1
Q
While keeping people and property safe and secure is serious business, that doesn’t mean a security officer can’t also be friendly and helpful.
A
CUSTOMER RELATIONS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
This gives them a sense of personal contact and helps you mention who is coming and going in your building.
A
CUSTOMER CONTACT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Being polite and friendly while maintaining professionalism goes a long way toward putting people at ease while still making them feel secure.
A
COMMUNICATION SKILLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Offering assistance when you’re able is an effective method of customer service.
A
ASSISTANCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Your job likely comes with some specific rules for dealing with many issues, from confrontations to emergencies.
A
FINDING BALANCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A type of security applied to business groups engaged in industries like manufacturing assembling research and development, processing, warehousing and even agriculture.
A
INDUSTRIAL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A type of security applied to hotels where its properties are protected from pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guests themselves. This type of security employs house detectives, uniform guard and supervisor and insures that hotel guests and their personal effects safeguarded.
A
HOTEL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel are trained to safeguard and properties as well as the supermarket personnel bank and assets while in storage, in transit and during transaction.
A
BANK SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A type of security applied for the protection of top-ranking officials of the government of private entity, visiting persons of illustrious standing and foreign dignitaries.
A
VIP SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
A
SCHOOL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel are trained to detect shoplifter, robbery, and bomb detection and customer relation.
A
SUPERMARKET OR MALL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
It is the total of all physical protection employed or installed to secure assists.
A
PHYSICAL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
It is the sum total of procedures followed, inquiries conducted, and criteria applied to determine the work suitable of a particular applicant or retention or transfer of a particular employee.
A
PERSONNEL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Complete or partial background investigation is conducted to determine whether the
Applicant should hire or not, or the same investigation is conducted to determine whether the employee should remain in his present position or to be transferred to less or non-sensitive position.
A
PROCEDURE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
It is a process of determining the loyalty, honesty, integrity, reputation, and others of a particular applicant or employee.
A
INQUIRY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Enumerated standard, like education, experience, age, citizenship, and family background, potential is being verified if true or not
A
CRITERIA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
It is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any classified information or document from compromise or loss.
A
DOCUMENT AND INFORMATION SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Security document and information are the responsibility of all concerned.
A
POLICY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Anybody found guilty of violating document and information security shall deal with accordingly.
A
REGULATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Access to information is based on the “need to know” and not by position.
A
DOCTRINE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Authority to have access to classified information is not permanent but can be withdrawn by the originating authority.
A
PRACTICE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Are being used to defined, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.
A
PHYSICAL SECURITY / PHYSICAL SECURITY MEASURES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
In most cases espionage, acquisition of information is the ultimate result, and means and form in which information is obtained is merely an operational detail. Normally, information on tapes and film is as usable as the original documents. Therefore, in considering access, one should think not only of current physical access, but also access to the discussion of the matter by the use of clandestine listening device.
A
ENEMY AGENTS MUST HAVE ACCESS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
In an unfriendly government or organization is willing to devote enough time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build defense in depth by using then one barrier.
A
THERE IS NO IMPENETRABLE BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to neutralize the act of espionage because surreptitious entry is not usually detected.
A
SURREPTITIOUS VS NON-SURREPTITIOUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Since each installation is different each will have different problems to overcome. The security procedures will not be adequate for all installations.
A
EACH INSTALLATION IS DIFFERENT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Refers to any physical structure whether natural or manmade capable or restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
A
BARRIERS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Minimum Acceptable Requirements for Fence used as Security Barrier: HEIGHT
A
8 FEET AT MINIMUM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Minimum Acceptable Requirements for Fence used as Security Barrier: SLACK AT THE BOTTOM
A
NOT TO EXCEED TWO INCHES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Minimum horizontal dimension of four inches by four inches.
A
WOODEN FENCE POST
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
The round type should be at least two inches in diameter and the H-beam type must measurable no less than two inches at the smallest diameter.
A
STEEL FENCE POST
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
Should be set in concrete or in firm soil using commercial drive anchors, to a depth of three feet; Maximum distance between posts is ten feet.
