Test your basic knowledge |

CISSP Physical Security

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of light that provides an even amount of light across an area?






2. These condition an electrical line to keep voltage steady and clean.






3. This is a proximity identification device that does not require action by the user. The reader transmits signals to the device - and the device responds with an access code.






4. The temperature at which most computers will experience major damage?






5. The last line of defense in physical security?






6. Type of IDS that detects changes in heat waves in an area.






7. These controls help minimize the resulting damage and speed the recovery process






8. Type of fence that will protect a top level security area?






9. The following are examples of what type of control? Drills and exercises of emergency procedures - simulation testing - documentation - inspections and reports - pre-screening of employees - post-employment procedures - delegation of responsibility a






10. Type of iris lens that would be used in an area of fixed lighting.






11. What is used to measure humidity levels?






12. What system should maintain the appropriate temperature and humidity levels and provide closed-loop recirculating air-conditioning and positive pressurization and ventilation.






13. Type of fence that will deter a casual intruder?






14. Type of window that is stronger than standard glass and acrylic windows - but produces a toxic gas if burned.






15. Type of IDS that emits a measurable magnetic field and detects changes in capacitance. This allows it to detect when something/someone comes within a certain range of an object. Usually used to protect specific objects (artwork - cabinets - or a safe






16. Enhanced boundary fencing with motion detectors. Used at facilities that require a high level of protection.






17. This refers to the portion of the environment that is in focus when shown on a monitor. This increases as the size of the lens opening decreases - the subject distance increases - or the focal length of the lens decreases.






18. Device locks intended to protect hardware from theft. Use for mobile devices and lock them to a secure feature of an environment.






19. What needs to be evaluated for their protective characteristics - their utility - and their cost and benefits.






20. These need to have shutoff valves and positive drains (substance flows out instead of in).






21. This should be located within 50 feet of electrical equipment and should be inspected quarterly.






22. Type of IDS that detects changes in a light beam. Can only be used in windowless rooms.






23. Type of fence that uses 3/8 inch mesh and 11 gauge wiring






24. These are expensive but provide flexibility in response to security breaches and can deter intruders from attempting an attack.






25. These can be user activated (action needs to be taken by a user) or system sensing (no action needs to be taken by the user)






26. When should the following items be evaluated? Local crime - natural disaster possibilities - distance to hospitals - police - fire stations - airports - and railroads.






27. This focal length provides wide-angle views.






28. This is a specific type of smoke-activate fire alarm that detects changes in light intensity.






29. This should be clearly marked - and security guards should be trained how to identify when these items leave the facility in an improper manner.






30. What should dust and other air contaminants be kept to an appropriate level?






31. Concept of installing lighting to be directed towards where potential intruders would be coming from. Example - entrance to military base with bright lights pointing outward to entrance.






32. Why does the value of property with the facility and the value of the facility itself need to be ascertained?






33. What is the more important than protecting a facility or the assets it contains?






34. These should be located on and above suspended ceilings - below raised floors - and in air ducts to provide maximum fire detection.






35. This focal length provides a narrower view.






36. Type of fence that uses 2 inch mesh - 9 gauge wiring






37. Fire suppressant that reduces the temperature of the fire?






38. This type of water system has its sprinkler systems wide open to allow a larger volume of water to be released in a short period. These systems are typically not used in data processing environments.






39. This can be costly and unsightly - but can provide crowd control and help control access to the facility.






40. Space used for wires and cables. Typically an area above dropped ceilings and below raised floors. This location is where fires can easily start.






41. The estimated time it will take to repair a device and get it back into production






42. Type of window that is the strongest window available today. Resistant to breakage - chemicals - fires - and abrasions. They are also extremely expensive.






43. Momentary power outage






44. This power source is a backup in case the primary source fails.






45. What can cause static electricity?






46. This power source is used in day-to-day operations.






47. An electrical circuit that receives input light from the lens and converts it into an electronic signal - which is then displayed on a monitor. Allows the capture of extraordinary details of objects because its sensors work in the infrared range. Doe






48. This is when unauthorized access is achieved to a facility via another individual's legitimate access - and is a common concern with physical security.






49. Type of IDS that generates a pattern that is sent over a sensitive area and reflected back to a receiver.






50. This type of interference can be caused by electrical system mechanisms - fluorescent lighting - and electrical cables.