physical security l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Physical Security PowerPoint Presentation
Download Presentation
Physical Security

Loading in 2 Seconds...

play fullscreen
1 / 218

Physical Security - PowerPoint PPT Presentation


  • 267 Views
  • Uploaded on

Physical Security. Sample Questions. 1. The degree of protection desired in any installation is predicated upon an analysis of the following two factors:. a. Cost and environmental conditions b. Criticality and vulnerability c. Cost and vulnerability d. Cost and criticality.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Physical Security' - tino


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
physical security

Physical Security

Sample Questions

slide2
1. The degree of protection desired in any installation is predicated upon an analysis of the following two factors:
  • a. Cost and environmental conditions
  • b. Criticality and vulnerability
  • c. Cost and vulnerability
  • d. Cost and criticality
slide3
1. The degree of protection desired in any installation is predicated upon an analysis of the following two factors:
  • a. Cost and environmental conditions
  • b. Criticality and vulnerability
  • c. Cost and vulnerability
  • d. Cost and criticality
slide4
2. The process used by the security manager in establishing priorities of protection of assets is known as:
  • a. Security survey
  • b. Vulnerability study
  • c. Risk analysis
  • d. Inspection review
slide5
2. The process used by the security manager in establishing priorities of protection of assets is known as:
  • a. Security survey
  • b. Vulnerability study
  • c. Risk analysis
  • d. Inspection review
3 the type of fencing generally used for protection of permanent limited and exclusion areas is
3. The type of fencing generally used for protection of permanent limited and exclusion areas is:
  • a. Chain link
  • b. Concertina
  • c. Barbed wire
  • d. Barbed tape
3 the type of fencing generally used for protection of permanent limited and exclusion areas is7
3. The type of fencing generally used for protection of permanent limited and exclusion areas is:
  • a. Chain link
  • b. Concertina
  • c. Barbed wire
  • d. Barbed tape
4 for general security usage excluding the top guard chain link fence should be
4. For general security usage, excluding the top guard, chain link fence should be:
  • a. 7 gauge wire and a min. of 10 feet high
  • b. 9 gauge wire and eight feet high
  • c. 9 gauge wire and seven feet high
  • d. 10 gauge wire and seven feet high
4 for general security usage excluding the top guard chain link fence should be9
4. For general security usage, excluding the top guard, chain link fence should be:
  • a. 7 gauge wire and a min. of 10 feet high
  • b. 9 gauge wire and eight feet high
  • c. 9 gauge wire and seven feet high
  • d. 10 gauge wire and seven feet high
slide10
5. Excluding the top guard, standard barbed wire fencing intended to prevent human trespassing should be not less than:
  • a. 7 feet high
  • b. 6 feet high
  • c. 10 feet high
  • d. 8 feet high
slide11
5. Excluding the top guard, standard barbed wire fencing intended to prevent human trespassing should be not less than:
  • a. 7 feet high
  • b. 6 feet high
  • c. 10 feet high
  • d. 8 feet high
6 in a barbed wire fence the distance between strands should not exceed
6. In a barbed wire fence, the distance between strands should not exceed:
  • a. 4 inches
  • b. 3 inches
  • c. 5 inches
  • d. 6 inches
6 in a barbed wire fence the distance between strands should not exceed13
6. In a barbed wire fence, the distance between strands should not exceed:
  • a. 4 inches
  • b. 3 inches
  • c. 5 inches
  • d. 6 inches
7 standard barbed wire is twisted double strand
7. Standard barbed wire is twisted double-strand:
  • a. 9 gauge wire
  • b. 14 gauge wire
  • c. 13 gauge wire
  • d. 12 gauge wire (with 4 point barbs)
7 standard barbed wire is twisted double strand15
7. Standard barbed wire is twisted double-strand:
  • a. 9 gauge wire
  • b. 14 gauge wire
  • c. 13 gauge wire
  • d. 12 gauge wire (with 4 point barbs)
slide16

8. Top guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence at least:

  • a. 2 feet
  • b. 1 foot
  • c. 3 feet
  • d. 3-1/2 feet
slide17

8. Top guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence at least:

  • a. 2 feet
  • b. 1 foot
  • c. 3 feet
  • d. 3-1/2 feet
9 a top guard must consist of
9. A top guard must consist of:
  • a. 3 strands of barbed wire or tape
  • b. 2 strands of barbed wire or tape
  • c. 4 strands of barbed wire or tape
  • d. 6 strands of barbed wire or tape
9 a top guard must consist of19
9. A top guard must consist of:
  • a. 3 strands of barbed wire or tape
  • b. 2 strands of barbed wire or tape
  • c. 4 strands of barbed wire or tape
  • d. 6 strands of barbed wire or tape
10 strands of barbed wire or tape used as a top guard on a fence should be spaced
10. Strands of barbed wire or tape used as a top guard on a fence should be spaced:
  • a. 2 inches apart
  • b. 3 inches apart
  • c. 4 inches apart
  • d. 6 inches apart
10 strands of barbed wire or tape used as a top guard on a fence should be spaced21
10. Strands of barbed wire or tape used as a top guard on a fence should be spaced:
  • a. 2 inches apart
  • b. 3 inches apart
  • c. 4 inches apart
  • d. 6 inches apart
11 which of the following characteristic of protective lighting is incorrect
11. Which of the following characteristic of protective lighting is incorrect?
  • a. Lighting is expensive to maintain
  • b. It usually requires less intensity than working light
  • c. It may also provide personal protection by reducing advantages of concealment
  • d. It should not be used as a psychological deterrent only
11 which of the following characteristic of protective lighting is incorrect23
11. Which of the following characteristic of protective lighting is incorrect?
  • a. Lighting is expensive to maintain
  • b. It usually requires less intensity than working light
  • c. It may also provide personal protection by reducing advantages of concealment
  • d. It should not be used as a psychological deterrent only
slide24
12. Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
  • a. Continuous
  • b. Intermittent
  • c. Standby
  • d. Moveable
  • e. Emergency
slide25
12. Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
  • a. Continuous
  • b. Intermittent
  • c. Standby
  • d. Moveable
  • e. Emergency
slide26

