Introduction To Industrial Security Concepts
Introduction To Industrial Security Concepts
Physical Barrier
14. It is a mechanical or electronic fastening device that is
Date: released by a physical object (such as a key, keycard,
fingerprint, RFID card, security token, coin, etc.), by
SET A supplying secret information (such as a number or letter
permutation or password), or by a combination thereof or
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS
only being able to be opened from one side such as a door
I. IDENTIFICATION chain.
________________8. This involves the installation of 18. It contains the names of authorized persons or personnel
physical barriers, security lighting, use of vaults, locks and and is checked against identification cards such as driver
others. licenses, draft registration etc.
________________10. Protection of documents and 19. It means that you can allow only a number of people who
classified papers from loss access by unauthorized persons will enter the facility or a building or institution.
damage, theft, and compromise through disclosure.
a. Access List c. Log Book
II. MULTIPLE CHOICE (Write your answer
before the number) b. Pass System d. Restricted
Access Point
11. An indication of impending danger or harm
20.This describes a number of sensors throughout the home
a. Hazzard c. Threat that are connected to a control panel, via a network of wires
that run inside the walls and under the floors.
b. Risk d. Vulnerability
a. Electric Current Alarm System c. Log Book
12. Can be defined as any structure or physical device
capable of restricting, deterring, delaying, illegal access to an b. Wired Alarm System d. Wireless Home Alarm
installation. System
a. Fence c. Barrier
b. Risk d. Loss
13. It is the application of various measure that
Name: prevent or delay the enemy or unauthorized
person in gaining information.
Date: a. Barrier c. Wall
b. Fence d. Communication Security
SET B
14. Measures of how open an establishment to
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS intrusion, attack or injury
a. Hazzard c. Threat
I. IDENTIFICATION b. Risk d. Vulnerability
15. It is a structure that encloses an area, typically
___________1. It contains the names of authorized persons outdoors, and is usually constructed from posts
or personnel and is checked against identification cards such that are connected by boards, wire, rails or netting.
as driver licenses, draft registration etc. a. Fence c. Wall
b. Barrier d. Physical Barrier
___________2. Can be defined as any structure or physical 16. This must not to exceed 2 inches. If the fences are
device capable of restricting, deterring, delaying, illegal not tight then it should extend even closer to the
access to an installation. ground.
a. Slack at the bottom c. Fence
___________3. It contains the names of authorized persons
b. Height d. Top Guard
or personnel and is checked against identification cards such
17. It is something on the top of the fence which is
as driver licenses, draft registration etc.
installed to deter persons attempting to go over
___________4. This describes a number of sensors fence use of barb wire overhang. The arms
throughout the home that are connected to a control panel, holding the barbwire should be extended at 45-
via a network of wires that run inside the walls and under the degree angle in the direction of the expected
floors. approach.
a. Slack at the bottom c. Fence
___________5. Is a fence designed to enclose the desired b. Height d. Top Guard
area without restricting visual access to it. This means that 18. It should be set in concrete or in firm soil using
view fences can be seen through and do not obstruct the commercial drive anchors to a depth of 3 feet and
view to your home, hence the name. the maximum distance post is 10 feet.
a. Fence Post c. Wooden Post
___________6. It is something on the top of the fence which b. Slack at the Bottom d. Post
is installed to deter persons attempting to go over fence use 19. An indication of impending danger or harm
of barb wire overhang. The arms holding the barbwire should a. Hazzard c. Threat
be extended at 45-degree angle in the direction of the b. Risk d.Vulnerability
expected approach. 20. A method used by security to screen visitors or
person admitted into building premises.
___________7. This must not to exceed 2 inches. If the a. Pass System c. Single Pass
fences are not tight then it should extend even closer to the b. Multiple Pass System d. Group Pass
ground.