Chapter 09
9 Pages

Chapter 09

Course Number: COM 308, Fall 2010

College/University: St. Leo

Word Count: 2129

Rating:

Document Preview

09 True/False Indicate whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. A name badge is typically worn concealed. 2. Locks can be divided into four categories based on the triggering process: manual, programmable, electronic, and biometric. 3. Keycard readers based on smart cards are commonly used for securing computer rooms, communications closets, and other restricted...

Unformatted Document Excerpt
Coursehero >> Florida >> St. Leo >> COM 308

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Indicate 09 True/False whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. A name badge is typically worn concealed. 2. Locks can be divided into four categories based on the triggering process: manual, programmable, electronic, and biometric. 3. Keycard readers based on smart cards are commonly used for securing computer rooms, communications closets, and other restricted areas. 4. When the lock of a door fails and the door becomes unlocked, it is classified as a fail-secure lock. 5. Vibration sensors fall into the motion sensor category. 6. Carbon dioxide systems rob fire of its oxygen. 7. Fire detection systems fall into two general categories: manual and electrical. 8. While the temperature of ignition, or fire point, depends upon the material, it can be as low as a few hundred degrees. 9. There are very few qualified and professional agencies that provide consulting in the area of physical security. ____ 10. Telecommuters must use a securable operating system that requires password authentication, such as Windows NT/2000/XP. ____ 11. For laptops there are burglar alarms made up of a PC card or other device that contains a motion detector. ____ 12. There are three methods of data interception: direct observation, interception of data transmission, and mechanical interception. ____ 13. Water damage does not affect computer systems. ____ 14. True online UPS can deliver a constant, smooth, conditioned power stream to computing systems. ____ 15. The capacity of UPS devices is measured using the volt output rating. ____ 16. In general, ESD damage to chips produces two types of failures: immediate and latent. ____ 17. Static electricity is not noticeable to humans until levels approach 150 volts. ____ 18. Inergen is a high-pressure agent composed of nitrogen, argon, and carbon dioxide. ____ 19. Water-based systems are low cost, nontoxic, and require minimal retrofit for an existing sprinkler system. ____ 20. A wet-pipe system is usually considered appropriate in computer rooms. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 21. The access controls for a building are often operated by a group called facilities management. _________________________ ____ 22. Guards have the ability to apply human reasoning. _________________________ ____ 23. Mechanical locks can accept a variety of inputs as keys, including magnetic strips on ID cards, radio signals from name badges, personal identification numbers (PINs) typed into a keypad, or some combination of these to activate an electrically powered servo to unlock the mechanism. _________________________ ____ 24. A common form of mechanical locks are electric strike locks, which are used when individuals announce themselves and are buzzed into a building. _________________________ ____ 25. When the lock of a door fails and the door remains locked, this is a(n) fail-safe lock. _________________________ ____ 26. Cold detectors work by detecting rates of change in the ambient temperature in the room. _________________________ ____ 27. Manual fire detection systems include human responses, such as calling the fire department, as well as manually activated alarms, such as sprinklers and gaseous systems. _________________________ ____ 28. Smoke detection systems are perhaps the most common means of detecting a potentially dangerous fire, and they are required by building codes in most residential dwellings and commercial buildings. _________________________ ____ 29. Class C fires are those fueled by combustible metals, such as magnesium, lithium, and sodium. _________________________ ____ 30. All liquid systems are designed to apply liquid, usually water, to all areas in which a fire has been detected. _________________________ ____ 31. A variation of the dry-pipe system is the pre-action system, which has a two phase response to a fire. _________________________ ____ 32. Gaseous emission systems can be used in the suppression of fires. _________________________ ____ 33. Grounding ensures that the returning flow of current is properly discharged to the ground. _________________________ ____ 34. In an offline UPS, the primary power source is the battery, and the power feed from the utility is constantly recharging this battery. _________________________ ____ 35. Videoconferencing involves computing that uses telecommunications facilities that encompass connections over the Internet, connections using dial-up