13. A series of fixed luminaries arranged to flood a given area continuously during the hours of darkness with overlapping cones of light. It is called:

  • a. Continuous lighting
  • b. Intermittent lighting
  • c. Standby lighting
  • d. Moveable lighting
slide27

13. A series of fixed luminaries arranged to flood a given area continuously during the hours of darkness with overlapping cones of light. It is called:

  • a. Continuous lighting
  • b. Intermittent lighting
  • c. Standby lighting
  • d. Moveable lighting
slide28

14. Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

  • a. 1.5 foot candles
  • b. 2.0 foot candles
  • c. 0.5 foot candles
  • d. 1.0 foot candles
slide29

14. Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

  • a. 1.5 foot candles
  • b. 2.0 foot candles
  • c. 0.5 foot candles
  • d. 1.0 foot candles
slide30

15. The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as:

  • a. Ultrasonic system
  • b. Microwave system
  • c. Electrostatic system
  • d. Capacitance system
slide31

15. The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as:

  • a. Ultrasonic system
  • b. Microwave system
  • c. Electrostatic system
  • d. Capacitance system
slide32

16. The intrusion detection system which is used on a safe, wall and openings therein in an effort to establish an electrostatic field around the object to be protected is known as a:

  • a. Ultrasonic system
  • b. Microwave system
  • c. Capacitance system
  • d. Electro-mechanical system
slide33

16. The intrusion detection system which is used on a safe, wall and openings therein in an effort to establish an electrostatic field around the object to be protected is known as a:

