Sie sind auf Seite 1von 6

University of Lagos

Human Resources Development Centre


Advanced Diploma in Security Operation & Management
First Semester 2015/2016 Academic Session
SOM206: Physical and Electronics Security Systems
Time Allowed: 2 hours
Read the following instructions carefully and comply

Answer all the questions


Shade your preferred answer/option to each question from options A to D on the OMR answer sheet provided
At the back of the OMR sheet, supply the following information: Your Full Name, (No initials please}, Your Registration
Number, Your Signature
All your shadings should be full and deep
Use HB pencil for all your shadings

Table QDDR presents an example of the times related to each detect and delay option. Use it to answer the next
six questions.
Table. QDDR
Delay Options
S/N
1 Climb fence
2 Cross open ground
Breach
3 building/window/door/wall
4 Breach Interior hardened door
5 Work time in breached space

Delay Time
10 sec
10 feet/sec
1 min
2 min
2 min

Table QDDR presents an example of the times related to each detect and delay option.
Use the table to answer the next six questions.
1. The delay time for an intruder to cross open ground that has a total length of 500 feet is
A. 10 sec
B. 20 sec
C. 25 sec
D. 50 sec
2. The total delay time is: A. 5 min
B. 5 min 20 sec
C. 6 min
D. 8 min
3. A reasonable security forces response time should be A. 5 min B. 5 min 20 sec C. 6 min D. 8 min
4. The most effective detection option for crossing an open ground is
A. Microwave sensor
B. Glass breakage sensor
C. Door contact sensor D. Motion sensor
5. The most effective detection option for breaching building/window/door/wall
A. Microwave sensor
B. Glass breakage sensor
C. Door contact sensor D. Motion sensor
6. The most effective detection option for breaching interior hardened door
A. Microwave sensor
B. Glass breakage sensor
C. Door contact sensor D. Motion sensor
7. Two different security strategies with reference to the timeline in e-security systems are
A. Containment & Denial
B. Delay & Detection
C. Detection & Apprehension
D. Response & Detection
8. In access control systems, the two-person rule is designed
A. To permit access to sensitive areas by two authorized people
B. To deny access until two authorized people have successfully entered codes or swiped cards
C. To permit access to sensitive areas by a lone individual
D. To deny access until an authorized person has successfully entered codes or swiped cards
9. A typical e-security system operates on principle of
I. Detection
II. Delay
III. Response
IV. Apprehension
A. I & II only
B. I & III only
C. I, II & III only
D. I, II, III & IV
10. In e-security system operations the time between detection of an intrusion and response by forces should be
A. greater than the time it takes for damage or compromise of assets to occur
1

B. less than the time it takes for damage or compromise of assets to occur
C. equaled to the time it takes for damage or compromise of assets to occur
D. either greater than or equal to the time it takes for damage or compromise of assets to occur
11. With reference to physical protection scheme, fences, gates, entry points, and clear zones are
A. Electrical engineering issues
B.
Mechanical engineering issues
C. Architectural issues
D.
Civil engineering issues
Fill in the gap with appropriate words.
The first lecture of Dr. S.O. Adetona was very interesting. He told us that Electrical Engineers make use of
many 12 ; and we need to know some of them so as to understand the e-security systems course better.
He went further by saying: the basic building blocks which on their own cannot do anything unless they
are connected together are referred to as
13
; and that the connected basic building blocks which
agreed to work together in order to perform a defined function is known as 14 .
12. A. keywords
B. lexical words
C. jargons
D. systems
13. A. system
B. device
C. circuit
D. component
14. A. system
B. device
C. circuit
D. component
Bar. Adebayo Akinade visited Ghana Textile mill in Accra in November 2011. During his visit, he was
informed by the General Manager of the textile mill, Chief Boateng Nana-Kuffor that the cottons for
producing Ghana Wax are obtained from East Legion, Ghana. Bar. Akinade was also enlightened that the
textile mill employed 56 permanent staff and about 40 casual workers. He was also told that the capital
base of the company as at December 2010 stood at $10bilion.
Use the statement to answer the next six questions.
15. The cottons for the production of Ghana Wax can be referred to as
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
16. The machines that are employed for the production of Ghana Wax can be categorized as
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
17. In your own opinion, Chief Boateng Nana-Kuffor is
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
18. The capital based of the company can be collectively categorized as
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
19. The 56 permanent staff of the company can be grouped as
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
20. The 40 casual workers of the mill can collectively be referred to as
A. tangible asset
B. intangible asset
C. current asset
D. concurrent asset
21. A system which prevents assets and properties of a given organization from harm is known as
A. electronic security system
B. physical security system C. security system
D. barrier
22. A security system which requires electrical power to function is collectively referred to as
A. electronic security system
B. physical security system
C. security system D. barrier
23. Which of the following security systems is odd?
A. CCTV System B. e-Access Control System C. Intrusion Detection System
D. Barrier
24. Which of the following belong to Physical Security System?
A. walls & moats
B. walls & doors
C. moats & doors
D. walls, moats & doors
25. Arson, Espionage, and Counterfeiting ate collectively referred to as
A. Felony
B. Assault
C. Insecurity
D. vulnerabilities
26. A security entity that can be susceptible to psychological stress is
A. Patrol dog
B. Sentry
C. Signage
D. Lock
27. In order to safeguard large and not easily pilfered assets openly, there must be
A. access restriction system
B. guard patrol
C. proper posting of warning signs
D. alarm monitoring system
2

