0% found this document useful (0 votes)
10 views

Introduction To Industrial Security Concepts

1. The document discusses concepts related to industrial security, including identification, barriers, fences, and access control. 2. It contains 18 multiple choice questions about security concepts such as locks, fences, barriers, and alarm systems. 3. It also lists topics that could be elaborated on further, including 10 types of security and 4 systems for controlling personnel identification.

Uploaded by

Harold Garao
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Introduction To Industrial Security Concepts

1. The document discusses concepts related to industrial security, including identification, barriers, fences, and access control. 2. It contains 18 multiple choice questions about security concepts such as locks, fences, barriers, and alarm systems. 3. It also lists topics that could be elaborated on further, including 10 types of security and 4 systems for controlling personnel identification.

Uploaded by

Harold Garao
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: b. Wall d.

Physical Barrier
14. It is a mechanical or electronic fastening device that is
Date: released by a physical object (such as a key, keycard,
fingerprint, RFID card, security token, coin, etc.), by
SET A supplying secret information (such as a number or letter
permutation or password), or by a combination thereof or
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS
only being able to be opened from one side such as a door
I. IDENTIFICATION chain.

a. Key c. Security Doors

________________1. It is the degree of protection against b. Lock d. Security Gates


danger, loss, and criminals.
15. They are used to allow access only to authorized
________________2. An act or condition which results in a personnel and are commonly used for high-security access
situation conducive to a breach of the protection system and control at construction sites, data centers, military bases,
the subsequent loss or compromise, or damage to and prisons.
personnel, property or facilities.
a. Key c. Security Doors
________________3. What is the required height for fence
b. Lock d. Security Gates
used in Security Barrier.
16. Measures of how open an establishment to intrusion,
________________4. It is referring to various measures to
attack or injury
safeguard factories, manufacturing establishment, etc.
a. Hazzard c. Threat
________________5. Protection against any type of crime to
safeguard life and assets by various methods and device. b. Risk d. Vulnerability
________________6. It is also known as Private Security 17. A method used by security to screen visitors or person
Agency Law. admitted into building premises.
________________7. On what particular date does the a. Pass System c. Single Pass
Philippine Association of Detectives and Protective Agency
Operations (PADPAO) were formally organized b. Multiple Pass System d. Group Pass

________________8. This involves the installation of 18. It contains the names of authorized persons or personnel
physical barriers, security lighting, use of vaults, locks and and is checked against identification cards such as driver
others. licenses, draft registration etc.

________________9. It is the application of various a. Access List c. Log Book


measure that prevent or delay the enemy or unauthorized
person in gaining information. b. Pass System d. Computer Data

________________10. Protection of documents and 19. It means that you can allow only a number of people who
classified papers from loss access by unauthorized persons will enter the facility or a building or institution.
damage, theft, and compromise through disclosure.
a. Access List c. Log Book
II. MULTIPLE CHOICE (Write your answer
before the number) b. Pass System d. Restricted
Access Point
11. An indication of impending danger or harm
20.This describes a number of sensors throughout the home
a. Hazzard c. Threat that are connected to a control panel, via a network of wires
that run inside the walls and under the floors.
b. Risk d. Vulnerability
a. Electric Current Alarm System c. Log Book
12. Can be defined as any structure or physical device
capable of restricting, deterring, delaying, illegal access to an b. Wired Alarm System d. Wireless Home Alarm
installation. System

a. Fence c. Barrier III. Enumeration

b. Wall d. Physical Barrier I. Ten (10) types of Security


II. Give at least (4) Four System of
13. It is a structure that encloses an area, typically outdoors, Employment of Personnel Control
and is usually constructed from posts that are connected by Identification
boards, wire, rails or netting.

a. Fence c. Barrier
b. Risk d. Loss
13. It is the application of various measure that
Name: prevent or delay the enemy or unauthorized
person in gaining information.
Date: a. Barrier c. Wall
b. Fence d. Communication Security
SET B
14. Measures of how open an establishment to
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS intrusion, attack or injury
a. Hazzard c. Threat
I. IDENTIFICATION b. Risk d. Vulnerability
15. It is a structure that encloses an area, typically
___________1. It contains the names of authorized persons outdoors, and is usually constructed from posts
or personnel and is checked against identification cards such that are connected by boards, wire, rails or netting.
as driver licenses, draft registration etc. a. Fence c. Wall
b. Barrier d. Physical Barrier
___________2. Can be defined as any structure or physical 16. This must not to exceed 2 inches. If the fences are
device capable of restricting, deterring, delaying, illegal not tight then it should extend even closer to the
access to an installation. ground.
a. Slack at the bottom c. Fence
___________3. It contains the names of authorized persons
b. Height d. Top Guard
or personnel and is checked against identification cards such
17. It is something on the top of the fence which is
as driver licenses, draft registration etc.
installed to deter persons attempting to go over
___________4. This describes a number of sensors fence use of barb wire overhang. The arms
throughout the home that are connected to a control panel, holding the barbwire should be extended at 45-
via a network of wires that run inside the walls and under the degree angle in the direction of the expected
floors. approach.
a. Slack at the bottom c. Fence
___________5. Is a fence designed to enclose the desired b. Height d. Top Guard
area without restricting visual access to it. This means that 18. It should be set in concrete or in firm soil using
view fences can be seen through and do not obstruct the commercial drive anchors to a depth of 3 feet and
view to your home, hence the name. the maximum distance post is 10 feet.
a. Fence Post c. Wooden Post
___________6. It is something on the top of the fence which b. Slack at the Bottom d. Post
is installed to deter persons attempting to go over fence use 19. An indication of impending danger or harm
of barb wire overhang. The arms holding the barbwire should a. Hazzard c. Threat
be extended at 45-degree angle in the direction of the b. Risk d.Vulnerability
expected approach. 20. A method used by security to screen visitors or
person admitted into building premises.
___________7. This must not to exceed 2 inches. If the a. Pass System c. Single Pass
fences are not tight then it should extend even closer to the b. Multiple Pass System d. Group Pass
ground.

___________8. It is caused by natural phenomena which


cause damage, disturbance and problems of normal III. Enumeration
functioning activities, including security.
I. Ten (10) types of Security
___________9. It is the potential that a chosen action or II. Give at least (4) Four System of
activity (including the choice of inaction) will lead to a loss Employment of Personnel Control
(an undesirable outcome). Identification

__________10. Protecting transmission from the


interception, traffic analysis, imitative deception.

II. MULTIPLE CHOICE (Write your answer


before the number)

11. It is also known as Private Security Agency Law.


a. RA 5487 c. RA 5847
b. RA 5478 d. RA 5874
12. Protection of documents and classified papers
from loss access by unauthorized persons
damage, theft, and compromise through
disclosure.
a. Security c.Document Security

You might also like