Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
What are the three independent components or mitigation techniques of a security program?
(17-1) |
1. Electronic;
2. architectural;
3. operational |
|
What is a fundamental concept of security design?
(17-2) |
Layering |
|
Providing safety and security is a balancing act between ______ and ________
(17-5) |
Access; isolation |
|
What are the seven categories of potential causes for damage or loss?
(17-6) |
Temperature;
Gases;
Liquids;
Organisms;
Projectiles;
Movement;
Energy Anamolies |
|
What are examples of tangible assets?
(17-8) |
Cash, bonds, materials, pharmaceuticals, weapons, and other similar hard items. |
|
What are intangible assets?
(17-8) |
client, employee, reputation and perceived level of security |
|
Electronic Access Control systems can be divided into the following three levels:
(17-12) |
Level 1 - Headend processing, recording, software, or database;
Level 2 - Intelligent field processing (e.g. data gathering panel)
Level 3 - Field devices (e.g. card reader, lock, door position switch) |
|
What are four different types of basic door locks?
(17-16) |
Bored locks;
rim locks;
mortise locks;
vertical rod locks |
|
Electrical strikes commonly fail to what position?
(17-17) |
Fail secure; since the locking hardware normally allows for free egress mechanically |
|
Where are electric strikes located?
(17-17) |
They are cut into the frame of the door for bored locks |
|
What are the two general types of magnetic locks?
(17-18) |
1. Direct hold;
2. shear locks |
|
If a magnetic lock is used on an egress door, what is required?
(17-19) |
Two means of egress; a mechanical switch and a request to exit button located within 5 feet of the door between 40 and 48 inches above finished floor. |
|
What are some primary applications for video surveillance?
(17-24) |
Investigation;
prosecution;
deterrence;
observation;
intrusion detection |
|
What are IR cameras?
(17-25) |
Specifically designed imagers capable of seeing into the low IR bandwidth |
|
What are thermal cameras?
(17-25) |
Captures heat and temperature values |
|
What are film cameras?
(17-25) |
traditional film cameras |
|
How are lenses defined?
(17-25) |
They are defined by their focal length, represented in millimeters, ranging from 3 mm to 100 mm |
|
Interior and exterior cameras should be mounted at a minimum of what height?
(17-27) |
8 feet and 15 feet AFF |
|
What are the three primary methods of transmitting video signals?
(17-28) |
1. RF; 2. Free-space optics; 3. Microwave |
|
How is IP base video accomplished?
(17-29) |
1. Digitization of video from an analog device for conversion to IP video;
2. Use of IP based cameras |
|
Both EAC and Intrusion detection are considered what kind of defense?
(17-34) |
Inner defenses |
|
What are three general types of alarms?
(17-35) |
1. Fire Alarms;
2. Intrusion Alarms;
3. Special Alarms |
|
What are three components of fire?
(17-39) |
1. Smoke
2. Heat
3. Light Radiation |
|
What are two types of fire alarm pull stations?
(17-40) |
Single Action;
Double Action |
|
Where are pull stations located?
(17-40) |
Within 5 feet of each door that is a point of egress and within 200 feet of each other. They are mounted at height between 48 and 54 inches AFF. |
|
NFPA 72 requires sound signals to achieve what levels?
(17-42) |
15 dB over ambient; or 5 dB over the maximum dBA level and have a duration of at least 60 seconds |
|
What are installed when the single power supply within the central control panel is not sufficient to serve all FA devices?
(17-47) |
Remote control panels |
|
What product is capable of demonstrating 90 percent probability of successfully completing each transmission sequence?
(17-50) |
Digital Alarm Radio Transmitter (DART) |