L/S Ijaikooko, an ahoy, was drafted to Chief of Naval Staff (CNS) residence as a sentry. His duty is to guard
and keep watch on entrances and exits of the CNSs house. In order to carry out his job effectively and
efficiently, he was equipped with the following items: Walkie-Talkie, Rifle, Whistle, and floodlight.
Use the above statements to answer the next five questions.
28. L/S Ijaikooko, a sentry, in your own opinion is
A. electronic security system
B. physical security system
C. A & B options
D. either A or B
29. The walkie-talkie given to L/S Ijaikooko is
A. electronic security system
B. physical security system
C. A & B options
D. either A or B
30. In your own opinion the Rifle that the sentry is using to carry out his duty is
A. electronic security system
B. physical security system
C. A & B options
D. either A or B
31. The floodlight given to L/S Ijakoko in security wise is
A. electronic security system
B. physical security system
C. A & B options
D. either A or B
32. Whistle that the sentry is equipped with is
A. electronic security system
B. physical security system
C. A & B options
D. either A or B
33. e-security systems are designed to
A. replace most physical security systems
B. reduce the number of personnel required
C. make life difficult for criminals
D. complement existing security systems for better efficiency
34. When an access point is found to be damaged, which of these should be done immediately?
A. Repair the damage point immediately
B. Detail a security officer to secure the point
C. Report the damage promptly to the authority
D. Lodge a complaint at the security unit
35. Which of the following mass communication media is used for security purpose?
A. Bill board
B. Signage
C. Hand Bills
D. Posters
36. The combinations of safes and/or vaults must be changed
A. once a year
B. upon reassignment of officer responsible for the control of locks and keys
C. upon change of management
D. either A or B
37. The gates, doors and containers are fastened with help of
A. locking device
B. alarm and alarm system C. Barrier
D. keys
38. The type of lock which uses numbers in order to align the lock tumblers for unlocking the device is
A. key operated lock
B. combination lock C. interchangeable core
D. cipher lock
39. The type of locking device that utilizes lock with a removable core
A. key operated lock
B. combination lock C. interchangeable core
D. cipher lock
40. A single key that opens a series of locks is known as
A. duplicate key
B. master key
C. operating key
D. cipher key
41. The medium which defines the physical unit of an area and impedes access to it is known as
A. harm
B. barrier
C. signage
D. perimeter security
42. Another name for steel security container is: A. Safe B. Vault
C. Drop box D. Cash retainer
43. The security survey review is not aimed at
A. controlling undesirable activities such as demonstrations and interference
B. identifying conditions in an organization susceptible to criminal exploitation
C. evaluating compliance with minimum physical standard
D. observing and evaluating of existing crime prevention practices utilized by security staff
44. Signage is used to provide
A. direction for closing and fastening of gates, doors and containers
B. a deterrent by warning of facilities borders and consequences of security violations
C. definitions of physical limits of installations area
D. direction of entrances and exits from the premises of an organisation
45. For open display of large and not easily pilfered items, wholly or in part, there must be
A. proper posting of warming signs
B. an alarm monitoring system on ground
C. patrol guard
D. access control system
46. A vault is a/an
A. device for closing and fastening gates and doors
3

