Test your basic knowledge |

CISSP Physical Security

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Prolonged loss of power






2. These systems require human response - can cause false alarms - and depend on a constant power supply - so these protection systems should be backed up by other types of security systems.






3. The expected lifetime of a device?






4. Type of IDS that uses microphones installed on floors - walls - or ceilings to detect any should made during a forced entry. Can be subject to a large amount of false positives.






5. This type of lock is a basic padlock with a spring loaded bolt with a notch cut in it. Cheapest lock - because of their lack of any real sophistication - and also the easiest to pick.






6. An electrical circuit that receives input light from the lens and converts it into an electronic signal - which is then displayed on a monitor. Allows the capture of extraordinary details of objects because its sensors work in the infrared range. Doe






7. Type of iris lens that would be used in an area of fixed lighting.






8. These controls help minimize the resulting damage and speed the recovery process






9. These need to have shutoff valves and positive drains (substance flows out instead of in).






10. Type of window that contains glass that was heated and cooled to improve integrity and strength?






11. This type of water system delays the water release similar to a dry pipe system. However - the water is not released until a thermal-fusible link on the sprinkler head has melted. Typically used in only in data processing environments rather than a w






12. This power source is a backup in case the primary source fails.






13. This is a proximity identification device that does not require action by the user. The reader transmits signals to the device - and the device responds with an access code.






14. Type of fence that uses 1 inch mesh and 11 gauge wiring






15. Type of IDS that generates a pattern that is sent over a sensitive area and reflected back to a receiver.






16. These condition an electrical line to keep voltage steady and clean.






17. This is a specific type of smoke-activate fire alarm that detects changes in light intensity.






18. This should be located within 50 feet of electrical equipment and should be inspected quarterly.






19. If an electrical supply fails and a door defaults to closed and unlocked - which mode is this?






20. This type of lock is programmable and uses a keypad. Can contain a specific code that will open the door and initiate a remote alarm if an employee is under duress.






21. This should be clearly marked - and security guards should be trained how to identify when these items leave the facility in an improper manner.






22. These can be user activated (action needs to be taken by a user) or system sensing (no action needs to be taken by the user)






23. Type of task that identifies how data flows through the company. Lists all pieces of an environment and how they interact. Redundant paths should be shown.






24. These should be located on and above suspended ceilings - below raised floors - and in air ducts to provide maximum fire detection.






25. When should the following items be evaluated? Local crime - natural disaster possibilities - distance to hospitals - police - fire stations - airports - and railroads.






26. Items that a fire needs to burn? To suppress it - one of them should be reduced or eliminated.






27. These controls can be time consuming and error prone and and require constant attention.






28. What is the more important than protecting a facility or the assets it contains?






29. These are expensive but provide flexibility in response to security breaches and can deter intruders from attempting an attack.






30. Class of fire that is common combustibles (wood - paper - and laminates). Suppressed with water or foam.






31. This refers to the portion of the environment that is in focus when shown on a monitor. This increases as the size of the lens opening decreases - the subject distance increases - or the focal length of the lens decreases.






32. Type of window that is the strongest window available today. Resistant to breakage - chemicals - fires - and abrasions. They are also extremely expensive.






33. Enhanced boundary fencing with motion detectors. Used at facilities that require a high level of protection.






34. Fire suppressant that reduces the temperature of the fire?






35. Why does the value of property with the facility and the value of the facility itself need to be ascertained?






36. Class of fire that is assigned to commercial kitchens and the fire dangers that exist within them. Suppressing agent used in class K fires is wet chemicals.






37. What can cause corrosion?






38. This should be protected from destruction - modification - theft - unauthorized copying - and disclosure.






39. Type of fence that uses 2 inch mesh - 9 gauge wiring






40. Type of iris lens that would be used in an area where light changes.






41. What system should maintain the appropriate temperature and humidity levels and provide closed-loop recirculating air-conditioning and positive pressurization and ventilation.






42. Type of fence that uses 3/8 inch mesh and 11 gauge wiring






43. What should dust and other air contaminants be kept to an appropriate level?






44. This is when unauthorized access is achieved to a facility via another individual's legitimate access - and is a common concern with physical security.






45. This is a disturbance of power and can be cause by electromagnetic interference (EMI) or radio frequency interference (RFI)






46. Device locks intended to protect hardware from theft. Use for mobile devices and lock them to a secure feature of an environment.






47. These use battery packs that range in size and capacity to provide power backup and protection. These factors should be reviewed: size of the electrical load it can support - the speed with which it can assume the load when the primary source fails -






48. These need to be able to hold the necessary load and provide the required fire rating.






49. This gas is no longer available because it depletes the ozone. Becomes toxic in temperatures greater than 900 degrees F in concentrations greater than 10%. Existing fire extinguishers can be refilled with FM-200 - NAF-S-III - CEA-410 - FE-13 - Water






50. Halon - FM-200 - and other Halon substitutes are examples of what?