connections, connections over leased point-to-point links between offices, and other connection mechanisms used by employees while traveling. _________________________ Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 36. Most guards have clear ____ that help them to act decisively in unfamiliar situations. a. MACs c. POSs b. SOPs d. OPSs ____ 37. ____ occurs when an authorized individual presents a key to open a door, and other individuals, who may or may not be authorized, also enter through. a. Sidegating c. Freeloading b. Tailgating d. Hitchhiking ____ 38. ____ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security. a. Programmable c. Biometric ____ 39. ____ 40. ____ 41. ____ 42. ____ 43. ____ 44. ____ 45. ____ 46. ____ 47. ____ 48. ____ 49. ____ 50. ____ 51. ____ 52. b. Manual d. Electronic The most sophisticated locks are ____. a. manual c. electronic b. programmable d. biometric Electronic monitoring includes ____ systems. a. blocked video c. open-circuit television b. local video d. closed-circuit television ____ sensors work when two contacts are connected as, for example, when a foot steps on a pressure-sensitive pad under a rug, or a window being opened triggers a pin and spring sensor. a. Pressure c. Motion b. Contact and weight d. Movement The interior walls reach only part way to the next floor, which leaves a space above the ceiling of the offices but below the top of the storey. This space is called a(n) ____. a. kneespace c. plenum b. attic d. padding Fire ____ systems are devices installed and maintained to detect and respond to a fire, potential fire, or combustion situation. a. detection c. protection b. suppression d. prevention In the ____ approach, the sensor detects an unusually rapid increase in the area temperature within a relatively short period of time. a. fixed temperature c. fixed rate b. permanent temperature d. rate-of-rise ____ sensors project and detect an infrared beam across an area. a. Photoelectric c. Air-aspirating b. Smoke d. Thermal Class ____ fires are extinguished by agents that remove oxygen from the fire. a. A c. C b. B d. D Class ____ fires are extinguished with agents that must be non-conducting. a. A c. C b. B d. D A(n) ____ system is designed to work in areas where electrical equipment is used. Instead of containing water, the system contains pressurized air. a. wet-pipe c. deluge b. dry-pipe d. sprinkler ____ sprinklers are the newest form of sprinkler systems and rely on ultra fine mists instead of traditional shower-type systems. a. Pre-action c. Water-free b. Water mist d. Air-dry One of the leading causes of damage to sensitive circuitry is ____. a. CPU c. ESD b. EPA d. HVAC Computing and other electrical equipment in areas where water can accumulate must be uniquely grounded, using ____ equipment. a. UPS c. GFCI b. HVAC d. ESD A that device assures the delivery of electric power without interruption is a(n) ____. a. GFCI c. GPS b. HVAC d. UPS ____ 53. UPS devices typically run up to ____ VA. a. 100 c. 500 b. 250 d. 1,000 ____ 54. In the ____ UPS, the internal components of the standby models are replaced with a pair of inverters and converters. a. line-interactive c. true online b. ferroresonant d. offline ____ 55. A relatively new technology to support the location of lost or stolen laptops is ____. a. CompuTrace c. Netscape b. Norton d. SSL Completion Complete each statement. 56. _________________________ security addresses the design, implementation, and maintenance of countermeasures that protect the physical resources of an organization. 57. A secure _________________________ is a physical location that has been engineered with controls designed to minimize the risk of attacks from physical threats. 58. A(n) _________________________ is typically worn concealed. 59. The _________________________ lock may rely on a key that is a carefully shaped piece of metal, which a person rotates to turn tumblers to release secured loops of steel, aluminum, or brass. 60. _________________________ locks can be integrated into alarm systems and combined with other building management systems. 61. A specialized type of keycard reader is the _________________________ reader, which allows individuals simply to carry their cards within the locks range for recognition. 62. A(n) _________________________ is a small enclosure that has an entry point and a different exit point. 63. _________________________ detect movement within a confined space and are either active or passive. 64. Building codes require that each floor have a number of _________________________ or walls that will limit the spread of damage should a fire break out in an office. 65. The temperature of ignition is called the _________________________ of a material. 66. The thermal detection systems contain a sophisticated heat _________________________ 67. The _________________________ detector is a sensor that detects the infrared or ultraviolet light produced by an open flame. 68. Class _________________________fires are extinguished by agents that interrupt the ability of the fuel to be ignited. 