A
FENCE POST
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
There should be something on the top of the fence to deter persons attempting to go over the fence good example would be the use of barbed wire overhand, holding the stands of barbed wire should be two feet long and should be extended at 45-degree angle in the direction of the expected approach.
A
FENCE TOP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
The area surrounding the fence should be clear of trees and vegetation and debris or other materials which would offer concealment to the intruder or would aid him in scaling.
A
FENCE AREA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Gates should be limited to the number necessary for efficient and safe operation of the installation.
A
FENCE GATE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
All opening in the fence in excess of 96 inches must be lock, barred, or screened in such way that they may only be unlocked and opened from the inside and only by selected personnel.
A
FENCE OPENING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
If used, it should be at least ten feet apart and the overhang on the top of the inner fence should point inward rather than away from the installation maximum distance any two parallel fences should not exceed 150 feet.
A
MULTIPLE FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of the intruder.
A
NATURAL BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Are structural construction like fences walls, floors, roofs, grills, bars, road blocks, or other physical means to deter or impede penetration.
A
MAN-MADE BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
It includes bodies of waters, mountains, marshes, ravines, desert or other terrain that are difficult to traverse.
A
NATURAL BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
A
STRUCTURAL BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
Persons being used in providing a guarding system or by the nature of their employment and location, fulfil security functions. Examples are guards, office personnel, shop workers, etc.
A
HUMAN BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys could also be included.
A
ANIMAL BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lightning, alarm system and any electronic devices used as barriers.
A
ENERGY BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
Perimeter fences / barriers.
A
FIRST LINE OF DEFENSE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Doors, floors, windows, walls, roofs and grills and other entries to the buildings.
A
SECOND LINE OF DEFENSE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
Storage system like steel cabinets, safes, vaults and interior files.
A
THIRD LINE OF DEFENSE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
A
PERIMETER BARRIER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
A line adjacent to protected area, and passing through points of possible entry into the area, such as doors, windows, skylights, tunnel or other points of access.
A
INSIDE PERIMETER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
A line of protection surroundings but somewhat removed from a protected area, such as a fence.
A
OUTSIDE PERIMETER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
Can be barbed wire, chain link or concertina.
A
WIRE FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
Type of wire fence used for permanent structure.
A
CHAIN LINK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
Type of wire fence used for semi-permanent.
A
BARBED WIRE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
Type of wire fence used for the least permanent and also can be used as a temporary road block or impediment during strikes and crowd control.
A
CONCERTINA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
Are attractive and low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the openings are small to prevent passage of pilfered article.
A
WIRE FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
Constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the movements of the guards in the installation.
A
SOLID FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
It prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and concealment.
A
SOLID FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
It is constructed in such a way that visual access is permitted through the fence. Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the installation under observation.
A
FULL-VIEW FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
It allows the intruder to become familiar with the guard patrols thereby allowing him to pick the time that is advantageous on his part.
A
FULL-VIEW FENCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
Walls, Floors, roof or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing.
A
BUILDING WALL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
Can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive activity will be done should be given special emphasis in protective walls.
A
WALL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
Like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier.
A
BODIES OF WATER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
When not in use and controlled by guards, gates and doors in the perimeter should be locked and frequently inspected by guards. Lock should be changed from time to time and should be covered under protective locks and key control.
A
GATES AND DOORS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
These provide access to areas within the perimeter barrier and should be locked and guarded.
A
SIDE-WALK ELEVATORS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.
A
UTILITIES OPENING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
An obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may provide seeking unauthorized entry.
A
CLEAR ZONES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
This increases the protective height and prevents easy access.
A
TOP GUARD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
This is normally provided at main perimeter entrances to secure areas located out-of-doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.
A
GUARD CONTROL STATIONS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
This is a house like structure above the perimeter barriers. The higher the tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or temporary, must have a corresponding support force in the event of need.
A
TOWER GUARD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
Fencing barriers and protective walls should always be regularly inspected by security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be repaired immediately and guard vigilance should be increased.
