Revised Physical Security Quiz - Security Systems Devices

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Blacke2
B
Blacke2
Community Contributor
Quizzes Created: 2 | Total Attempts: 386
Questions: 13 | Attempts: 313

SettingsSettingsSettings
Security Quizzes & Trivia

Security is most important to everyone to ensure that peace and tranquility is achieved. Do you work in the security sector? If you are prepared to test your knowledge on the security systems and devices. Then this is the quiz for you.


Questions and Answers
  • 1. 

    Two security professionals - Jo and Chris - are discussing access control systems.        Jo says that the choice of which access control system to use, manual or automated, should be determined by an analysis of the criticality, vulnerability and the threat.        Chris says that access control is one of the inner layers in a security-in-depth approach to physical security.      Who is correct?           DoDM 5200.01-V3, Encl. 3

    • A.

      Jo is correct.

    • B.

      Chris is correct.

    • C.

      Jo and Chris are both correct.

    • D.

      Jo and Chris are both incorrect.

    Correct Answer
    C. Jo and Chris are both correct.
    Explanation
    Both Jo and Chris are correct. Jo is correct in stating that the choice of access control system should be determined by an analysis of the criticality, vulnerability, and threat. This means that the level of security needed should be based on the specific risks and potential harm that could occur. Chris is also correct in stating that access control is one of the inner layers in a security-in-depth approach to physical security. This means that access control is just one component of a comprehensive security strategy that includes multiple layers of protection.

    Rate this question:

  • 2. 

    Access control systems are implemented to prevent unauthorized personnel from entering a designated area.         DoDm 5200.01-V3, Encl. 3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Access control systems are implemented to prevent unauthorized personnel from entering a designated area. This is an important security measure that ensures only authorized individuals have access to sensitive or restricted areas. By using various authentication methods such as keycards, biometrics, or passwords, access control systems can effectively limit entry to only those who have been granted permission. This helps to protect valuable assets, maintain privacy, and enhance overall security within an organization or facility.

    Rate this question:

  • 3. 

    An example of a manual access control system is a stand-alone system that requires the user to know a three or four-digit number to gain access to the designated area.        DoDm 5200.01-V3, Encl. 3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A manual access control system refers to a system that requires physical interaction or input from the user to grant access to a designated area. In this case, the example given is a stand-alone system that requires the user to know a three or four-digit number. This means that the user must have knowledge of the specific number in order to gain access. Therefore, the statement "An example of a manual access control system is a stand-alone system that requires the user to know a three or four-digit number to gain access to the designated area" is true.

    Rate this question:

  • 4. 

    An example of a manual system that uses automated electronics is the Common Access Card that allows users to authenticate signatures, securely log onto computer systems and gain access into designated areas.        DoDm 5200.01-V3, Encl. 3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. The Common Access Card (CAC) is a manual system that uses automated electronics. It is a smart card issued by the Department of Defense (DoD) to military personnel, civilian employees, and contractors. The CAC allows users to authenticate signatures, securely log onto computer systems, and gain access into designated areas. It combines both physical and logical access control, providing a secure and efficient way to verify the identity and privileges of the cardholder.

    Rate this question:

  • 5. 

    Biometric access control systems use individually unique characteristics such as fingerprints and voice to authenticate that an individual is authorized to gain access onto a designated area.       DoDm 5200.01-V3, Encl. 3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Biometric access control systems are indeed used to verify an individual's identity by analyzing their unique physical characteristics like fingerprints and voice. This technology ensures that only authorized individuals can enter specific areas. The reference to DoDm 5200.01-V3, Encl. 3 suggests that this practice is endorsed by the Department of Defense. Therefore, the correct answer is "True."

    Rate this question:

  • 6. 

    Two security professionals - Jo and Chris - are discussing intrusion detection systems (IDS).       Jo says that an IDS uses sensors, control units, transmission line and monitor units to detect a change in the environment.        Chris says that the two types of IDS are active and passive.      Who is correct?           DoDM 5200.01-V3, Encl. 3

    • A.

      Jo is correct.

    • B.

      Chris is correct.

    • C.

      Jo and Chris are both correct.

    • D.

      Jo and Chris are both incorrect.

    Correct Answer
    A. Jo is correct.
    Explanation
    Jo is correct because an intrusion detection system (IDS) does indeed use sensors, control units, transmission lines, and monitor units to detect changes in the environment. This is the basic architecture of an IDS. Chris is incorrect because although there are different types of IDS, active and passive are not the only two types. There are also host-based IDS, network-based IDS, and hybrid IDS, among others. Therefore, Jo is the only one who provides a correct statement.