  • a. Ultrasonic system
  • b. Microwave system
  • c. Capacitance system
  • d. Electro-mechanical system
17 which of the following is not true with regard to lock and key systems
17. Which of the following is not true with regard to lock and key systems?
  • a. The lock is the most accepted and widely used security device of the basic safeguards in protecting installations
  • b. The locking system should be backed up with other security
  • c. A high-quality, pick-proof lock is considered a positive bar to entry
  • d. Most key locks can be picked by an expert in a few minutes
17 which of the following is not true with regard to lock and key systems35
17. Which of the following is not true with regard to lock and key systems?
  • a. The lock is the most accepted and widely used security device of the basic safeguards in protecting installations
  • b. The locking system should be backed up with other security
  • c. A high-quality, pick-proof lock is considered a positive bar to entry
  • d. Most key locks can be picked by an expert in a few minutes
18 the type of lock generally used on automobiles desks and cabinets is
18. The type of lock generally used on automobiles, desks and cabinets is:
  • a. Pin tumbler
  • b. Warded
  • c. Combination
  • d. Wafer
18 the type of lock generally used on automobiles desks and cabinets is37
18. The type of lock generally used on automobiles, desks and cabinets is:
  • a. Pin tumbler
  • b. Warded
  • c. Combination
  • d. Wafer
19 which of the following is not true with regard to door latches
19. Which of the following is not true with regard to door latches:
  • a. A deadbolt latch may be used on almost any door
  • b. A deadbolt latch is easy to install
  • c. A deadbolt latch is inexpensive
  • d. Chain latches are highly recommended as effective security measures
19 which of the following is not true with regard to door latches39
19. Which of the following is not true with regard to door latches:
  • a. A deadbolt latch may be used on almost any door
  • b. A deadbolt latch is easy to install
  • c. A deadbolt latch is inexpensive
  • d. Chain latches are highly recommended as effective security measures
20 inventories of key systems should be conducted at least
20. Inventories of key systems should be conducted at least:
  • a. Annually
  • b. Quarterly
  • c. Semi-annually
  • d. Monthly
20 inventories of key systems should be conducted at least41
20. Inventories of key systems should be conducted at least:
  • a. Annually
  • b. Quarterly
  • c. Semi-annually
  • d. Monthly
21 a sentry dog can normally not operate at full effectiveness at
21. A sentry dog can normally not operate at full effectiveness at:
  • a. Ammunition storage areas
  • b. Gasoline storage areas
  • c. Radar sites
  • d. Warehouses
21 a sentry dog can normally not operate a full effectiveness at
21. A sentry dog can normally not operate a full effectiveness at:
  • a. Ammunition storage areas
  • b. Gasoline storage areas
  • c. Radar sites
  • d. Warehouses
22 non insulated security containers must satisfactorily pass a drop test of
22. Non-insulated security containers must satisfactorily pass a drop test of:
  • a. 15 feet
  • b. 20 feet
  • c. 22 feet
  • d. 30 feet
22 non insulated security containers must satisfactorily pass a drop test of45
22. Non-insulated security containers must satisfactorily pass a drop test of:
  • a. 15 feet
  • b. 20 feet
  • c. 22 feet
  • d. 30 feet
23 which of the following is not an approved ul record safe classification
23. Which of the following is not an approved UL record safe classification:
  • a. 350-4
  • b. 350-3
  • c. 350-2
  • d. 350-1
23 which of the following is not an approved ul record safe classification47
23. Which of the following is not an approved UL record safe classification:
  • a. 350-4
  • b. 350-3
  • c. 350-2
  • d. 350-1
24 the acceptable vault construction of insulated doors is a minimum reinforced thickness of
24. The acceptable vault construction of insulated doors is a minimum reinforced thickness of:
  • a. 12”
  • b. 10”
  • c. 8”
  • d. 6”
24 the acceptable vault construction of insulated doors is a minimum reinforced thickness of49
24. The acceptable vault construction of insulated doors is a minimum reinforced thickness of:
  • a. 12”
  • b. 10”
  • c. 8”
  • d. 6”
25 which of the following would be an acceptable computer media storage classification
25. Which of the following would be an acceptable computer media storage classification:
  • a. 350-4
  • b. 450-4
  • c. 250-4
  • d. 150-4
25 which of the following would be an acceptable computer media storage classification51
25. Which of the following would be an acceptable computer media storage classification:
  • a. 350-4
  • b. 450-4
  • c. 250-4
  • d. 150-4
26 ul classified safes must be anchored to the floor or weigh at least
26. UL classified safes must be anchored to the floor or weigh at least:
  • a. 750 lbs.
  • b. 1,000 lbs.
  • c. 1,250 lbs.
  • d. 1,500 lbs.
26 ul classified safes must be anchored to the floor or weigh at least53
26. UL classified safes must be anchored to the floor or weigh at least:
  • a. 750 lbs.
  • b. 1,000 lbs.
  • c. 1,250 lbs.
  • d. 1,500 lbs.
27 a re lock on a vault automatically stops the bolt mechanism from operating when
27. A “re-lock” on a vault automatically stops the bolt mechanism from operating when:
  • a. A switch is flipped
  • b. A timer is used
  • c. When there is an attack on the door or combination lock
  • d. Locked by remote control
27 a re lock on a vault automatically stops the bolt mechanism from operating when55
27. A “re-lock” on a vault automatically stops the bolt mechanism from operating when:
  • a. A switch is flipped
  • b. A timer is used
  • c. When there is an attack on the door or combination lock
  • d. Locked by remote control
28 security vaults differ from safes in that
28. Security vaults differ from safes in that:
  • a. They are tested by Underwriters Laboratories for burglary resistance
  • b. They do not have both fire and burglary resisting properties
  • c. Steel is used
  • d. They are permanently affixed to building
28 security vaults differ from safes in that57
28. Security vaults differ from safes in that:
  • a. They are tested by Underwriters Laboratories for burglary resistance
  • b. They do not have both fire and burglary resisting properties
  • c. Steel is used
  • d. They are permanently affixed to building
29 the weakness of the burning bar as a burglar tool is
29. The weakness of the burning bar as a burglar tool is:
  • a. It will not burn through concrete
  • b. Produces large volumes of smoke
  • c. Actual heat is not intense enough
  • d. It requires tanks of hydrogen
29 the weakness of the burning bar as a burglar tool is59
29. The weakness of the burning bar as a burglar tool is:
  • a. It will not burn through concrete
  • b. Produces large volumes of smoke
  • c. Actual heat is not intense enough
  • d. It requires tanks of hydrogen
30 which of the following is not correct with regard to safes
30. Which of the following is not correct with regard to safes?
  • a. UL classification labels are removed from all safes exposed to fires
  • b. Record safes are designed to resist fires only
  • c. Money safes have accredited fire resistance
  • d. Quality equipment should be purchased only from reputable dealers
30 which of the following is not correct with regard to safes61
30. Which of the following is not correct with regard to safes?
  • a. UL classification labels are removed from all safes exposed to fires
  • b. Record safes are designed to resist fires only
  • c. Money safes have accredited fire resistance
  • d. Quality equipment should be purchased only from reputable dealers
31 the symbol trtl indicates
31. The symbol “TRTL” indicates:
  • a. Safe is resistant to torches
  • b. Safe is resistant to tools
  • c. Safe is resistant to both torches and tools
  • d. Nothing pertaining to torches or tools
31 the symbol trtl indicates63
31. The symbol “TRTL” indicates:
  • a. Safe is resistant to torches
  • b. Safe is resistant to tools
  • c. Safe is resistant to both torches and tools
  • d. Nothing pertaining to torches or tools
32 illumination intensity minimums for lighting of the perimeter of restricted area is
32. Illumination intensity minimums for lighting of the perimeter of restricted area is:
  • a. 0.15 foot candles
  • b. 0.40 foot candles
  • c. 1.00 foot candles
  • d. 2.00 foot candles
32 illumination intensity minimums for lighting of the perimeter of restricted area is65
32. Illumination intensity minimums for lighting of the perimeter of restricted area is:
  • a. 0.15 foot candles
  • b. 0.40 foot candles
  • c. 1.00 foot candles
  • d. 2.00 foot candles
33 the temperature at which paper may be destroyed is
33. The temperature at which paper may be destroyed is:
  • a. 200 degrees F
  • b. 250 degrees F
  • c. 300 degrees F
  • d. 350 degrees F
33 the temperature at which paper may be destroyed is67
33. The temperature at which paper may be destroyed is:
  • a. 200 degrees F
  • b. 250 degrees F
  • c. 300 degrees F
  • d. 350 degrees F
34 electronic process media can begin to deteriorate at
34. Electronic process media can begin to deteriorate at:
  • a. 100 degrees F
  • b. 125 degrees F
  • c. 150 degrees F
  • d. 200 degrees F
34 electronic process media can begin to deteriorate at69
34. Electronic process media can begin to deteriorate at:
  • a. 100 degrees F
  • b. 125 degrees F
  • c. 150 degrees F
  • d. 200 degrees F
35 the interior height of a vault should not exceed
35. The interior height of a vault should not exceed:
  • a. 8 feet
  • b. 9 feet
  • c. 10 feet
  • d. 12 feet
35 the interior height of a vault should not exceed71
35. The interior height of a vault should not exceed:
  • a. 8 feet
  • b. 9 feet
  • c. 10 feet
  • d. 12 feet
slide72

36. A system using inaudible sound waves to detect the presence of an intruder or other disturbance of the inaudible sound system is known as:

  • a. Motion detection system
  • b. Sonic motion detection
  • c. Ultrasonic motion detection
  • d. Radio frequency motion detection
slide73

36. A system using inaudible sound waves to detect the presence of an intruder or other disturbance of the inaudible sound system is known as:

  • a. Motion detection system
  • b. Sonic motion detection
  • c. Ultrasonic motion detection
  • d. Radio frequency motion detection
37 the weakest area in a window is usually
37. The weakest area in a window is usually:
  • a. The sash
  • b. Frames
  • c. Glass
  • d. The putty
37 the weakest area in a window is usually75
37. The weakest area in a window is usually:
  • a. The sash
  • b. Frames
  • c. Glass
  • d. The putty
38 which of the following is considered to be the most resistant to blast from explosion
38. Which of the following is considered to be the most resistant to blast from explosion?
  • a. Thick brick or concrete walls
  • b. Thick earthen barricades
  • c. Steel-frame building walls
  • d. Thick, reinforced concrete walls
38 which of the following is considered to be the most resistant to blast from explosion77
38. Which of the following is considered to be the most resistant to blast from explosion?
  • a. Thick brick or concrete walls
  • b. Thick earthen barricades
  • c. Steel-frame building walls
  • d. Thick, reinforced concrete walls
slide78