A
BARRIER MAINTENANCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
In large open areas or ground where fencing or walling is impractical and expensive, warning signs should be conspicuously placed.
A
PROTECTION IN DEPTH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
Should be erected where necessary in the management of unauthorized ingress to preclude accidental entry.
A
CONTROL SIGNS / SIGNS AND NOTICES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q
Personal inspection of all guards prior to their starting tour of duty. Periodic checks of guards during their tour by the senior member of each relief or his representative.
A
PERSONAL SUPERVISION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
Guard takes with him on his tour of duty a form which must have the time punched on it at each station.
A
RECORDED TOUR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
This is where the guard sends signals to guard headquarters from each station that he checks.
A
SUPERVISORY TOUR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
Direct line telephone or in some instances radio.
A
PRIMARY COMMUNICATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
ex. Messengers.
A
EMERGENCY COMMUNICATION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
Is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
A
PROTECTIVE LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
The most familiar type of outdoor security lighting, this is designed to provide two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of darkness.
A
CONTINUOUS LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
The intensity is focused to the intruder while the observer or guard remained in the comparative darkness, the lighting is toward of the approach of an entrance to an installation.
A
GLARE PROJECTION TYPE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
The lighting is focused on the pile of items, rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needs.
A
CONTROLLED LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most useful to selectively light a particular area in an occasional basis.
A
STANDBY LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
This system is manually operated and is usually made up of movable search or floodlights that can be located in selected or special locations which will require lighting only for short period of time.
A
MOVABLE OR PORTABLE LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q
This system is used in times of power failure or other emergencies when other system is inoperative.
A
EMERGENCY LIGHTING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q
It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on.
A
INCANDESCENT LAMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q
It is considered more efficient that he incandescent and used widespread in exterior lighting. This emits a purplish white color, caused by an electric current passing through a tube of conducting and luminous gas.
A
MERCURY VAPOR LAMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q
It has similar physical appearance to mercury vapour but provides a light source of higher luminous efficiency and better color rendition.
A
METAL HALIDE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q
This provides good color rendition, high lamp efficiency as well as long life. However, it cannot project light over long distance and thus are not desirable as flood type lights.
A
FLUORESCENT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
This has gained acceptance for exterior lighting of parking areas, roadways, buildings and commercial interior installations. Constructed on the same principle as mercury vapour lamps, they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.
A
HIGH PRESSURE SODIUM VAPOR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
These can be used to accommodate most outdoor security lighting needs, including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
A
FLOODLIGHTS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
This lighting equipment received the most widespread notoriety for its value in reducing crime.
A
STREET LIGHTS
92
Q
These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
A
SEARCH LIGHTS
93
Q
These are wide beam units, primary used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. It projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
A
FRESNEL LIGHTS
94
Q
Should be lighted about 25 feet on either side of the gate if possible and the range for vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can also be used if glare is strictly controlled.
A
PEDESTRIAN GATE
95
Q
Normally manned by guards inspecting credentials, as well as inspecting for contraband or stolen property, it is critical that the area to be lighted to at least one-foot candle.
A
VEHICULAR GATE
96
Q
This include vital building, storage depots, and vulnerable control points in communication power, light and were distribution system.
A
PARKING AREA
97
Q
Used for pedestrian, vehicles or forklift should be lighted to 0.01 candles for security purpose.
A
THOROUGHFARE
98
Q
Large opened working areas, piers, docks, and other sensitive areas
A
STORAGE
99
Q
Is an aural or visual signal given by the annunciator to security when intruder actuates device in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated circuits.
A
ALARM
100
Q
Are designed to alert security personnel to consummated or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the circuitry, a beam or radiated waves.
A
ALARM SYSTEM
101
Q
It assists the security in detecting, impeding or deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound.
A
PROTECTIVE ALARM
102
Q
It emits the aural or visual signals or both.
A
SENSOR OR TRIGGER DEVICE
103
Q
A circuit which transmit the message to the signaling apparatus.
A
TRANSMISSION LINE
104
Q
It is the signaling system that activates the alarm.
