. What would be the most appropriate interior sensor used for a building that has windows along the ground floor?

Explanation

Glass-break sensors are a good intrusion detection device for buildings with a lot of glass windows and doors with glass panes. The use of dual-technology glass break sensors—acoustic and shock wave—is most effective. The reason is that if the only acoustic is used and an employee pulls the window blinds up, it can set off a false alarm; but if it is set to a dual-alarm system both acoustic and shock sensors will need to be activated before an alarm is triggered. 

Submit
14. All visitors entering the facility should sign in and out on a visitor's log, whether a pen and paper system or a computer-based system, to maintain accountability of who is in the facility. This system is also established for what other reasons?

Explanation

All visitors entering the facility should sign in and out on a visitor’s log to maintain accountability of who is in the facility, the timeframe of the visit, who they visited, and in the case of an emergency have the accountability of everyone for safety purposes.

Submit
15. The key to a successful physical protection system is the integration of:

Explanation

The key to a successful system is the integration of people, procedures, and equipment into a system that protects the targets from the threat. A well-designed system provides protection-in-depth, minimizes the consequences of component failures, and exhibits balanced protection. 

Submit
16. What would you call a comprehensive overview of a facility to include physical security controls, policy, procedures, and employee safety?

Explanation

Before any project begins there must be an assessment made in order to put together an operational plan and a practical approach to securing the facility. This security assessment can also be called a security survey, vulnerability assessment, or risk analysis. 

Submit
17. What are the means of protecting the physical devices associated with the alarm system through line supervision, encryption, or tamper alarming of enclosures and components?

Explanation

Tamper protection is the means of protecting the physical devices associated with the alarm system through line supervision, encryption or tamper alarming of enclosures and components. 

Submit
18. Security lighting for CCTV monitoring generally requires at least 1 to 2 footcandles (FC) of illumination. What is the required lighting needed for safety considerations in perimeter areas such as parking lots or garages?

Explanation

Lights used for CCTV monitoring generally require at least one to two footcandles of illumination, whereas the lighting needed for safety considerations in exterior areas such as parking lots or garages substantially greater (at least 5 fc).

Submit
19. To successfully complete a vulnerability assessment, it is critical that protection systems are well understood. This objective includes

Explanation

In the beginning, a good assessment requires the security professional to determine specific protection objectives. These objectives include threat definition, target identification, and facility characteristics. 

Submit
20. Laminated glass is made from two sheets of ordinary glass bonded to a middle layer of resilient plastic. It may crack when it is struck, but the pieces of glass tend to stick to the plastic inner material. This glass is recommended in what type of locations?

Explanation

Laminated glass is recommended for installation in street-level windows, doorways, and other access areas.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 22, 2012
    Quiz Created by
    Cindymurray
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Personal identity verification systems which use hand or fingerprint,...
What is the primary objective of controlling entry into a facility or...
What are the elements of a physical protection system?
Businesses face new and complex physical security challenges across...
When using a piece of portable computing equipment or media,...
Physical security is applied by using physical protective measures ...
What crime reduction technique is used by architects, city planners, ...
CCTV technologies make possible four distinct yet complementary...
A vulnerability assessment tour of a facility is designed to gather...
Designing a new building to mitigate threats is simpler and more...
Th e strategy of forming layers of protection around an asset or...
Which security control is most effective in curtailing and preventing...
What would be the most appropriate interior sensor used for a building...
All visitors entering the facility should sign in and out on a...
The key to a successful physical protection system is the integration...
What would you call a comprehensive overview of a facility to include...
What are the means of protecting the physical devices associated with...
Security lighting for CCTV monitoring generally requires at least 1 to...
To successfully complete a vulnerability assessment, it is critical...
Laminated glass is made from two sheets of ordinary glass bonded to a...
Alert!

Advertisement