B. container used for keeping cash received after office hours


C. steel securing container
D. specially constructed room with limited access for assets protection
47. The recommended maximum period of validity of identification cards for contract employees is
A. biennially
B. after every five years
C. annually D. the length of their engagement
48. An automated Key Control System should be
A. able to account for every movement of each key or lock
B. capable of tracking the movement of staff who have left the organisation
C. supported by the completion of appropriate form
D. able to keep a database accessible by the authority
49. The automated access control system that can recognize that a user credential is valid but could not verify
that the credential actually belongs to the user is
A. Biometric access technology
B. Electronic access technology
C. Identification badge
D. Control log
50. The automated locking devices should have the following features except
A. Denying access to employee whose appointment has been terminated within 24 hours
B. Register an alarm after many unsuccessful attempts to retrieve a key
C. Register an alarm upon attempts to tamper with or defeat the system
D. Register an alarm upon attempts to retrieve or return a key outside normal duty hours
51. The access control technology that employs physical characteristics to validate a persons identity is
A. control log B. electronic access technology C. biometric access technology
D. badge
52. The most commonly used biometrics in corporate environment for physical access control are
A. Finger scanning and hand geometry biometrics
B. Facial scan and Iris recognition biometrics
C. Voice scan and Retina scan biometrics
D. DNA matching and body odor biometrics
53. A multifactor access control system require the use of
I. card II. personal ID number
III. biometric identifier
IV. templating
A. I & II only
B. II & III only
C. I, II & III only
D. I, II, III, & IV
54. In your opinion, the heart of the biometrics processes is
A. presentation
B. scanning
C. verification
D. enrollment
55. Two electronic devices which are made to work together in order to perform a desired function is a(an)
A. network
B. system
C. circuit
D. component
56. The access control security system which is principally designed for documentation purposes is
A. manual access control system
B. automated access control system
C. control log access control system
D. logical access control system
57. The acquisition and storage of biometric data in a database of a biometrics is collectively referred to as
A. verification
B. enrollment
C. templating
D. scanning
58. One of the limitations of fingerprint scanning biometrics using optical device is that
A. the units tend to be larger than other types of biometrics
B. the glass platen for the biometric process can become dirty
C. unproven in challenging environments
D. could be affected by electrostatic charges
59. One of the limitations of hand geometry biometrics is that
A. the units tend to be larger than other types of biometrics
B. the glass platen for the biometric process can become dirty
C. unproven in challenging environments
D. could be affected by electrostatic charges
60. Intrusion detection system is not principally designed to
A. detect an intrusion B. announce an intrusion C. apprehend the intruder D. chase an intruder away

Use the figure below to answer the next four questions

Fig. QIDS
61. In Fig. QIDS, the block that is responsible for supplying electrical power to itself and other units is
A. sensory unit B. control unit
C. annunciation device
D. human factor
62. In your own opinion, the unit that evaluates the condition that exists in protected area is
A. sensory unit B. control unit
C. annunciation device
D. human factor
63. The unit that announces an intrusion in a protected area of interest in Fig. QIDS is
A. sensory unit B. control unit
C. annunciation device
D. human factor
64. In your own opinion, the dashed arrows in Fig. OIDS represent
A. power flow lines
B. Signal lines
C. both A & B
D. neither A nor B
65. The function of the human factor in an operation of IDS is to
A. initiate a response that results from investigation of a sensed environment
B. provide the power needed by the entire system
C. detect a condition that exits or change
D. respond to the call for help
66. A system that contains a transmitter, receiver and other electronic units is referred to as a
A. modem
B. transceiver
C. radio
D. computer
67. Another name for electrostatic IDS is
A. ultrasonic IDS
B. capacitance IDS C. electrical IDS
D. pressure mat IDS
68. The IDS that should not be used in an area that contains sound absorbing material is
A. ultrasonic IDS
B. capacitance IDS C. electrical IDS
D. pressure mat IDS
69. Electrical IDS are very effective for the protection of
I. Exterior areas II.
Interior area III.
Volumetric areas
A. I only
B. II only
C. I & II
D. II & III
70. Capacitance proximity detector triggers when the
A. glass is broken
B. intruder satisfies the prescribed level of pressure
C. electrical circuit is interrupted
D. all of the above
71. The duress alarm need not to be tested weekly when there is
A. biometric access control system on ground
B. standby security officer manning the area of interest
C. Closed Circuit Television Vision system already eyeing the place
D. self-diagnosing alarm system
72. The IDS that floods the interior of a protected area with short radio waves so as to detect an intrusion is
A. Ultrasonic IDS
B. Microwave IDS C. Sound detection IDS
D. Photoelectric Beam IDS
73. The IDS that uses sound pressure waves to detect the presence of intruders in a protected area of interest is
A. Ultrasonic IDS
B. Microwave IDS C. Sound detection IDS
D. Photoelectric Beam IDS
74. Another name for Radar Alarm is
A. Ultrasonic IDS
B. Microwave IDS C. Sound detection IDS
D. Photoelectric Beam IDS
75. The IDS that will be given false alarm when placed in an area that contains sound absorbing materials is
A. Ultrasonic IDS
B. Microwave IDS C. Sound detection IDS
D. Photoelectric Beam IDS
76. Four electronic systems which are made to work together in order to perform a desired function is a(an)
A. network
B. complete system
C. circuit
D. component
77. A pull-trip switch is a(an)
A. electrical sensor
B. mechanical sensor
C. proximity sensor D. vibration sensor
78. A unit of CCTV system that makes use of photographic and video machines is a(an)
A. lens
B. camera
C. monitor
D. VCR
79. A unit of CCTV system that employs the principle of persistency for its operation is
A. lens
B. camera
C. monitor
D. VCR
5

