Search Header Logo
DSM2613(5) ELECTRONIC SECURITY SYSTEM

DSM2613(5) ELECTRONIC SECURITY SYSTEM

Assessment

Presentation

Social Studies

University

Practice Problem

Easy

Created by

Nur Fatima Aisya Jamil

Used 16+ times

FREE Resource

11 Slides • 20 Questions

1

media

2

media

3

media

4

Multiple Choice

"Allowing some people in"

What physical security measure does this refer to?

1

Physical barriers and site hardening

2

Security lighting

3

Physical entry and access control

4

Intrusion Detection System

5

Match

Match the following concepts to verify people’s authorisation

Tokens or other items in person’s possession (e.g. metal key)

Private information (e.g. password)

Person’s unique characteristics (e.g. fingerprint bimetrics)

Has

Knows

Inherent

6

media

7

Multiple Choice

These are vehicle identification devices EXCEPT

1

Cardboard placards

2

Biometrics

3

Radio frequency identification (RFID) tags

4

Bar codes

8

Match

Match the following types of attacks by adversary to defeat access control point

False pretenses to convince personnel to permit entry

Uses tools to force entry

Forges a credential, guesses a personal identification number, or obtains another person’s credential

Deceit

Direct physical attack

Technical attack

9

Match

Match the following types of access control systems

Use personnel to control who or what may enter

Use tools (such as metal detectors) to help a security officer make access decision

Use technology to control the entire access process, eliminating manual system

Manual

Machine-aided manual

Automated

10

Match

Match the following physical entry and access control concepts

All personnel, materials, and vehicles are examined for contraband before allowing entry

Using devices such as cardboard placards, stickers, radio frequency identification (RFID) tags, bar codes, special license plates, and electronic tags

Among the issues includes

• Sharing of personal identification numbers (pins).

• Sharing of access cards.

• Tailgating or piggybacking.

Contraband detection

Vehicle access control

Procedures and controls

11

media

12

media

13

Match

Match the following types of locks

For example, door, cabinet, padlocks uses parts arrangement to prevent opening bolt or latch

Allow doors to be locked and unlocked by remote device

Electromagnet (attached to the door frame) and an armature plate (attached to the door)

Rely on a unique card presented to a card reader at access point

Mechanical

Electrified

Electromagnetic

Credential-operated

14

Match

Match the following types of locks

Alphanumeric keypad used to select sequence of numbers or letters

Verify a person’s specific physical characteristic

Enable emergency responders to enter facility when no one is available to provide access

Help managers control and account for keys

Combination

Biometrics

Rapid entry systems

Key systems

15

media

16

Fill in the Blank

Detect person or vehicle attempt unauthorized entry

17

Match

Match the following IDS elements

Sense and respond to change in environment

Transmits changes in condition of alarm sensor to another location to be assessed by responder forces

Alerts change in alarm condition

Alarm sensor

Circuit sending device

Enunciator or sounding device

18

Multiple Choice

The importance of Intrusion Detection System is…

1

Failure to detect intruder

2

Falsely report breaches

3

Creates excessive false activations

4

Facilitates security responses

19

Reorder

Reorder the following Installation, Maintenance and Repair Steps

Engineering and installation

Commissioning

Auditing

Maintenance

Repair

1
2
3
4
5

20

media

21

Match

Match the following IDS types

Often magnetic, detect part of device moved such as door position switch

Alarm triggered when static condition changes

Alarm triggered when sounds are outside of selectable ambient range such as in vaults

  1. Position detection devices

Motion detectors

Sound detectors

22

Match

Match the following IDS types

Reacts to motions such as shaking or physical shocks to detect tool attack

Alarm triggered when air or surface temperature changes

Alarm triggered when air or surface temperature changes outside of predetermined limits

Vibration sensors

Heat sensors

Temperature sensors

23

media

24

Match

Match the following IDS types

Used with metallic products such as in safes to detect changes in electrical capacitance and cause alarm

Detect sudden air pressure change

Detect glass breaking impact, sound and when it hits the floor

Transmitting assistance alarms such as wired switches

Capacitance devices

Impact sensors

Glass break sensors

Duress/Panic alarms

25

media

26

Match

Match the following types of camera

Indoor

Outdoor

Infrared

Dome

27

Match

Match the following types of camera

Vandal-proof

Hidden

Pan Tilt Zoom

Bullet

28

Multiple Choice

CCTV footage is not a reliable evidence in Malaysia

1

True

2

False

29

Multiple Choice

In Malaysia, there must be video surveillance in public spaces

1

True

2

False

30

Multiple Choice

These are functions of video surveillance except

1

Evidence in court

2

Detect intruder

3

24 man hour surveillance

31

media
media

Show answer

Auto Play

Slide 1 / 31

SLIDE