39. A type of glass used in street-level windows or displays where security is necessary and which is composed of two sheets of ordinary glass bonded to an intervening layer of plastic material is known as:

  • a. Tempered glass
  • b. Plastic coated glass
  • c. Vinyl coated glass
  • d. Laminated glass
slide79

39. A type of glass used in street-level windows or displays where security is necessary and which is composed of two sheets of ordinary glass bonded to an intervening layer of plastic material is known as:

  • a. Tempered glass
  • b. Plastic coated glass
  • c. Vinyl coated glass
  • d. Laminated glass
slide80

40. The type of glass which is often utilized for both safety and security purposes because it is 3 to 5 times stronger than regular glass and 5 times as resistant to heat is:

  • a. Tempered glass
  • b. Coated glass
  • c. Plastic coated glass
  • d. Reflected glass
slide81

40. The type of glass which is often utilized for both safety and security purposes because it is 3 to 5 times stronger than regular glass and 5 times as resistant to heat is:

  • a. Tempered glass
  • b. Coated glass
  • c. Plastic coated glass
  • d. Reflected glass
41 the mechanical lock longest in use and which has practically no security value is
41. The mechanical lock longest in use and which has practically no security value is:
  • a. The lever lock
  • b. The warded lock
  • c. The wafer tumbler lock
  • d. The pin tumbler lock
41 the mechanical lock longest in use and which has practically no security value is83
41. The mechanical lock longest in use and which has practically no security value is:
  • a. The lever lock
  • b. The warded lock
  • c. The wafer tumbler lock
  • d. The pin tumbler lock
slide84
42. Probably the most widely-used lock for both exterior building doors and interior room doors is the:
  • a. Warded lock
  • b. Pin tumbler lock
  • c. Disc tumbler lock
  • d. Lever lock
slide85
42. Probably the most widely-used lock for both exterior building doors and interior room doors is the:
  • a. Warded lock
  • b. Pin tumbler lock
  • c. Disc tumbler lock
  • d. Lever lock
43 which of the following is not an authentic characterization of the guard operation
43. Which of the following is not an authentic characterization of the guard operation:
  • a. Guards are costly
  • b. Guards are generally recognized as an essential element in the protection of assets and personnel
  • c. Guards are the only element of protection which can be depended upon to give complete security
  • d. Guards can also perform as a public relations representative when properly trained
43 which of the following is not an authentic characterization of the guard operation87
43. Which of the following is not an authentic characterization of the guard operation:
  • a. Guards are costly
  • b. Guards are generally recognized as an essential element in the protection of assets and personnel
  • c. Guards are the only element of protection which can be depended upon to give complete security
  • d. Guards can also perform as a public relations representative when properly trained
44 each guard post that is manned 24 hours a day 7 days a week requires
44. Each guard post that is manned 24 hours a day, 7 days a week requires:
  • a. 3 guards
  • b. 6 guards
  • c. 2 guards
  • d. 4.5 guards
44 each guard post that is manned 24 hours a day 7 days a week requires89
44. Each guard post that is manned 24 hours a day, 7 days a week requires:
  • a. 3 guards
  • b. 6 guards
  • c. 2 guards
  • d. 4.5 guards
45 usually in facilities where visitors are to be escorted this is done by
45. Usually in facilities where visitors are to be escorted, this is done by:
  • a. Guards
  • b. Individuals being visited
  • c. Special escort service
  • d. Supervisor of unit visited
45 usually in facilities where visitors are to be escorted this is done by91
45. Usually in facilities where visitors are to be escorted, this is done by:
  • a. Guards
  • b. Individuals being visited
  • c. Special escort service
  • d. Supervisor of unit visited
46 one of the main reasons for not arming private security guards is
46. One of the main reasons for not arming private security guards is:
  • a. The cost of extra equipment
  • b. The extra salary costs
  • c. Very few are qualified to handle them
  • d. The typical business or government facility is not customarily a place where violent crime occurs
46 one of the main reasons for not arming private security guards is93
46. One of the main reasons for not arming private security guards is:
  • a. The cost of extra equipment
  • b. The extra salary costs
  • c. Very few are qualified to handle them
  • d. The typical business or government facility is not customarily a place where violent crime occurs
slide94
47. The argument usually used by contract guard representatives as a selling point in their service is:
  • a. Better trained
  • b. Non-union
  • c. No administrative problems
  • d. Reduction in cost
slide95
47. The argument usually used by contract guard representatives as a selling point in their service is:
  • a. Better trained
  • b. Non-union
  • c. No administrative problems
  • d. Reduction in cost
48 the most important written instructions for the guard force are known as
48. The most important written instructions for the guard force are known as:
  • a. Memoranda
  • b. Post orders
  • c. High policy
  • d. Operational orders
48 the most important written instructions for the guard force are known as97
48. The most important written instructions for the guard force are known as:
  • a. Memoranda
  • b. Post orders
  • c. High policy
  • d. Operational orders
49 which of the following should be a required criteria of post orders
49. Which of the following should be a required criteria of post orders?
  • a. Each order should deal with multiple subjects
  • b. The orders should be detailed
  • c. The orders should be written at the lowest level possible
  • d. Orders should be indexed sparingly
49 which of the following should be a required criteria of post orders99
49. Which of the following should be a required criteria of post orders?
  • a. Each order should deal with multiple subjects
  • b. The orders should be detailed
  • c. The orders should be written at the lowest level possible
  • d. Orders should be indexed sparingly
50 the guard s primary record of significant events affecting facility protection is called
50. The guard’s primary record of significant events affecting facility protection is called:
  • a. The guard log
  • b. Ingress log
  • c. Egress log
  • d. Daily record manual
50 the guard s primary record of significant events affecting facility protection is called101
50. The guard’s primary record of significant events affecting facility protection is called:
  • a. The guard log
  • b. Ingress log
  • c. Egress log
  • d. Daily record manual
slide102

51. The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarms sources outside the room and in the field of the detector is:

  • a. Acoustic detector
  • b. Vibration detector
  • c. Microwave motion detector
  • d. Ultrasonic motion detector
slide103