A
ENUNCIATOR
105
Q
A type of alarm where the control station is located outside the plant or installation. When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.
A
CENTRAL STATION SYSTEM
106
Q
Centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; fire fighters, police, an ambulance or a bomb disposal unit.
A
PROPRIETARY SYSTEM
107
Q
This system consists of ranging up a visual or audible alarm near the object to be protected. When an intruder tries to pry a window, the alarm thereat goes off.
A
LOCAL ALARM
108
Q
Company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is possible. The company maintains the equipment and lines both for the company and those in the police, fire and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or cell phones.
A
AUXILIARY ALARM
109
Q
This is local alarm system in which a bell or siren is sounded with no predictable response. These systems are used in residence or small retail establishment which affords a respond system. The hope is that a neighbor or passing patrol car will reach to the alarm and call for police assistance, but such a call is purely a matter of chance.
A
LOCAL ALARM BY CHANCE SYSTEM
110
Q
This system is set to dial a predetermined number or numbers when the alarm activates. The number selected might be the police or the subscriber’s home number, or both. When the phone is answered, a recording states that an intrusion in progress at the location so alarmed.
A
DIAL ALARM SYSTEM
111
Q
It will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in walls, ceilings and floors of the protected area.
A
AUDIO DETECTION DEVICE
112
Q
It will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected area. This is economical and easily installed, high salvage value, and flexible in application.
A
VIBRATION DETECTION DEVICE
113
Q
It will detect any action that moves that fail or wire. An electrically charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected area. This is consistent trouble-free service, and causes few nuisance alarms.
A
METALLIC FOIL OR WIRE
114
Q
A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated.
A
LASER BEAM ALARM
115
Q
An invisible/visible beam is emitted and when this is disturbed or when an intruder break contact with the beam, it will activate the alarm.
A
PHOTOELECTRIC OR ELECTRIC EYE DEVICE
116
Q
A pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a moving object, they return at a different frequency which results in initiating an alarm signal. Very effective for protection of interior areas. This have a good Coverage, and Not affected by air current noise sound.
A
MICROWAVE MOTION DETECTION DEVICE
117
Q
Are place on the floor in such a position that tellers may activate the alarm by placing the front of their foot to engage the activation bar.
A
FOOT RAIL ACTIVATOR
118
Q
Are usually place in the teller’s cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.
A
BILL TRAPS OR CURRENCY ACTIVATION DEVICES
119
Q
These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from seated position.
A
KNEE OR THIGH BUTTONS
120
Q
Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the robbers.
A
FOOT BUTTON
121
Q
Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.
A
DOUBLE SQUEEZE BUTTON
122
Q
Is one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards if the installation against any possible surreptitious entry.
A
LOCK
123
Q
Defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place.
A
LOCK
124
Q
A term in England for lock picker, safecracker, and penetrator or restricted areas or room.
A
PETERMAN
125
Q
It uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used to align these internal barriers so that the lock may be operated.
A
KEY OPERATED MECHANICAL LOCK
126
Q
Designed for the use of the automobile industry and are in general use in car doors today, because this lock is easy and cheap to be manufactured, its use has expanded to other areas such as desk, files and padlocks. The delay afforded is approximately ten minutes.
A
DISK TUMBLER LOCK
127
Q
Are difficult to define in terms of security, since they vary greatly in their effectiveness. These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these locks are used in desk, lockers and cabinets and are generally less secure than pin tumbler lock.
A
LEVER TUMBLER LOCK
128
Q
Offer very little security, this type of lock must therefore be use only to have privacy, but not to provide a degree of security.
A
WARDED LOCK
129
Q
A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secured.
A
PADLOCK
130
Q
Instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other symbols as reference point which enables an operator to align them manually.
A
COMBINATION LOCK
131
Q
A type of lock that can be opened by pressing a series of numbered button in the proper sequence.
A
CODE-OPERATED LOCK
132
Q
A type of lock that can be opened and closed remotely by electrical means.
A
ELECTRICAL LOCK
133
Q
A type of lock operated by coded card.