80. In a given CCTV camera, the greater the number and density of pixels, the better the
A. sensitivity
B. resolution
C. frame rate
D. scene illumination
81. Infrared illuminators assist black and white cameras to
A. give much better resolution B. give poor resolution
C. see in total darkness
D. see in well illuminated areas
82. When light travels from a less dense medium to a denser medium, its speed
A. remains the same
B. reduces
C. increases
D. becomes zero
83. The wavelength of ultraviolet light is 400nm. What is the frequency of this light when travels in a vacuum?
(Note: speed of light in a vacuum is 3.00 X 108 ms-1 )
A.
B.
C.
D.
84. If centre of curvature of a lens, focal length and principal focus are denoted by
respectively;
therefore:
A.
B.
C.
D.
85. A lens of a camera has a focal length of 12mm and chip size of 4.8mm. If the camera is located at a distance
of 1200mm from an object to be monitored, then the width of the object is
A. 0.048mm
B. 480mm
C. 3000mm
D. 69120mm
86. A CCTV camera has no: A. iris
B. lens
C. imaging area
D. recording system
87. In camera technology, pixels stands for
A. picture excellent
B. pix excellent
C. picture elements
D. pix elements
88. The unit of sensitivity of a CCTV camera is: A. lux
B. decibel
C. volts
D. millimeter
89. The unit of a gain of a CCTV camera is: A.
lux
B. decibel
C. volts
D. millimeter
The signal to noise ratio of a given CCTV camera is 10 8 . Use the information to answer the next three
questions
90. The formula that can be used to determine the gain of the camera is

A.
B.
C.
D.
91. The camera has a gain of: A.
80dB
B. 160dB
C. 80Db
D. 160Db
92. The gain of the CCTV camera is: A. good
B. bad
C. either A or B
D. neither A nor B
93. In physical protection scheme, HVAC protection and redundancy are
A. Electrical engineering issues
B. Mechanical engineering issues
C. Architectural issues
D. Civil engineering issues
94. In physical protection scheme, barriers, doors, windows, and door hardware are
A. Electrical engineering issues
B. Mechanical engineering issues
C. Architectural issues
D. Civil engineering issues
95. An e-security system that has 3 e-security subsystems, which are linked to dispatch centre by a DTM is a(an)
A. simple system

B. intermediate system

96. An e-security system that has 4 e-security subsystems,


A. simple system
B. intermediate system
97. A CCTV system that is activated by a motion detector
A. simple system
B. intermediate system
98. A Global Positioning Tracking System is a(an)
A. simple system
B. intermediate system

C. complex system

D. networked system

which are linked to dispatch centre directly is a(an)


C. complex system D. networked system
is a(an)
C. complex system D. networked system
C. complex system

D. networked system

The reflectance levels of a CCD camera and the area in which it is placed for monitoring are 75%, and
80% respectively. Use the statement to answer the next two questions.
99. The full meaning of CCD is
A. Capacitor Coupling Device
B. Charged Couple Device
C. Charged Controlling Device
D. Capacitor Controlling Device
100. At the monitoring side of the CCTV system, there would be
A. no picture formation on the monitor
B. picture formation on the monitor
C. slight picture formation on the monitor
D. no recording by VCR
6

Das könnte Ihnen auch gefallen