51. The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarms sources outside the room and in the field of the detector is:

  • a. Acoustic detector
  • b. Vibration detector
  • c. Microwave motion detector
  • d. Ultrasonic motion detector
slide104
52. The sensor which is used when light air turbulence, vibration and motion outside the room are present is:
  • a. Acoustic detector
  • b. Vibration detector
  • c. Microwave motion detector
  • d. Ultrasonic motion detector
slide105
52. The sensor which is used when light air turbulence, vibration and motion outside the room are present is:
  • a. Acoustic detector
  • b. Vibration detector
  • c. Microwave motion detector
  • d. Ultrasonic motion detector
slide106
53. Foil used as a detector on a glass window to signal a surreptitious or forcible penetration is an example of :
  • a. Microwave sensor
  • b. Capacitance sensor
  • c. Vibrator sensor
  • d. Electro-mechanical sensor
slide107
53. Foil used as a detector on a glass window to signal a surreptitious or forcible penetration is an example of :
  • a. Microwave sensor
  • b. Capacitance sensor
  • c. Vibrator sensor
  • d. Electro-mechanical sensor
slide108
54. The type of sensor designed to place a current-carrying conductorbetween an intruder and an area to be protected is known as:
  • a. Electro-mechanical sensor
  • b. Microwave sensor
  • c. Capacitance sensor
  • d. Audio sensor
slide109
54. The type of sensor designed to place a current-carrying conductorbetween an intruder and an area to be protected is known as:
  • a. Electro-mechanical sensor
  • b. Microwave sensor
  • c. Capacitance sensor
  • d. Audio sensor
slide110
55. The kind of sensor which is based on the Doppler Principle - named after the Austrian scientist who originated the concept is:
  • a. Electro-mechanical sensor
  • b. Microwave sensor
  • c. Capacitance sensor
  • d. Audio sensor
slide111
55. The kind of sensor which is based on the Doppler Principle - named after the Austrian scientist who originated the concept is:
  • a. Electro-mechanical sensor
  • b. Microwave sensor
  • c. Capacitance sensor
  • d. Audio sensor
56 the sound wave sensor is commonly referred to as
56. The sound wave sensor is commonly referred to as :
  • a. Proximity detector
  • b. Radar
  • c. Vibration detector
  • d. Ultrasonic detector
56 the sound wave sensor is commonly referred to as113
56. The sound wave sensor is commonly referred to as :
  • a. Proximity detector
  • b. Radar
  • c. Vibration detector
  • d. Ultrasonic detector
slide114

57. The type of sensor which is not influenced by exterior noise; which reacts only to movement within a protected area; and which can be adjusted so the movement of air caused by fire will activate an alarm is known as:

  • a. Proximity detector
  • b. Ultrasonic sensor
  • c. Electro-mechanical sensor
  • d. Audio sensor
slide115

57. The type of sensor which is not influenced by exterior noise; which reacts only to movement within a protected area; and which can be adjusted so the movement of air caused by fire will activate an alarm is known as:

  • a. Proximity detector
  • b. Ultrasonic sensor
  • c. Electro-mechanical sensor
  • d. Audio sensor
slide116

58. A personal identification method based on the length of each finger of one hand from base to tip and the width of the hand inside the thumb is called the:

  • a. Henry fingerprint system
  • b. Hand geometry identification
  • c. The Bertillion method
  • d. Basch-Lomb method
slide117

58. A personal identification method based on the length of each finger of one hand from base to tip and the width of the hand inside the thumb is called the:

  • a. Henry fingerprint system
  • b. Hand geometry identification
  • c. The Bertillion method
  • d. Basch-Lomb method
slide118
59. A visual indicator that shows from which of several zones or buildings an alarm signal has originated is called:
  • a. An annunciator
  • b. Contact device
  • c. Break alarm
  • d. Cross alarm
slide119
59. A visual indicator that shows from which of several zones or buildings an alarm signal has originated is called:
  • a. An annunciator
  • b. Contact device
  • c. Break alarm
  • d. Cross alarm
slide120

60. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

  • a. Parabolic microphone
  • b. Special audio device
  • c. Contact microphone
  • d. Surreptitious microphone
slide121

60. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

  • a. Parabolic microphone
  • b. Special audio device
  • c. Contact microphone
  • d. Surreptitious microphone
slide122
61.Which of the following is not true with regard to establishing an identification of personnel system to control movement?
  • a. The ID card or badge should be designed in a relatively complicated manner to avoid duplication
  • b. The ID card should be designed as simple as possible
  • c. Procedures should be designed to show employees what to do when ID card is lost
  • d. Details should be prepared and disseminated as to where, when, and how the badge should be worn
slide123
61.Which of the following is not true with regard to establishing an identification of personnel system to control movement?
  • a. The ID card or badge should be designed in a relatively complicated manner to avoid duplication
  • b. The ID card should be designed as simple as possible
  • c. Procedures should be designed to show employees what to do when ID card is lost
  • d. Details should be prepared and disseminated as to where, when, and how the badge should be worn
62 the most vulnerable link in any identification system is
62. The most vulnerable link in any identification system is?
  • a. Poor quality of badges
  • b. Perfunctory performance of duty
  • c. Badges not large enough
  • d. Educational background of security officers
62 the most vulnerable link in any identification system is125
62. The most vulnerable link in any identification system is?
  • a. Poor quality of badges
  • b. Perfunctory performance of duty
  • c. Badges not large enough
  • d. Educational background of security officers
slide126

63. The use of a simple word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is called?

  • a. Word alert
  • b. Security alert
  • c. Code one
  • d. Duress code
slide127

63. The use of a simple word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is called?

  • a. Word alert
  • b. Security alert
  • c. Code one
  • d. Duress code
slide128

64. The practice of having at least 2 authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed will be present during any operation that affords access to sensitive areas is called:

  • a. The sensitive material rule
  • b. Controlled presence rule
  • c. Two-man rule
  • d. Controlled access rule
slide129

64. The practice of having at least 2 authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed will be present during any operation that affords access to sensitive areas is called:

