Filters
Question type

Describe different types of sensors to detect intrusions.

Correct Answer

verifed

verified

There are a number of different types of...

View Answer

Mechanical locks can accept a variety of inputs as keys, including magnetic strips on ID cards, radio signals from badges, personal identification numbers (PINs) typed into a keypad, or some combination of these to activate an electrically powered locking mechanism. _________________________

Correct Answer

verifed

verified

__________ sensors project and detect an infrared beam across an area.


A) Photoelectric
B) Smoke
C) Air-aspirating
D) Thermal

Correct Answer

verifed

verified

List and describe the "Seven Major Sources of Physical Loss."

Correct Answer

verifed

verified

1. Extreme temperature: heat, cold
2. Ga...

View Answer

Fire detection systems fall into two general categories: manual and electrical.

Correct Answer

verifed

verified

In the __________ approach, the sensor detects an unusually rapid increase in the area temperature within a relatively short period of time.


A) fixed temperature
B) permanent temperature
C) fixed rate
D) rate-of-rise

Correct Answer

verifed

verified

Videoconferencing is off-site computing that uses Internet connections, dial-up connections, connections over leased point-to-point links between offices, and other mechanisms. _________________________

Correct Answer

verifed

verified

When interior walls only partially reach to the next floor, leaving a space above the ceiling, the space is called a(n) __________.


A) kneespace
B) attic
C) plenum
D) padding

Correct Answer

verifed

verified

There are very few qualified and professional agencies that provide physical security consulting and services.

Correct Answer

verifed

verified

The online UPS can deliver a constant, smooth, conditioned power stream to computing systems.

Correct Answer

verifed

verified

__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security.


A) Programmable
B) Manual
C) Biometric
D) Electronic

Correct Answer

verifed

verified

Grounding ensures that the returning flow of current is properly discharged to the ground. _________________________

Correct Answer

verifed

verified

Guards can evaluate each situation as it arises and make reasoned responses. _________________________

Correct Answer

verifed

verified

__________ sprinklers are the newest form of sprinkler systems and rely on ultra-fine mists instead of traditional shower-type systems.


A) Pre-action
B) Water mist
C) Water-free
D) Air-dry

Correct Answer

verifed

verified

Keycard readers based on smart cards are often used to secure computer rooms, communications closets, and other restricted areas.

Correct Answer

verifed

verified

The capacity of UPS devices is measured using the voltage output rating.

Correct Answer

verifed

verified

The _________________________ lock may rely on a key that is a carefully shaped piece of metal and is rotated to turn tumblers that release secured loops of steel, aluminum, or brass.

Correct Answer

verifed

verified

Class __________ fires are extinguished by agents that remove oxygen from the fire.


A) A
B) B
C) C
D) D

Correct Answer

verifed

verified

For laptops, there are theft alarms made up of a PC card or other device that contains a motion detector.

Correct Answer

verifed

verified

A wet-pipe system is usually considered appropriate in computer rooms.

Correct Answer

verifed

verified

Showing 41 - 60 of 78

Related Exams

Show Answer