Physical Security Professional (PSP) - Study Guide For The ASIS PSP Certification Test.
Classification of risk ✔ Ans - Assest, exposure, losses
3 criteria of cost/benefit analysis ✔ Ans - Cost, reliability, delay
Basic methods of fieldwork ✔ Ans - Observing, questioning, analyzing, verifying, investigating, evaluating
Business continuity planning (BCP) process ✔ Ans - Readiness, prevention, response, recovery/resumption
BCP process "readiness" ✔ Ans - Assign accountability, perform risk assessment, agree on strategic plans, crises management
BCP process "prevention" ✔ Ans - Compliance with corporate policy, mitigation strtegies
BCP process "response" ✔ Ans - Potential crisis recognition, notify teams, assess the situation, declare a crisis, excute the plan, communication
BCP process "recovery/resumption" ✔ Ans - Damage & impact assessment, resumption of critical & remaining processes
BCP implementation & maintenance ✔ Ans - Test & train, evaluate & maintain
General physical security measures ✔ Ans - CPTED, physical barriers and site hardening, physical entry and access control, security lighting, IDS, veideo surveillance, security personnel, security policies and procedures
Designing PPS ✔ Ans - Determine objectives, Design PPS, Analyze design, redesign PPS Determine objectives ✔ Ans - Facility characterization, threat detection, target identification
Design PPS ✔ Ans - Detection, delay, response
Detection (design PPS) ✔ Ans - exterior sensore, interior sensor, alarm assessment, alarm comm & display, entry control
Delay (design PPS) ✔ Ans - access delay
Response (design PPS) ✔ Ans - response force, response force communication
Analyze PPS design ✔ Ans - Analysis/evaluation (EASI)
Target identification techniques ✔ Ans - Manual listing, logic diagram
Vital area indentification ✔ Ans - Fault tree
Detection perfrmance measures ✔ Ans - Probability of detection, time for communication & assessment, frequency of nuisance alarm
Delay performance measure ✔ Ans - Time to defeat obstacales
Response performance measure ✔ Ans - Probability of accurate communication to the response force, time to communicate, probability of deployment to adversary location, time to deploy, reponse force effectiveness
Exterior sensors vulnerability to defeat ✔ Ans - Bypass, spoof
exterior sensors classification ✔ Ans - Passive or active, covert or visable, Line of sight or terrain following, volumetric or line detection, application
Exterior sensor fence groups ✔ Ans - buried line, fence associated, freestanding
interior sensor classification ✔ Ans - Passive or active, covert or visible, volumetric or line detection interior sensor application ✔ Ans - boundary-penetration, interior motion,
proximity sensor
2 purposes of alarm assessment ✔ Ans - Determine cause of alarm, provide additional information
3 levels of alarm resolution ✔ Ans - detection, classification, identification
2 critical elements of alarm communication and display ✔ Ans - transportation of data, display of data in meaningful manner
Objectives of entry control ✔ Ans - Permit only authorized persons to entry and exit, detec and prevent contraband, provide information ot facilitate
assessment and response
Types of barriers ✔ Ans - Passive, guards, dispensable
Best height for barries ✔ Ans - 30 inches
Placement of roof barriers ✔ Ans - 10-12 inches below roof
5 parts of response ✔ Ans - general considerations, contingency planning, communication, interruption, neutralization
Types of PPS analysis ✔ Ans - Quantitative (higher consequence of loss assets), Qualitative (lower consequence of loss assests)
Defensible space ✔ Ans - a residential environment whose physical characteristics fuction to allow inhabitants to become key agents in ensuring security
2 basic social behaviors ✔ Ans - Territoriality, natural surveillance
3 phases of vulnerability assessment ✔ Ans - Planning, conducting, reporting
3 types of requirements in a system (vulnerability assessment) ✔ Ans - Fuctional, constraint, performance Risk assesments should include ✔ Ans - Risk analysis, risk identification, risk evaluation
2 types of protective barriers ✔ Ans - Natural, structural
Types of key operated locks ✔ Ans - Disc or wafer tumbler, pin tumbler, lever
Door lock types ✔ Ans - Mortise, rim-mounted, tubular, cylindrical, unit
Types of lock attacks ✔ Ans - Surreptitious techniques (picking), force
Attacks on bolts ✔ Ans - Jimmying, punching, sawing, peeling
attacks on cylinders ✔ Ans - pulling, lug pulling, twisting, drilling, punching, hammering
3 purposes of alarms ✔ Ans - Perimeter protection, area/space protection,
spot/object protection
Example of perimeter alarm protection ✔ Ans - Door switches, glass break detectors, window screens
Example of area/space alarm protection ✔ Ans - Ultrasonic, microwave, PIR
Example of spot/object alarm protection ✔ Ans - proximity detectors, vibration detectors
Security video systems aspect ratio ✔ Ans - 4x3 (16x9 wide screen)
2 types of video scanning ✔ Ans - Raster, digital or pregressive
Chain link fence A-B-C-D method ✔ Ans - Aids to security, Barriers for security, Controls, Deterrents
4 stages of a fire ✔ Ans - Ignition, groth, fully developed, decay
5 network infrastructure devices ✔ Ans - Hubs