  • a. The sensitive material rule
  • b. Controlled presence rule
  • c. Two-man rule
  • d. Controlled access rule
slide130

65. Unavoidable drainage ditches, culverts, vents, ducts and other openings should be protected by securely fastened welded bar grills when the have a cross-sectional area greater than:

  • a. 10 square inches
  • b. 48 square inches
  • c. 64 square inches
  • d. 96 square inches
slide131

65. Unavoidable drainage ditches, culverts, vents, ducts and other openings should be protected by securely fastened welded bar grills when the have a cross-sectional area greater than:

  • a. 10 square inches
  • b. 48 square inches
  • c. 64 square inches
  • d. 96 square inches
65 between the perimeter barrier and exterior structures should be a clear zone of
65. Between the perimeter barrier and exterior structures should be a clear zone of:
  • a. 10 feet
  • b. 15 feet
  • c. 30 feet
  • d. 20 feet
65 between the perimeter barrier and exterior structures should be a clear zone of133
65. Between the perimeter barrier and exterior structures should be a clear zone of:
  • a. 10 feet
  • b. 15 feet
  • c. 30 feet
  • d. 20 feet
slide134

66. As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:

  • a. 50 feet
  • b. 40 feet
  • c. 30 feet
  • d. 20 feet
slide135

66. As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:

  • a. 50 feet
  • b. 40 feet
  • c. 30 feet
  • d. 20 feet
slide136

67. Measured horizontally 6 inches above the ground and at least 30 feet outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:

  • a. 0.5 foot candles
  • b. 0.3 foot candles
  • c. 0.4 foot candles
  • d. 0.2 foot candles
slide137

67. Measured horizontally 6 inches above the ground and at least 30 feet outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:

  • a. 0.5 foot candles
  • b. 0.3 foot candles
  • c. 0.4 foot candles
  • d. 0.2 foot candles
68 which of the following principles of protective lighting is not correct
68. Which of the following principles of protective lighting is not correct?
  • a. Lighting should not be used alone. It should be used with other measures such as fixed security posts, fences, etc.
  • b. Glaring lights should be in the eyes of the intruder
  • c. A large amount of light should be focused on security patrol routes
  • d. Adequate, even light should be upon bordering areas
68 which of the following principles of protective lighting is not correct139
68. Which of the following principles of protective lighting is not correct?
  • a. Lighting should not be used alone. It should be used with other measures such as fixed security posts, fences, etc.
  • b. Glaring lights should be in the eyes of the intruder
  • c. A large amount of light should be focused on security patrol routes
  • d. Adequate, even light should be upon bordering areas
slide140

69a. Piers and docks located on an installationshould be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

  • a. 1.5 foot candles
  • b. 2.0 foot candles
  • c. 0.5 foot candles
  • d. 1.0 foot candles
slide141

69a. Piers and docks located on an installationshould be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

  • a. 1.5 foot candles
  • b. 2.0 foot candles
  • c. 0.5 foot candles
  • d. 1.0 foot candles
slide142
69b. The water approaches (extending to a distance of 100 feet from the pier) should be illuminated to at least:
  • a. 0.5 foot candles
  • b. 2.0 foot candles
  • c. 1.5 foot candles
  • d. 1.0 foot candles
slide143
69b. The water approaches (extending to a distance of 100 feet from the pier) should be illuminated to at least:
  • a. 0.5 foot candles
  • b. 2.0 foot candles
  • c. 1.5 foot candles
  • d. 1.0 foot candles
slide144
70. Before installing protective lighting adjacent to navigable waters, the the following agency should be consulted for approval:
  • a. Bureau of Customs
  • b. Transportation Department
  • c. Local Police Department
  • d. U.S. Coast Guard
slide145
70. Before installing protective lighting adjacent to navigable waters, the the following agency should be consulted for approval:
  • a. Bureau of Customs
  • b. Transportation Department
  • c. Local Police Department
  • d. U.S. Coast Guard
slide146
71. An alarm system in which the installation-owned system is a direct extension of the civil police and/or fire alarm system is known as:
  • a. Local alarm system
  • b. Central station system
  • c. Auxiliary system
  • d. Proprietary system
slide147
71. An alarm system in which the installation-owned system is a direct extension of the civil police and/or fire alarm system is known as:
  • a. Local alarm system
  • b. Central station system
  • c. Auxiliary system
  • d. Proprietary system
slide148
72. Which of the following types of locking devices is generally considered to have the poorest security value:
  • a. Key locks
  • b. Cypher locks
  • c. Conventional combination locks
  • d. Manipulation-resistant combination locks
slide149
72. Which of the following types of locking devices is generally considered to have the poorest security value:
  • a. Key locks
  • b. Cypher locks
  • c. Conventional combination locks
  • d. Manipulation-resistant combination locks
73 money safes are classified by both underwriters laboratories ul and
73. Money safes are classified by both Underwriters Laboratories (UL) and:
  • a. The Bureau of Standards
  • b. The Insurance Services Office (ISO)
  • c. The FBI
  • d. The Federal Reserve Board
73 money safes are classified by both underwriters laboratories ul and151
73. Money safes are classified by both Underwriters Laboratories (UL) and:
  • a. The Bureau of Standards
  • b. The Insurance Services Office (ISO)
  • c. The FBI
  • d. The Federal Reserve Board
74 vaults will usually be designed to meet fire protection standards specified by
74. Vaults will usually be designed to meet fire protection standards specified by:
  • a. American Society for Industrial Security
  • b. National Fire Protection Association
  • c. Local fire department
  • d. All of the above
74 vaults will usually be designed to meet fire protection standards specified by153
74. Vaults will usually be designed to meet fire protection standards specified by:
  • a. American Society for Industrial Security
  • b. National Fire Protection Association
  • c. Local fire department
  • d. All of the above
75 a major study on private security was prepared by
75. A major study on private security was prepared by:
  • a. International Association of Chiefs of Police
  • b. American Society for Industrial Security
  • c. Private Security Task Force of the National Advisory Committee on Criminal Justice Standards and Goals
  • d. The Brookings Institute
75 a major study on private security was prepared by155
75. A major study on private security was prepared by:
  • a. International Association of Chiefs of Police
  • b. American Society for Industrial Security
  • c. Private Security Task Force of the National Advisory Committee on Criminal Justice Standards and Goals
  • d. The Brookings Institute
76 according to a rand corporation study made in 1971 regarding guards the typical private guard is
76. According to a Rand Corporation study made in 1971 regarding guards, the typical private guard is:
  • a. An aging black male
  • b. Poorly educated and poorly paid
  • c. Well educated and poorly paid
  • d. Middle-aged white
76 according to a rand corporation study made in 1971 regarding guards the typical private guard is157
76. According to a Rand Corporation study made in 1971 regarding guards, the typical private guard is:
  • a. An aging black male
  • b. Poorly educated and poorly paid
  • c. Well educated and poorly paid
  • d. Middle-aged white
significant notes

