CPO Study Guide Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| 1. In many cases, _______ ________ form the backbone of a facility’s physical protection program. a. Alarm Systems b. Covert Surveillance c. Report writing d. Physical force | a. Alarm Systems● b. Covert Surveillance c. Report writing d. Physical force |
| 2. The primary purpose of an alarm system is: a. To conduct area surveillance b. To serve as a physical barrier c. To provide early warning of an intruder d. To lower insurance rates | a. To conduct area surveillance b. To serve as a physical barrier c. To provide early warning of an intruder● d. To lower insurance rates |
| 3. According to the text material, the most effective security is provided with a: a. Technical approach b. Layered approach c. Large security force d. Key and lock program | a. Technical approach b. Layered approach● c. Large security force d. Key and lock program |
| 4. In more alarm systems, sensors are interfaced with electronic entry-control devices, CCTV, alarm reporting displays (both visual and audible), and ________ ________ a. Police patrols b. Aerial units c. Sniper teams d. Security lighting | a. Police patrols b. Aerial units c. Sniper teams d. Security lighting● |
| 5. How many different types of alarm monitoring were examined in the text? a. Two b. Three c. Four d. Six | a. Two b. Three c. Four● d. Six |
| 6. Which of the following is not a type of alarm monitoring? a. Central system b. Direct fire and police c. Satellite d. Proprietary | a. Central system b. Direct fire and police c. Satellite● d. Proprietary |
| 7. Logging devices are used for: a. Recording system activities and faults b. Controlling CCTV cameras c. Recording time and attendance of security staff d. Access control to computer networks | a. Recording system activities and faults● b. Controlling CCTV cameras c. Recording time and attendance of security staff d. Access control to computer networks |
| 8. Alarm printers are typically: a. Of the color laser type b. Of the high-speed, continuous-feed type c. black and white and medium speed d. Extremely expensive | a. Of the color laser type b. Of the high-speed, continuous-feed type● c. black and white and medium speed d. Extremely expensive |
| 9. A glass-break sensor is an example of: a. A perimeter sensor b. A spot sensor c. An area sensor d. A volumetric device | a. A perimeter sensor● b. A spot sensor c. An area sensor d. A volumetric device |
| 10. A duress alarm is also sometimes called: a. A reset button b. A panic button c. Activation switch d. A silent partner | a. A reset button b. A panic button● c. Activation switch d. A silent partner |
Created by:
dagger9701