​
ログむン

LEA 103 SECURITY AND SURVEY INSPECTION 🧚 PART 1
30問 • 1幎前
  • #100
  • 通報

    問題䞀芧

  • 1

    Is a fact-finding process whereby the assessment team gathers data that reflects the who, what, where, when, why and how of an organization's existing operation and facility. Is to identify and measure the vulnerabilities to the facility or specific assets by determining what opportunities exist to exploit current security, security policies and procedures, physical security equipment, and security personnel. include checklists, audits, or inventories of security conditions. Some experts incudes the risk analysis, but the process should instead begin with a needs assessment. It identifies people, things, processes that are necessary to the continuation of the business or work before the focus is directed to the potential threats that may be interrupt operations.

    SECURITY SURVEY

  • 2

    Protection against internal and external theft, including embezzlement, fraud, burglary, robbery, industrial espionage, and the theft of trade secrets and proprietary information. Development of access control procedures to protect the facility perimeter as well as the computer facilities and executive offices located inside. Establishment of lock and key-control procedures Installation of anti-intrusion and detection system Establishment of a workplace violence program to help corporate personnel deal with internal and external threats

    IMPORTANCE OF SECURITY SURVEY

  • 3

    is a tool to determine the possible risks in a facility in order to control or prevent possible loss or damage of company assets. Deals with the protection any person, facility, material, information, activity, and other assets that have a positive value to an organization. These assets may also have value to an adversary, possibly in a different nature and magnitude to how the owners value them. Also deals with the prevention of risk by taking action or using physical entities to reduce or eliminate one or vulnerabilities. Vulnerabilities and weaknesses that can be exploited by an adversary to gain an asset. They include structural, procedural, electronic, human, and other elements that provide opportunities to attack assets.

    SECURITY INSPECTION

  • 4

    Enumerate the 3 Phases of Security Inspection

    DETECTION OF COMPANY POLICY VIOLATIONS, DETECTION OF POSSIBLE DEFECTS IN PROTECTIVE DEVICES AND OTHER SECURITY AIDS, DETECTION OF SECURITY HAZARDS

  • 5

    The acts or practices of employees that are contrary to policy. For example, tampering on employee time-cards or bringing out company property for unknown reason.

    DETECTION OF COMPANY POLICY VIOLATIONS

  • 6

    For example, improper storage of waste materials

    DETECTION OF SECURITY HAZARDS

  • 7

    Enumerate the steps in Security Inspection by PREPARATION

    REVIEW THE MANAGEMENT POLICY, REVIEW THE LOSS APPRAISAL REPORT, USE EQUIPMENT NEEDED IN SECURITY

  • 8

    Enumerate the steps in Security Inspection by PLAN ROUTE

    IDENTIFY PRIORITY AREAS, IDENTIFY THE SEQUENCE

  • 9

    Is generally defined as the state of being certain that adverse effects will not be caused by some agent under the fine conditions.

    SAFETY

  • 10

    it means freedom from danger, risk, or injury. it involves measures (people, procedures, or equipment) used to prevent or detect and abnormal condition that can endanger people, property, or the enterprise. this of normal conditions include accidents caused by human carelessness, inattentiveness, lack of training or other unintentional events.

    SAFETY INSPECTION

  • 11

    Enumerate The objectives of Safety Inspection

    TO SAVE LIFES, TO SECURE PROPERTIES, TO RESTORE THE AFFECTED FACILITY AS SOON AS POSSIBLE

  • 12

    Enumerate the 4 Steps in SAFETY INSPECTION

    PREPARATION, EQUIPMENT, PLAN ROUTE, INSPECTION PATTERN

  • 13

    Enumerate the Steps in SAFETY INSPECTION According to PREPARATION

    PLAN, REVIEW, STUDY, OUTLINE

  • 14

    Enumerate the Steps in SAFETY INSPECTION According to EQUIPMENT

    HARD HAT, PENCIL/BALLPEN, GOGGLES

  • 15

    Enumerate the Steps in SAFETY INSPECTION According to PLAN ROUTE

    HAVE A DEFINITE OBJECTIVE, FOLLOW THE PATTERN

  • 16

    Enumerate the Steps in SAFETY INSPECTION According to INSPECTION PATTERN

    GENERAL CONDITIONS, SPECIFIC HAZARDS, WORK PRACTICES, HOW WORK IS DONE

  • 17

    🎯 Assess the overall security policies in place. Review the organization's security training programs. 🎯 Evaluate emergency response plans and drills. 🎯 Check for compliance with relevant regulations.

