Search Header Logo

ISSD Topic 3

Authored by Michael Tan

Computers

Professional Development

Used 5+ times

ISSD Topic 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A risk assessment is a process of evaluating security-related risks from internal and external threats to an entity, assets or ____.

building

personnel

business

security post

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A site survey is conducted to evaluate a facility's vulnerability to ____.

threats

security force

natural elements

armed forces

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The second digit in an IP code is used to represent the protection against ____.

solid

gas

liquid

vapour

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The general security risk assessment is a ____ step process which security risks at a specific location can be identified.

6

7

8

9

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

____ events have adverse impacts on mission and publicity.

Undesired

Desired

Critical

Non critical

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The factors governing installation of security systems in various environments include building construction, special protocols, environment protection and local ____.

facilities

regulation

work

area

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Two-digits ____ protection (IP) ratings are defined by the IEC 60529 standard and specify the degree of protection.

internal

international

ingress

improvisation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?