Significant Notes

Physical Security

slide160

Illuminancea. measured in Lux, representing the number of lumens per square meter or Foot-candles (FC), the number of Lumens per square footb. One Foot-candle is equal to 10.76 Lux (approximately to a ratio of 1:10)

slide161

Candle power - one candle power is the amount of light emitted by one standard candleLumen - One lumen is the amount of light required to light an area of one square foot to one candle powerFoot candle - One foot candle equals one lumen of light per square foot of space. The intensity of illumination is measured in foot candles

slide162
Specifications:carries the most weight and is considered the controlling document of the construction
slide163

Three basic types of glass:1. Sheet Glass : least expensive and most vulnerable to breakage2. Plate Glass : mirrors3. Float Glass : most recent advance in glass manufacture

slide164

Tempered Glass: a. treated to resist breakage b. 3 to 5 times stronger Laminated Glass: a. used in Detention Facilities b. Highly shatter resistant

slide165
Bullet resisting glass: a. Laminated glass b. “spalding” will not occur** small fragments that fall off the backside of the material
acrylic glass a good for bullet resisting applications b not good for burglary resistance
Acrylic glass: a. good for bullet resisting applications b. not good for burglary resistance
slide167
SAFES: Class M: 1/4 hr Class 1: 1/2 hr Class 2: 1 hr Class 3: 2 hrs Note: A burglary safe is not normally fire rated
4 stages of fire 1 incipient stage 2 smoldering stage 3 flame stage 4 heat stage
4 stages of fire1. Incipient stage2. Smoldering stage3. Flame stage4. Heat stage
slide169

Color RenditionThe ability of a lamp to faithfully reproduce the colors seen in an objectmeasured as a Color Rendition Index (CRI) on a scale of 0 to 100

slide170

Color Rendition IndexIncandescent : 100Halogen : 100Fluorescent : 75-100Metal Halide : 70Mercury Vapor: 50High pressure sodium: 20Low pressure sodium : 5

protective lighting
Protective Lighting
  • There are 8,760 hours in a year
  • a lamp that is on for 8 hours a day will burn for 2,290 hours peryear
slide172

A cost benefit analysis is a direct comparison of the costs of the operation of the security unit andallsecurity measures with the amount of corporate property savedorrecoveredas well asreduction of lossescaused byinjuriesandlost production time.

slide174

The perimeter band of lightingmust provide a minimum intensity of 0.2 foot candles, measured horizontally6 inches above ground, at least30 feet outside the exclusion area barrier

slide175

The basic principles of operation of intrusion detection systems are:a. Breaking an electrical circuitb. Interrupting a light beamc. Detecting soundd. Detecting vibratione. Detecting a change in capacitance due to penetration of an electrostatic field

slide176

The three main lines of defense for physical security are:a. Perimeter barriers - located at outer edge of property - first line of defenseb. Exterior walls, ceilings, roofs and floors of buildings themselves, considered the second line of defensec. Interim areas within the building

slide178

An advantage of chain-link fencing is that it affords visibility on both sides of the perimeterbarrier to police and security officer

slide179

The cone of illumination from light source should be directed downward and away from the structureorarea protected and away from security personnel assigned to such protection

slide180

Specifications regarding use of chain-link fences are as follows:a. Must be constructed of 7 foot material excluding top guardb. Must be of 9 gauge or heavierc. Mesh openings are not to be larger than 2” per sided Should be a twisted and barbed salvage at top and bottome. Must be securely fastened to rigid metal or reinforced concrete posts set in concrete f. Must reach within 2 inches of hard ground or paving g. On soft ground must reach below surface deep enough to compensate for shifting soil or sand

slide182

Combination to safe locks and padlocksshould bechanged at leastonceeach12 month periodand on the loss orpossible compromise of the combination, oron thedischarge, suspension or reassignment of any person having knowledge of combination

slide184

There is a similarity between physical security surveys and crime prevention surveys, but one of the differences is that physical security measures are oriented more toward the security of property and facilitieswhereascrime prevention measuresfocus on the deterrence of criminal activityregardless of the physical safeguards available.

slide185

The number of personnelrequired to cover a single post around the clock providing coverage for three eight-hour shifts is 4-1/2 (5 actual persons). This allows for vacations, sick leave, etc.

slide187

A vibration sensordetectsforced entrythroughmetal barriers placed over windows and ventilatorsor attempts to drill, saw or cut through walls, ceilings, floors or doors

slide188

As a general rule, windowslessthan18 feet from the ground or less than14 feet from trees, poles or adjoining buildings should be protected if they are largerthan96 square inches in area

slide189

Signs are advisable at no more than 100 foot intervals along the perimeterstating that the property is not open to the publicandintruderswill beprosecuted

slide190

A clear zone of 50feetor more should exist between the perimeter barrier and structures within the protected area except when a building wallconstitutespart of the perimeter barrier

slide191

Gaseous discharge lampsare mercury vapor lamps (soft blue light) and sodium vapor lamps (soft yellow light). They require2-5 minutes to light when cold and longer periods to re-light when hot.