    GENERAL ENVIRONMENT OPERATION

  • 18

    🎯 Inspect fencing for integrity and height. 🎯 Ensure gates are secure and monitored. 🎯 Review access control measures (ID checks, badges). 🎯 Assess the effectiveness of perimeter barriers.

    PERIMETER SECURITY

  • 19

    🎯 Check for visible security personnel during all shifts. 🎯Evaluate the effectiveness of landscaping in hiding potential intruders. 🎯 Inspect for external hazards (lighting, debris). 🎯Review visitor access procedures.

    EXTERIOR SECURITY

  • 20

    🎯Assess lighting levels around the perimeter and entry points. 🎯Ensure lighting is functional and maintained. 🎯Check for coverage in parking lots and walkways.

    SECURITY LIGHTING

  • 21

    🎯 Inspect entry and exit points for security measures. 🎯 Evaluate the strength of doors, windows, and access points. 🎯 Review visitor access policies. 🎯 Check for signs of tampering or forced entry.

    BUILDING SECURITY

  • 22

    🎯Audit key distribution and tracking processes. 🎯 Ensure high-security locks are in place where necessary. 🎯 Check for unauthorized duplicates of keys. 🎯 Review procedures for lost or stolen keys.

    LOCKS AND KEY CONTROL

  • 23

    🎯Review identification processes for employees and visitors. 🎯 Ensure visitor logs are maintained and monitored. 🎯 Check employee access levels and permissions. 🎯Evaluate employee training on security protocols.

    EMPLOYEE AND VISITOR CONTROL

  • 24

    🎯 Assess guard training and qualifications 🎯 Review guard deployment and shift coverage. 🎯Evaluate incident reporting procedures. 🎯 Check for emergency response capabilities.

    THE SECURITY GUARD FORCE

  • 25

    🎯 Inspect the functionality of alarm systems (intrusion, fire). 🎯 Review alarm response protocols. 🎯 Ensure regular testing and maintenance are conducted. 🎯Check for false alarm rates and procedures to address them.

    ALARM SYSTEMS

  • 26

    🎯 Assess the placement and coverage of cameras. 🎯 Review recording capabilities and storage duration. 🎯 Ensure camera feeds are monitored in real- time. 🎯 Check for proper signage indicating surveillance.

    SURVEILLANCE SYSTEM

  • 27

    🎯 Evaluate internal communication systems for emergencies. 🎯 Check the effectiveness of alarm notifications. 🎯 Ensure clear protocols for reporting security incidents. 🎯 Review communication equipment (radios, phones) for functionality.

    COMMUNICATIONS

  • 28

    🎯 Review fire escape routes and exits. 🎯 Check fire extinguishers and alarms for compliance. 🎯Assess training for employees on fire safety procedures. 🎯Ensure regular fire drills are conducted.

    FIRE AND EMERGENCY PLANNING

  • 29

    🎯 Evaluate specific security procedures tailored to the facility. 🎯 Review incident response procedures. 🎯 Check for consistency in operational protocols.

    PROCEDURAL CONTROLS

  • 30

    🎯 Check for any additional security measures unique to the facility. 🎯Review feedback from employees regarding security concerns. 🎯Assess the overall security culture within the organization. 🎯Document and follow up on any identified vulnerabilities.