A
CARD-OPERATED LOCK
134
Q
A specific key, which operates the lock and has a particular combination cuts, or biting, which match the arrangement of the tumblers in the lock.
A
CHANGE KEY
135
Q
A key that will open all the lock within a particular area or grouping in a given facility.
A
SUB-MASTER KEY
136
Q
A special key capable of opening a series of lock.
A
MASTER KEY
137
Q
A key that will open everything in a system involving two or more master key groups.
A
GRAND MASTER KEY
138
Q
Once an effective key control has been installed, positive control of all keys must be gained and maintained. This can be accomplished only if it is established in conjunction with installation of new locking devices.
A
KEY CONTROL
139
Q
A well-constructed cabinet will have to be produced. The cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all times.
A
KEY CABINET
140
Q
Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
A
KEY RECORD
141
Q
Periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
A
INVENTORIES
142
Q
In addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
A
AUDITS
143
Q
Should be made to the person responsible for key control from the personnel department indicating all person who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to ensure that the key is covered.
A
DAILY REPORT
144
Q
Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison correctional in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.
A
ARTICLE 304 REVISE PENAL CODE
145
Q
The term “False Key” shall be deemed to include:
a)The tool mentioned in the next proceeding articles.
b)Genuine keys stolen from the owner.
c)Any key other than those intended by the owner for used in the lock forcibly opened by the offender.
A
ARTICLE 305 REVISE PENAL CODE
146
Q
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable instrument, precious metals or other especially valuable assets are protected. These security containers will be of a size and quality, which the nature of the business dictates.
A
SECURITY CABINET
147
Q
A metallic container used for the safekeeping of documents or small items in an office or installation. Can be classified as either robbery or burglary resistance depending upon the use and need.
A
SAFE
148
Q
A safe should not have at any one time a temperature above 350 degrees Fahrenheit.
A
FIRE ENDURANCE
149
Q
Test to determine if sudden rise in temperature will not cause the safe to rupture. If the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed the explosion test.
A
EXPLAINS HAZARD TEST
150
Q
Aimed at determining the strength of a safe to withstand the collapse of a building during fire.
A
FIRE AND IMPACT TEST
151
Q
Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room.
A
VAULT
152
Q
A cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside.
A
FILE ROOM
153
Q
Identification cards, passes, passwords, etc.
A
ARTIFICIAL RECOGNITION
154
Q
The badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates.
A
SINGLE PASS SYSTEM
155
Q
An exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
A
PASS EXCHANGE SYSTEM
156
Q
This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.
A
MULTIPLE PASS SYSTEM
157
Q
Are those areas where access is restricted as to entrance or movement by all authorized personnel and vehicles. It should additionally mark by a fence or other barrier, and access to it should limited to as few guests as possible.
A
CONTROLLED AREA
158
Q
Are those within the controlled area where a greater degree of security is required.
A
LIMITED AREA
159
Q
Are used only for handling and storage of high value cargo and classified documents. The number of people authorized to enter this area should be strictly limited, and the area should be under surveillance at all times.
A
EXCLUSION AREA
160
Q
Controlling traffic in and out within a facility is essential to its security program. Perimeter barriers, locked doors and screened windows, prevent or deter the entry of unauthorized visitors, but since some traffic essential to every operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.
A
TRAFFIC CONTROL SYSTEM
161
Q
The most practical and generally accepted system is the use of badges and identification cards. Generally speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a system in cancellation and re-issue of all passes; either as a security review or when a significant number of badges have reported lost or stolen.
A
PERSONNEL IDENTIFICATION
162
Q
Security should establish proper methods of establishing the authority for admission of visitors as well as the limitation thereat.
A
VISITORS MOVEMENT CONTROL
163
Q
All visitors to any facility should be required to identify them and should be given a visitor’s ID by the security. Should be filled up with the named of visitors, nature and duration of visit.
A
VISITOR’S LOGBOOK
164
Q
Taking of photographs should also be considered. Extreme caution must be exercised in areas where classified information is displayed to preclude unauthorized taking of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with corresponding receipt.