    Rate this question:

  • 7. 

    Two security professionals - Jo and Chris - are discussing intrusion detection systems (IDS).       Jo says that IDS can be used for area security.        Chris says that IDS can be used for point security.     Who is correct?           DoDM 5200.01-V3, Encl. 3, 5200.8-R, C2.1.4.5 Based on a methodology.

    • A.

      Jo is correct.

    • B.

      Chris is correct.

    • C.

      Jo and Chris are both correct.

    • D.

      Jo and Chris are both incorrect.

    Correct Answer
    C. Jo and Chris are both correct.
    Explanation
    Jo and Chris are both correct. Intrusion detection systems (IDS) can be used for both area security and point security. IDS can monitor and analyze network traffic to detect any unauthorized access or malicious activities within a specific area (area security). Additionally, IDS can also be deployed to protect specific devices or endpoints (point security) by monitoring their network traffic and detecting any suspicious or unauthorized activities. Therefore, both Jo and Chris are correct in their statements about the capabilities of IDS.

    Rate this question:

  • 8. 

    CCTV is considered cost effective because it allows security personnel to monitor.           DoD 5200.8-R, C2.1.4.6 Based on a methodology.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CCTV is considered cost effective because it allows security personnel to monitor. This means that with the help of CCTV cameras, security personnel can keep an eye on different areas without physically being present everywhere. This reduces the need for hiring a large number of security personnel, resulting in cost savings. Additionally, CCTV cameras can continuously record footage, allowing for later review and analysis if needed. Therefore, CCTV is considered a cost-effective security solution.

    Rate this question:

  • 9. 

    CCTV systems consist of sensors, control units, transmission lines and monitor units.           DoDM 5200.01-V3, Encl. 3

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. CCTV systems actually consist of cameras, not sensors. The cameras capture the video footage, which is then transmitted through transmission lines to the control units. The control units process and manage the video signals, and the monitor units display the video feed. Therefore, the correct answer is false because the statement incorrectly includes sensors as part of CCTV systems.

    Rate this question:

  • 10. 

    CCTV systems are used to prevent, deter and detect pilferage.           DoD 5200.8-R, C2.3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CCTV systems are commonly used to prevent, deter, and detect pilferage. This means that they are employed to discourage theft and catch individuals who engage in stealing. The given answer is "True" because it accurately states that CCTV systems serve these purposes.

    Rate this question:

  • 11. 

    CCTV systems allow security personnel to safely assess and determine the size and intention of an unauthorized intrusion.          DoD 5200.8-R, C2.3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CCTV systems provide security personnel with the ability to assess and determine the size and intention of an unauthorized intrusion. This means that security personnel can use CCTV footage to evaluate the nature and extent of any unauthorized access or breach, helping them to make informed decisions about how to respond and mitigate the situation. The statement is true because CCTV systems are indeed used for this purpose in security operations.

    Rate this question:

  • 12. 

    CCTV systems provide security personnel the capability to detect, identify, track, assess, record and coordinate response to unauthorized intrusions. DoD 5200.8-R, C2.3

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CCTV systems are able to provide security personnel with various capabilities that help in ensuring security. These capabilities include detecting unauthorized intrusions, identifying the intruders, tracking their movements, assessing the situation, recording the events, and coordinating an appropriate response. The statement is true as it accurately describes the capabilities of CCTV systems in enhancing security measures.

    Rate this question:

  • 13. 

    Two security professionals - Jo and Chris - are discussing screening equipment.      Jo says that screening equipment is used in facility access control procedures.        Chris says that the use of screening equipment includes the use of two-way radios as a way for response forces to communicate with their respective control centers.     Who is correct?           DoDM 5200.8-R, C2.3.2.6

    • A.

      Jo is correct.

    • B.

      Chris is correct.

    • C.

      Jo and Chris are both correct.

    • D.

      Jo and Chris are both incorrect.

    Correct Answer
    A. Jo is correct.
    Explanation
    Jo is correct because screening equipment is indeed used in facility access control procedures. This equipment includes devices such as metal detectors, X-ray machines, and CCTV cameras, which are used to screen individuals and their belongings for prohibited items before granting them access to a facility. Chris's statement about the use of two-way radios for communication between response forces and control centers is not related to screening equipment and therefore is incorrect.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 10, 2013
    Quiz Created by
    Blacke2
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.