    MISCELLANEOUS

  • CLJ EVIDENCE

    CLJ EVIDENCE

    #100 · 31問 · 4ヶ月前

    CLJ EVIDENCE

    CLJ EVIDENCE

    31問 • 4ヶ月前
    #100

    CLJ PART 2

    CLJ PART 2

    #100 · 9問 · 4ヶ月前

    CLJ PART 2

    CLJ PART 2

    9問 • 4ヶ月前
    #100

    CRIM 105 IDENTIFICATION

    CRIM 105 IDENTIFICATION

    #100 · 24問 · 4ヶ月前

    CRIM 105 IDENTIFICATION

    CRIM 105 IDENTIFICATION

    24問 • 4ヶ月前
    #100

    CRIM 105 MULTIPLE CHOICE

    CRIM 105 MULTIPLE CHOICE

    #100 · 25問 · 4ヶ月前

    CRIM 105 MULTIPLE CHOICE

    CRIM 105 MULTIPLE CHOICE

    25問 • 4ヶ月前
    #100

    FRSC 106 WEEK 1 MARCELINE

    FRSC 106 WEEK 1 MARCELINE

    #100 · 20問 · 4ヶ月前

    FRSC 106 WEEK 1 MARCELINE

    FRSC 106 WEEK 1 MARCELINE

    20問 • 4ヶ月前
    #100

    FRSC 106 BALLISTICS

    FRSC 106 BALLISTICS

    #100 · 24問 · 4ヶ月前

    FRSC 106 BALLISTICS

    FRSC 106 BALLISTICS

    24問 • 4ヶ月前
    #100

    FRSC 104 WEEK 1-3

    FRSC 104 WEEK 1-3

    #100 · 38問 · 4ヶ月前

    FRSC 104 WEEK 1-3

    FRSC 104 WEEK 1-3

    38問 • 4ヶ月前
    #100

    FRSC 104 WEEK 4&5

    FRSC 104 WEEK 4&5

    #100 · 25問 · 4ヶ月前

    FRSC 104 WEEK 4&5

    FRSC 104 WEEK 4&5

    25問 • 4ヶ月前
    #100

    LEA 103

    LEA 103

    #100 · 50問 · 1幎前

    LEA 103

    LEA 103

    50問 • 1幎前
    #100

    IDENTIFICATION QUIZ

    IDENTIFICATION QUIZ

    #100 · 13問 · 6ヶ月前

    IDENTIFICATION QUIZ

    IDENTIFICATION QUIZ

    13問 • 6ヶ月前
    #100

    CDI 104 BERTILLO (WEEK 1&2)

    CDI 104 BERTILLO (WEEK 1&2)

    #100 · 26問 · 4ヶ月前

    CDI 104 BERTILLO (WEEK 1&2)

    CDI 104 BERTILLO (WEEK 1&2)

    26問 • 4ヶ月前
    #100

    CDI 104 BERTILLO (WEEK 3)

    CDI 104 BERTILLO (WEEK 3)

    #100 · 29問 · 4ヶ月前

    CDI 104 BERTILLO (WEEK 3)

    CDI 104 BERTILLO (WEEK 3)

    29問 • 4ヶ月前
    #100

    FORENSIC 101

    FORENSIC 101

    #100 · 42問 · 1幎前

    FORENSIC 101

    FORENSIC 101

    42問 • 1幎前
    #100

    FORENSIC 101 PART II

    FORENSIC 101 PART II

    #100 · 40問 · 1幎前

    FORENSIC 101 PART II

    FORENSIC 101 PART II

    40問 • 1幎前
    #100

    CDI 108 ⭐

    CDI 108 ⭐

    #100 · 9問 · 5ヶ月前

    CDI 108 ⭐

    CDI 108 ⭐

    9問 • 5ヶ月前
    #100

    CRIM 103 INTRODUCTION TO HUMAN BEHAVIOR

    CRIM 103 INTRODUCTION TO HUMAN BEHAVIOR

    #100 · 90問 · 1幎前

    CRIM 103 INTRODUCTION TO HUMAN BEHAVIOR

    CRIM 103 INTRODUCTION TO HUMAN BEHAVIOR

    90問 • 1幎前
    #100

    CDI 108 PRELIM

    CDI 108 PRELIM

    #100 · 46問 · 4ヶ月前

    CDI 108 PRELIM

    CDI 108 PRELIM

    46問 • 4ヶ月前
    #100

    CRIM 103 PART II

    CRIM 103 PART II

    #100 · 21問 · 1幎前

    CRIM 103 PART II

    CRIM 103 PART II

    21問 • 1幎前
    #100

    CRIM 105 👟 WEEK 2&3

    CRIM 105 👟 WEEK 2&3

    #100 · 79問 · 4ヶ月前

    CRIM 105 👟 WEEK 2&3

    CRIM 105 👟 WEEK 2&3

    79問 • 4ヶ月前
    #100

    CRIM 103 PART 3

    CRIM 103 PART 3

    #100 · 29問 · 1幎前

    CRIM 103 PART 3

    CRIM 103 PART 3

    29問 • 1幎前
    #100

    問題䞀芧

  • 1

    Is a fact-finding process whereby the assessment team gathers data that reflects the who, what, where, when, why and how of an organization's existing operation and facility. Is to identify and measure the vulnerabilities to the facility or specific assets by determining what opportunities exist to exploit current security, security policies and procedures, physical security equipment, and security personnel. include checklists, audits, or inventories of security conditions. Some experts incudes the risk analysis, but the process should instead begin with a needs assessment. It identifies people, things, processes that are necessary to the continuation of the business or work before the focus is directed to the potential threats that may be interrupt operations.

