CISSP Quiz: Physical And Environmental Security!

20 Questions | Total Attempts: 589

SettingsSettingsSettings
CISSP Quiz: Physical And Environmental Security!

.


Questions and Answers
  • 1. 
    What are the elements of a physical protection system?
    • A. 

      Determine, direct, dispatch, and report

    • B. 

      Deter, detect, delay, and response

    • C. 

      Display, develop, initiate, and apprehend

    • D. 

      Evaluate, determine, dispatch, and detain

  • 2. 
    To successfully complete a vulnerability assessment, it is critical that protection systems are well understood. This objective includes
    • A. 

      Threat definition, target identification, and facility characterization

    • B. 

      Threat definition, conflict control, and facility characterization

    • C. 

      Risk assessment, threat identifi cation, and incident review

    • D. 

      Threat identification, vulnerability appraisal, and access review

  • 3. 
    Laminated glass is made from two sheets of ordinary glass bonded to a middle layer of resilient plastic. It may crack when it is struck, but the pieces of glass tend to stick to the plastic inner material. This glass is recommended in what type of locations?
    • A. 

      All exterior glass windows

    • B. 

      Interior boundary penetration and critical infrastructure facility

    • C. 

      Street-level windows, doorways, and other access areas

    • D. 

      Capacitance proximity, intrusion detection locations, and boundary penetration sites

  • 4. 
    Th e strategy of forming layers of protection around an asset or facility is known as
    • A. 

      Secured perimeter

    • B. 

      Defense-in-depth

    • C. 

      Reinforced barrier deterrent

    • D. 

      Reasonable asset protection

  • 5. 
    What crime reduction technique is used by architects, city planners, landscapers, interior designers, and security professionals with the objective of creating a physical environment that positively influences human behavior?
    • A. 

      Asset protection and vulnerability assessments

    • B. 

      Reducing vulnerability by protecting, off setting, or transferring the risk

    • C. 

      Crime prevention through environmental design

    • D. 

      Instituting employee screening and workplace violence programs

  • 6. 
    The key to a successful physical protection system is the integration of:
    • A. 

      People, procedures, and equipment

    • B. 

      Technology, risk assessment, and human interaction

    • C. 

      Protecting, off setting, and transferring risk

    • D. 

      Detection, deterrence, and response

  • 7. 
    What is the primary objective of controlling entry into a facility or area?
    • A. 

      Provide time management controls for all employees

    • B. 

      Ensure that only authorized persons are allowed to enter

    • C. 

      Keep potential hazards and contraband material out that could be used to commit sabotage.

    • D. 

      Identification purposes

  • 8. 
    Security lighting for CCTV monitoring generally requires at least 1 to 2 footcandles (FC) of illumination. What is the required lighting needed for safety considerations in perimeter areas such as parking lots or garages?
    • A. 

      3 fc

    • B. 

      5 fc

    • C. 

      7 fc

    • D. 

      10 fc

  • 9. 
    What would be the most appropriate interior sensor used for a building that has windows along the ground floor?
    • A. 

      Infrared glass-break sensor

    • B. 

      Ultrasonic glass-break sensors

    • C. 

      Acoustic and shock wave glass-break sensors

    • D. 

      Volumetric sensors

  • 10. 
    CCTV technologies make possible four distinct yet complementary functions. Th e first is a visual assessment of an alarm or other event. This permits the operator to assess the nature of the alarm before initiating a response. What are the other three functions of CCTV?
    • A. 

      Surveillance, deterrence, and evidentiary archives

    • B. 

      Intrusion detection, response, and remediation

    • C. 

      Optical, lighting, and safety

    • D. 

      Monitoring, inspection, and response

  • 11. 
    Businesses face new and complex physical security challenges across the full spectrum of operations. Although security technologies are not the answer to all organizational security problems, if applied appropriately what will they provide?
    • A. 

      Reducing electrical costs

    • B. 

      Th ey can enhance the security envelope and in the majority of cases will save the organization money

    • C. 

      Government tax incentives for increased physical protection systems

    • D. 

      Increased capital value of property with high-tech integrated technologies

  • 12. 
    A vulnerability assessment tour of a facility is designed to gather information regarding the general layout of the facility, the location of key assets, information about facility operations and production capabilities, and locations and types of physical protection systems. During this tour and subsequent tours the assessment of any vulnerability of a facility or building should be done
    • A. 

      Determining where all the fi re exits are located

    • B. 

      Within the context of the defi ned threats and the value of the organization’s assets

    • C. 

      Counting the number of employees within the facility

    • D. 

      Determining the structural strength of the perimeter walls

  • 13. 
    Designing a new building to mitigate threats is simpler and more cost-effective than retrofitting an existing building. Important security benefits are achieved not by hardware and electronic devices but by shrewd site selection, proper placement of the building on the site, and careful location of the building occupants and functions to minimize exposure to the threat. These factors also have the benefit of reducing operating expenses over the lifetime of the building. An obvious example of this is planning for:
    • A. 

      Limiting the number of entrances to the site that must be monitored, staffed and protected

    • B. 

      Reducing the cost associated with energy needs in providing the physical protection system

    • C. 

      Giving employees easy access to the facility without their knowledge of the security components used in monitoring their activities

    • D. 

      Blast reinforcement fi lm on all perimeter windows

  • 14. 
    All visitors entering the facility should sign in and out on a visitor’s log, whether a pen and paper system or a computer-based system, to maintain accountability of who is in the facility. This system is also established for what other reasons?
    • A. 

      For the purpose of detection, accountability, and the necessity for response

    • B. 

      Access control and surveillance

    • C. 

      Timeframe of the visit, who was visited, and in the case of an emergency have accountability of everyone for safety purposes

    • D. 

      For planning assessment and the requirements of proper designation

  • 15. 
    What are the means of protecting the physical devices associated with the alarm system through line supervision, encryption, or tamper alarming of enclosures and components?
    • A. 

      Tamper protection

    • B. 

      Target hardening

    • C. 

      Security design

    • D. 

      UL 2050

  • 16. 
    When using a piece of portable computing equipment or media, regardless of whether it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed to maintain the equipment's security. These consist of __________________.
    • A. 

      Cable locks, encryption, password protection, and increased awareness

    • B. 

      Reducing vulnerability by protecting, off setting, or transferring the risk

    • C. 

      Operational readiness, physical protection systems, and standard operating processes

    • D. 

      Increase awareness, environmental design, and physical security

  • 17. 
    Personal identity verification systems which use hand or fingerprint, handwriting, eye pattern, voice, face, or any other physical characteristics for authentication is
    • A. 

      Biometric devices

    • B. 

      Technological systems

    • C. 

      Phyiometric devices

    • D. 

      Physical analysis devices

  • 18. 
    Physical security is applied by using physical protective measures to prevent or minimize theft, unauthorized access, or destruction of property.
    • A. 

      Layers

    • B. 

      Methods

    • C. 

      Varieties

    • D. 

      Types

  • 19. 
    What would you call a comprehensive overview of a facility to include physical security controls, policy, procedures, and employee safety?
    • A. 

      Availability assessment

    • B. 

      Security survey

    • C. 

      Budgetary and financial performance

    • D. 

      Defense-in-depth

  • 20. 
    Which security control is most effective in curtailing and preventing “piggybacking” or “tailgating” as a means of unauthorized access?
    • A. 

      Cameras

    • B. 

      Turnstiles

    • C. 

      Keys

    • D. 

      Identification badges

Back to Top Back to top