A
PHOTOGRAPH
165
Q
If possible, visitors should be escorted by the security to monitor their activity within the establishment and guide them where to go.
A
ESCORT
166
Q
Separate access for visitors and employees of the establishment should be provided.
A
VISITOR ENTRANCES
167
Q
If there is a long delay or time lapse between the departure and arrival, the visitors may be required to show cause for the delay.
A
TIME TRAVELED
168
Q
Every facility must establish a system for the control of package entering or leaving the premises. However, desirable it might seem it is simply unrealistic to suppose that a blanket rule.
A
PACKAGE MOVEMENT CONTROL
169
Q
Of the three major aspects of security, this is considered as the most important. This is for the simple reason that security involves people, both an asset to be protected and as source of security threats.
A
PERSONNEL SECURITY
170
Q
This technique is very expensive but necessary in personnel security. It serves to verify information on the application form and to obtain other information pertinent to the decision to employ.
A
BACKGROUND INVESTIGATION
171
Q
Is the process of inspecting or examining with careful thoroughness. Is a personal interview conducted under stress. It is based on information previously given by the applicant. Other information issued during the interview, such as those discovered in the BI, which confirms or denies which given by the applicant.
A
POSITIVE VETTING
172
Q
Is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behaviour, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid Report is an example of honesty test.
A
PROWLING
173
Q
This process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.
A
DECEPTION DETECTION TECHNIQUES
174
Q
This type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning to debt ratio.
A
FINANCIAL AND LIFESTYLE INQUIRY
175
Q
This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.
A
UNDERCOVER INVESTIGATION
176
Q
This a valuable tool because it gives departing employees an opportunity to list grievances. It offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of company issued property and confronting a departing employee of this has resulted in reducing losses of company property. Debriefing an employee is also incorporated into the exit interview to remind employees of their continuing legal obligation to safeguard confidential company information.
A
EXIT INTERVIEW
177
Q
Is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.
A
SECURITY EDUCATION
178
Q
Are to acquaint all the employees the rationale behind the security measures and to insure their cooperation at all times.
A
SECURITY EDUCATION PROGRAM
179
Q
It is the first contact of the prospective employee wherein the interviewer determines the suitability of the applicant for employment through his given answer on the different type of questions being conducted. It is in this stage where; the interviewer may start providing the necessary information as to the overview of company security policies and at the same time on the employee accountability and corresponding penalties that could result from violation there from.
A
INITIAL INTERVIEW
180
Q
It is in this stage where new employees receive detailed presentation of personnel security policy. Usually handouts or employee’s manual are being distributed for reference. New employees also requested to sign acknowledgement that they have been aware of the existing company policies and will abide the same.
A
ORIENTATION AND TRAINING
181
Q
It is design to remind employees of the company about their responsibilities, review the guidelines and policies, introduction of new policies and regulations and a movement of getting employees feedback about the company policies that is being implemented.
A
REFRESHER CONFERENCE
182
Q
This employed as an indirect approach of educating the employees, such as posting security posters and distributing fliers.
A
SECURITY REMINDERS
183
Q
It is the act of emphasizing the importance and role of security achieving the company goals and objectives. It involves security employee cooperation and support.
A
SECURITY PROMOTION
184
Q
Letters, diary and notebooks. These should be treated usually the same with official document.
A
PERSONAL DOCUMENT
185
Q
Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.
A
OFFICIAL DOCUMENT
186
Q
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes various stages from the time it is created until it is finally disposed.
A
DOCUMENT/INFORMATION CYCLE
187
Q
Is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
A
TOP SECRET (GREEN COLOR CODE)
188
Q
Is any information and material, the unauthorized disclosure of it would endager national security cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a foreign nation.
A
SECRET (RED COLOR CODE)
189
Q
Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and of advantage to and be of advantage to a foreign country.
A
CONFIDENTIAL (BLUE COLOR CODE)
190
Q
Is any information and material which requires special protection other than those determines confidential, secret and top secret.
A
RESTRICTED (WHITE OR NO COLOR CODE)
191
Q
In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.