69. A(n) _________________________ system has pressurized water in all pipes and has some form of valve in each protected area. 70. Some sprinkler systems are installed as a(n) _________________________ system, in which all of the individual sprinkler heads are kept open, and as soon as the system is activated, water will be immediately applied to all areas. 71. Halon is one of a few chemicals designated as a(n) _________________________ agent, which means that it does not leave any residue after use, nor does it interfere with the operation of electrical or electronic equipment. 72. _________________________ is the amount of moisture in the air. 73. Interference with the normal pattern of the electrical current is also referred to as _________________________ in the current. 74. A(n) _________________________ or offline UPS is an offline battery backup that detects the interruption of power to the power equipment. 75. The U.S. government has developed a program, named _________________________ to reduce the risk of EMR monitoring. Essay 76. Identify the "Seven Major Sources of Physical Loss? 77. Describe different types of sensors to detect intrusions. 78. Explain how a mantrap works. 09 Answer Section TRUE/FALSE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerT T F F T F F F T T F F T F T F T T F PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 404 404 406 406 408 410 410 410 428 427 426 424 423 422 420 419 418 417 416 415 MODIFIED TRUE/FALSE 21. Register to View Answer22. Register to View Answer23. Register to View AnswerElectromechanical PTS: 1 24. Register to View Answerelectronic REF: 404 PTS: 1 PTS: 1 REF: 402 REF: 403 PTS: 1 REF: 405 25. Register to View Answerfail-secure PTS: 1 26. Register to View AnswerThermal PTS: 1 27. Register to View Answer28. Register to View Answer29. Register to View AnswerD REF: 406 REF: 408 PTS: 1 PTS: 1 REF: 410-411 REF: 411 PTS: 1 30. Register to View Answersprinkler 31. 32. 33. 34. PTS: 1 Register to View AnswerRegister to View AnswerRegister to View AnswerRegister to View Answeronline true online REF: 412 REF: 415 PTS: 1 PTS: 1 PTS: 1 REF: 416 REF: 416 REF: 420 PTS: 1 REF: 422 35. Register to View AnswerTelecommuting PTS: 1 REF: 427 MULTIPLE CHOICE 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerB A D D B C B D A B C B B C C D D A A PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 403 404 405 406 407 408 409 410 411 411 412 412 415 416 418 420 420 420 422 426 COMPLETION 56. ANS: Physical PTS: 1 57. ANS: facility PTS: 1 REF: 401 REF: 402 58. ANS: identification card ID card identification (ID) card ID (identification) card PTS: 1 59. ANS: mechanical PTS: 1 60. ANS: Electronic PTS: 1 61. ANS: proximity PTS: 1 62. ANS: mantrap REF: 404 REF: 404 REF: 405 REF: 406 PTS: 1 REF: 406 63. ANS: Motion detectors PTS: 1 64. ANS: firewalls PTS: 1 65. ANS: flame point PTS: 1 66. ANS: sensor PTS: 1 67. ANS: flame PTS: 1 68. Register to View AnswerPTS: 1 69. ANS: wet-pipe PTS: 1 70. ANS: deluge PTS: 1 71. ANS: clean PTS: 1 72. ANS: Humidity PTS: 1 REF: 408 REF: 408 REF: 410 REF: 411 REF: 411 REF: 412 REF: 415 REF: 415 REF: 417 REF: 418 73. ANS: noise PTS: 1 74. ANS: standby PTS: 1 75. ANS: TEMPEST PTS: 1 ESSAY 76. ANS: 1. Extreme temperature: heat, cold 2. Gases: war gases, commercial vapors, humid or dry air, suspended particles 3. Liquids: water, chemicals 4. Living organisms: viruses, bacteria, people, animals, insects 5. Projectiles: tangible objects in motion, powered objects 6. Movement: collapse, shearing, shaking, vibration, liquefaction, flow waves, separation, slide 7. Energy anomalies: electrical surge or failure, magnetism, static electricity, aging circuitry; radiation: sound, light, radio, microwave, electromagnetic, atomic PTS: 1 REF: 401 77. ANS: There are a number of different types of sensors: motion detectors, thermal detectors, glass breakage detectors, weight sensors, and contact sensors. Motion detectors detect movement within a confined space and are either active or passive. Thermal detectors work by detecting rates of change in the ambient temperature in the room. Contact and weight sensors work when two contacts are connected as, for example, when a foot steps on a pressure-sensitive pad under a rug, or a window being opened triggers a pin and spring sensor. Vibration sensors also fall into this category, except that they detect movement of the sensor rather than movement in the environment. PTS: 1 REF: 408 78. Register to View Answercommon enhancement for locks in high security areas is the mantrap. A mantrap is a small enclosure that has separate entry and exit points. To gain access to the facility, area, or room, a person enters the mantrap, requests access via some form of electronic or biometric lock and key, and if confirmed, exits the mantrap into the facility. Otherwise the cannot leave the mantrap until a security official overrides the enclosures automatic locks. PTS: 1 REF: 406-407 REF: 419 REF: 422 REF: 425
MOST POPULAR MATERIALS FROM COM 308
MOST POPULAR MATERIALS FROM COM
MOST POPULAR MATERIALS FROM St. Leo