slide192

A light source for perimeter fence lightingshould belocated sufficiently within the protected area and above the fence so the light pattern will cover a ground area

barriers
Barriers
  • Two major categories
    • Structural
    • Natural
  • Three basic purposes
    • Deter/delay
    • Psychological deterrent
    • Supplement and/or complement security needs
barriers194
Barriers
  • When the greatest degree of security is essential, two lines of structural barriers should be installed on the perimeter. These barriers should be separated by not less than15 feet and not more than 150 feet for best protection and control
barriers195
Barriers
  • Four types of fencing authorized for use in protecting restricted areas are:
    • Chain-link
    • Barbed wire
    • Concertina
    • Barbed tape
barriers196
Barriers
  • Chain-link
    • Must be 7 foot high excluding top guard
    • 9 gauge or heavier
    • Mesh openings not to be larger than 2 inches
    • twisted and barbed salvage at top and bottom
    • fastened to rigid metal or reinforced concrete posts set in concrete
    • Must reach within 2” of hard ground or paving
    • Soft ground - reach deep enough to compensate for shifting soil
barriers197
Barriers
  • Chain-link
  • Most frequently used fencing for security purposes
  • Disadvantage of chain-link fencing is that it creates an “institution-like atmosphere”
barriers198
Barriers
  • Barbed wire
  • Standard barbed wire is twisted, double-strand, 12 gauge wire, with 4 point barbs spaced an equal distance apart
    • Not be less than7feet high, excluding top guard
    • Firmly attached to postsnot more than 6’ apart
    • Distance between strands not more than 6” and at least one wire will be interlaced vertically and midway between posts.
barriers199
Barriers
  • Concertina wire
  • Is a commercially manufactured wire coil of high-strength-steel barbed wire clipped together at intervals to form a cylinder
  • Opened concertina wire is 50 feetlong and 3feet in diameter
barriers200
Barriers
  • Barbed tape
  • Composed of three things
    • Barbed wire
    • Barbed tape dispenser
    • Concertina tape
  • Barbed tape is fabricated from a steel strip with a minimum breaking system of 500lbs.
  • 7/16” barbsspaced at 1/2” intervals along each side
barriers201
Barriers
  • Top Guard
  • An overhang of barbed wire or barbed tape along the top of the fence, facing outward and upward at approximately a 45-degree angle.
  • Top guard supporting arms will be permanently affixed to the top of the fence posts to increase the overall height of the fence at least one foot.
barriers202
Barriers
  • Top Guard
  • Three strands of barbed wire, spaced 6 inches apart, must be installed on the supporting arms
barriers203
Barriers
  • Manhole covers
  • 10 inches or more in diameter, must be secured to prevent unauthorized opening
  • Over50% of all break-ins are through window glass
alarms
Alarms
  • Fail-Safe
    • A term applied to a system designed so that if a component fails to function properly the system will, by a signal or otherwise, indicate its incapacity
  • False Alarm
    • Activation of sensors for which no cause can be determined
alarms205
Alarms
  • Microwave Sensor
    • A radio/radar frequency (RF) transmitter having a frequency range of GHz, which detects motion
  • Passive Ultrasonic Sensor
    • Detects the sound of forced entry throughout walls, ceilings and doors
alarms206
Alarms
  • Ultrasonic
    • The frequency range of sound that is above the capabilities of normal human hearing. In intrusion detection systems, it usually varies between 21,500 and 26,000 Hz
alarms207
Alarms
  • Types of alarm systems
    • Electro-mechanical - Metallic foil, Magnet Switches, Wire Service Detection, Pressure Mats, Ribbons or Wafers
    • Volumetric - Capacitance, Vibration, Microwave, Ultrasonic, Passive Infrared, Photo Electric
alarms208
Alarms
  • Types of alarm detection systems
    • Local alarm system - activate a visual or audible signal in the immediate vicinity of the object of protection
    • Auxiliary system - the installation-owned system is a direct extension of the police and/or fire alarm system. This is the least effective system
alarms209
Alarms
  • Types of alarm detection systems
    • Central station system- Alarms are transmitted to a central station outside the installation from which appropriate action is taken such as notifying local police or fire departments
alarms210
Alarms
  • Types of alarm detection systems
    • Proprietary system - Similar to the central station system, except is owned by and is located on the installation. The response to the alarm is by the installation’s own security or fire-fighting personnel
  • It has been estimated that 90-98% of allalarms are false
protective lighting211
Protective Lighting
  • Protective lighting should enable security force personnel to observe without being seen.
  • Four general types of protective lighting:
    • Continuous - most common
    • Standby
    • Movable
    • Emergency
protective lighting212
Protective Lighting
  • Continuous Lighting (CL)
    • Two primary methods of employing CL
      • Glare projection
      • Controlled lighting
  • Quartz Lamps
    • Emit a very bright white light and snap in rapidly
    • Excellent for use along perimeters and in critical areas
    • Frequently used at very high wattage
protective lighting213
Protective Lighting
  • Floodlights
    • Directional, with some diffusion to light specific areas
  • Searchlights
    • concentrated beam, used for illumination of boundaries
protective lighting214
Protective Lighting
  • Fresnels
    • Wide beam units for long horizontal strips. They project a narrow beam approximately 180 degrees in the horizontal and from 15 -30 degrees in the vertical plane. An appropriate application is to light parameters since little light is lost vertically
  • Street Lights
    • Diffused light widely used in parking areas
safes and vaults
Safes and Vaults
  • UL Money Safe Classifications
    • TL-15 - 750 pounds or anchored / Body is 1” steel or equal
    • TL-30 - 750 pounds or anchored
    • TRTL-30 - At least 750 pounds
    • TRTL-30X6 - At least 750 pounds / 6 sides
    • TXTL-60 - At least 1,000 pounds / resist attack with 8 oz of nitroglycerin or it’s equal
safes and vaults216
Safes and Vaults
  • Burglary-resistive safe
    • As a general rule, require the door be made of steel at least 1-1/2 inches thick
  • Vaults are described as enlarged safes
  • Alarms for vaults:
    • Capacitance
    • Vibration
locks and key systems
Locks and Key Systems
  • Cypher locks -digital combination door locking device
  • Disc tumbler locks - often called wafer locks
  • Lever locks - Used in safe deposit boxes and are difficult to pick
locks and key systems218
Locks and Key Systems
  • In selecting combination numbers, multiples and simple ascending or descending arithmetical series should be avoided