A
CLASS I - VITAL DOCUMENTS
192
Q
This includes records the reproduction of which will close considerable expense and labor, or considerable delay.
A
CLASS II - IMPORTANT DOCUMENTS
193
Q
This includes records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present restoration of the business.
A
CLASS III - USEFUL DOCUMENTS
194
Q
This record are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class represent the bulk of records which should not be even attempted to be protected in the event of disasters. They should, however, be kept in ordinary files ready for reference, if needed, and usually discarded after some period of time.
A
CLASS IV - NON-ESSENTIAL DOCUMENTS
195
Q
This consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who don’t know or use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving materials, a pattern for a machine or device, or a list of customers. It differs from other secret information as to single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the business.
A
TRADE SECRETS
196
Q
This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
A
PATENTS
197
Q
Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of property or disruption of the activity of the installation.
A
SECURITY HAZARD
198
Q
These are hazards which arise from natural phenomena. The following are types of natural hazard or disasters
A
NATURAL HAZARD
199
Q
These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or installation.
A
HUMAN OR MAN-MADE HAZARD
200
Q
Aims to protect people from physical violence, whether from the state or external states, from violent individuals and sub- state actors, from domestic abuse, or from predatory adults. For many people, the greatest source of anxiety is crime, particularly violent crime.
A
VIP SECURITY
201
Q
Very important Person
A
VIP
202
Q
One or more persons accompanying another to give guidance or protection or to pay honor.
A
ESCORT
203
Q
A person or a grouped of persons usually armed and responsible for the physical safety of one or more specific person.
A
BODY GUARD
204
Q
Covers the surrounding areas of engagement. conducts prophylactic (neutralize the area), operations in the area of engagement.
A
AREA SECURITY
205
Q
Secures the immediate areas surrounding the place of engagement. Usually these are the uniformed men.
A
PERIMETER SECURITY
206
Q
This are the advanced security at the place of engagement before the arrival of the VIP. Sanitize the engagement area.
A
ADVANCE SECURITY
207
Q
Accompanies the VIP where ever he goes. Maximum of four (4) persons.
A
CLOSE-IN SECURITY
208
Q
On standby for possible back- up / re- enforcement.
A
RESERVE SECURITY
209
Q
Neutralize the possible route of the VIP party.
A
ROUTINE SECURITY
210
Q
Is a decisive point of a condition, improper handling on which immediately places under threat or danger of one’s life, limbs, freedom and property.
A
CRISIS
211
Q
Is the totality of action of handling or responding to a given crisis situation.
A
CRISIS MANAGEMENT
212
Q
Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property, before, during, and after any given crisis situation.
A
CRISIS MANAGEMENT PLAN
213
Q
Events caused by force of nature
A
NATURAL CRISIS
214
Q
Events caused through instrumentality of men.
A
MAN-MADE CRISIS
215
Q
Is a condition of an enterprise whereby normal work operation is stopped as a result of a strike and lockout.
A
WORK STOPPAGE
216
Q
Is a temporary stoppage of work by concerned action or employees as a result of a current labor industrial dispute.
A
STRIKE
217
Q
Is the temporary refusal of any employer to furnish work.
A
LOCKOUT
218
Q
The transfer of thought from the mind of one person to the mind of another thought a common medium or channel.
A
COMMUNICATION
219
Q
The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written and other forms.
A
CONFERENCE
220
Q
Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.
A
MEDIUM COMMUNICATION
221
Q
Is the common medium of communication in Baguio City
A
ILOCANO
222
Q
Is the process of sending and receiving messages to achieve understanding.
A
COMMUNICATION
223
Q
refers to the equipment’s being used to transfer thoughts or ideas.
A
CHANNEL OF COMMUNICATION
224
Q
Communication on electromagnetic waves transmitted through the space.
A
HAND HELD RADIO OR WALKIE TALKIE
225
Q
For hobby and emergency purposes type of radio.
A
AMATEUR RADIO
226
Q
For business purposes type of radio.
A
COMMERCIAL RADIO