Lecture
Lecture
Access list- an authenticated list of personnel given to security allowing entry to compound
or installation.
Air cargo security- to minimize or to prevent loses of cargo during in transit, storage, or
transfer.
Animal barrier – animals are used in partially providing a guarding system like dogs and
geese.
Article 304 possession of picklocks or similar tools - any person, who shall without lawful
cause have in possession picklocks or similar tools especially adapted to the commission of
the crime or robbery, shall be punished by arresto mayor in its maximum period to prison
correctional in the minimum period
Article 305 false key - the term “false keys” shall be deemed to include: genuine keys stolen
from the owner. Any keys other than those intended by the owner for use in the lock forcibly
opened by the offender.
Assets protection program - it is the sum total of the protection scheme encompassing the
entire security spectrum, designed to eliminate, reduce or control threats, hazards, risk or
damages to company assets.
Audio detection device - it is a supersensitive microphone speaker sensor that is installed in
walls, ceilings, and floors of the protected area. Any sound caused by attempted forced entry
is detected by file censor.
Audits- in addition to periodic inventory an unannounced audit should be made of all key
control records and procedure by a member of management.
Auxiliary system - in this system installation circuits are led into local police or fire
department by lease telephone line
Background investigation – a check made on an individual usually seeking employment
through subjects records in the police files, educational institutions, place of residence, and
former employers.
Bank security - the protection resulting from the application of various measures which
safeguards cash and assets which are in storage, in transit, and or during transaction.
Barrier- any structure or physical device capable of restriction, deterring or delaying illegal
access to an installation.
Barbed wire fences (semi-permanent) - standard barbed wire is twisted double strand, 12
gauge wires, with 4 point barb spaced on equal distant part. Barbed wire fencing should not
be less than 7 feet high, excluding the top guard. Barbed wire fencing must be firmly affixed
to post not more than 6 feet apart. The distance between strands will not exceed 6 inches and
at least one wire will be interlock vertical and midway between
Bill traps - it is also known as currency activation devices which are usually place in the tellers
top cash drawer and connected to the alarm system using a wire connector. When currency is
removed from the devices, the alarm is activated.
Card-operated locks - coded card notched, embossed or containing an embedded pattern of
copper flocks. These are frequently fitted with a recording device which register time and
identify the user.
Casual pilferer – one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection.
Central station system - a type of protective alarm where the central station located outside
the installation. It can be located in agency and the installation is one of the subscribers.
When alarm is sounded, central station notifies police and other agency. A system in which
the alarm signal is relayed to remote panel located at the facilities of private owned
protection service company manned by its personnel.
Chain link fences (permanent structure) - must be constructed in 7 feet material excluding the
top guard; must be of 9 gauge or heavier; mesh opening must not be larger than 2 inches;
securely fastened to rigid material or reinforced concrete; reach within 2 inches of hard
ground or paving; on soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
Change key - a key to single lock within a master keyed system.
Class i – vital documents- in this category these are records that are irreplaceable; records of
which reproduction does not have the same value as the original.
Class ii – important documents- this includes records, the reproduction of which will close
considerable expense and labor, or considerable delay.
Class iii – useful document- this include records whose loss might cause inconvenience but
could be readily replaced and which would not in the meantime present an insurmountable
obstacle
Class iv – non-essential documents- these records are daily files, routine in nature even if lost
or destroyed, will not affect operation or administration. This class represents the bulk of the
records which should not be attempted to protect.
LEA 2B – INDUSTRIAL SECURITY MANAGEMENT
FINAL EXAMINATION
(LEA 2B – INDUSTRIAL SECURITY MANAGEMENT)
SY2011-2012/2nd Semester
INSTRUCTION: Select the correct answer for each of the following questions. Mark only one answer for
each item by shading the space corresponding to the letter of your choice on the answer sheet
provided. STRICTLY NO ERASURES ALLOWED.
1. Ethical Standard: Constantly endeavour to raise quality __________ of private
security services ; a.Authority b.Services c.Function d.Standard
2. Endeavour to fulfill their ____________ duties in accordance with the highest moral
principles ; a.Private b.Public c.Professional d.Standard
3. Contribute to the ______________ welfare by securing and preserving industrial
facilities of the country ; a.Private b.Public c.National d.Filipino
4. Constantly work with and assist the law enforcement agencies in the ___________
of peace and order in the country; a.Reservation b.Communication c.Preservation
d.Cooperation
5. With faith and diligence , perform their __________ obligations for the protection of
life, limb and property; a.Civil b.Private c.Public d.Contractual
6. Code of Conduct: They shall all times adhere to professional ________ and refrain
from practices that negate the best interest; a.Authority b.Services c.Ethics
d.Standard
7. They shall not indulge in _____________ competition by undercutting the existing
contract rates.; a.Asset b.Financial c.Cut throat d.Private
8. They shall not _________ means or misrepresentations in all their business
transactions; a.Quarrel b.Deceitful c.Clandestine d.Practical
9. They shall ___________ an adequate library of books, magazines and other
publications on security subject. ; a.Control b.Serve c.Structure d.Establish
10. They shall at all times exercise ___________ and be prepared to prevent the use of
their guards or the agency; a.Diligence b.Vigilance c.Respect d.Integrity
11. They shall always be truthful and ____________ in reports; a.Standard b.Accurate
c.Narrative d.Direct
12. To _____ all calls from post more distant from the security house where I am
stationed; a.Quit b.Report c.Repeat d.sound
13. To _____ all violations of order I am instructed to enforce; a.Quit b.Report c.Repeat
d.sound
14. To _____ my post only when properly relieved; a.Quit b.Report c.Repeat d.sound
15. To _____ or call the alarm in case of fire or disorder; a.Quit b.Report c.Repeat
d.Sound
16. To _____ to no one except in the line of duty; a.Walk b.Talk c.Receive d.Salute
17. To _____ , obey and pass on to the relieving guard all order form company officers;
a.Walk b.Talk c.Receive d.Salute
18. To _____ in an alert manner during my tour of duty and observing everything that
takes place within sight or hearing; a.Walk b.Talk c.Receive d.Salute
19. To _____ all company officials superiors in the agency, ranking public officials, and
commission officer of the AFP; a.Walk b.Talk c.Receive d.Salute
20. To _____ charge of the post and all companies properties in view and protect the
same with utmost diligence; a.Walk b.Take c.Receive d.Salute
21. A special key capable of opening a series of locks; a.Master key b.Sub master key
c.Original key d.Grand master key
22. A key to a single lock within a master keyed system; a.Master key b.Sub master
key c.Change key d.Grand master key
23. It is the devices holding a door closed by magnetism; a.Code lock b.Combination
Lock c.Lever lock d.Electromagnetic lock.
24. This not the purpose of security survey; a.determine existing state of security
b.locate criminals c.Produce recommendations establishing a total security
program d.determine the conclusion and probabilities
25. Planning the security survey except for one; a.Obtain organizational support
b.Verify the need c.Develop alternatives d.Implement the managers policy