    SECURITY SURVEY

  • 2

    Protection against internal and external theft, including embezzlement, fraud, burglary, robbery, industrial espionage, and the theft of trade secrets and proprietary information. Development of access control procedures to protect the facility perimeter as well as the computer facilities and executive offices located inside. Establishment of lock and key-control procedures Installation of anti-intrusion and detection system Establishment of a workplace violence program to help corporate personnel deal with internal and external threats

    IMPORTANCE OF SECURITY SURVEY

  • 3

    is a tool to determine the possible risks in a facility in order to control or prevent possible loss or damage of company assets. Deals with the protection any person, facility, material, information, activity, and other assets that have a positive value to an organization. These assets may also have value to an adversary, possibly in a different nature and magnitude to how the owners value them. Also deals with the prevention of risk by taking action or using physical entities to reduce or eliminate one or vulnerabilities. Vulnerabilities and weaknesses that can be exploited by an adversary to gain an asset. They include structural, procedural, electronic, human, and other elements that provide opportunities to attack assets.

    SECURITY INSPECTION

  • 4

    Enumerate the 3 Phases of Security Inspection

    DETECTION OF COMPANY POLICY VIOLATIONS, DETECTION OF POSSIBLE DEFECTS IN PROTECTIVE DEVICES AND OTHER SECURITY AIDS, DETECTION OF SECURITY HAZARDS

  • 5

    The acts or practices of employees that are contrary to policy. For example, tampering on employee time-cards or bringing out company property for unknown reason.

    DETECTION OF COMPANY POLICY VIOLATIONS

  • 6

    For example, improper storage of waste materials

    DETECTION OF SECURITY HAZARDS

  • 7

    Enumerate the steps in Security Inspection by PREPARATION

    REVIEW THE MANAGEMENT POLICY, REVIEW THE LOSS APPRAISAL REPORT, USE EQUIPMENT NEEDED IN SECURITY

  • 8

    Enumerate the steps in Security Inspection by PLAN ROUTE

    IDENTIFY PRIORITY AREAS, IDENTIFY THE SEQUENCE

  • 9

    Is generally defined as the state of being certain that adverse effects will not be caused by some agent under the fine conditions.

    SAFETY

  • 10

    it means freedom from danger, risk, or injury. it involves measures (people, procedures, or equipment) used to prevent or detect and abnormal condition that can endanger people, property, or the enterprise. this of normal conditions include accidents caused by human carelessness, inattentiveness, lack of training or other unintentional events.

    SAFETY INSPECTION

  • 11

    Enumerate The objectives of Safety Inspection

    TO SAVE LIFES, TO SECURE PROPERTIES, TO RESTORE THE AFFECTED FACILITY AS SOON AS POSSIBLE

  • 12

    Enumerate the 4 Steps in SAFETY INSPECTION

    PREPARATION, EQUIPMENT, PLAN ROUTE, INSPECTION PATTERN

  • 13

    Enumerate the Steps in SAFETY INSPECTION According to PREPARATION

    PLAN, REVIEW, STUDY, OUTLINE

  • 14

    Enumerate the Steps in SAFETY INSPECTION According to EQUIPMENT

    HARD HAT, PENCIL/BALLPEN, GOGGLES

  • 15

    Enumerate the Steps in SAFETY INSPECTION According to PLAN ROUTE

    HAVE A DEFINITE OBJECTIVE, FOLLOW THE PATTERN

  • 16

    Enumerate the Steps in SAFETY INSPECTION According to INSPECTION PATTERN

    GENERAL CONDITIONS, SPECIFIC HAZARDS, WORK PRACTICES, HOW WORK IS DONE

  • 17

    🎯 Assess the overall security policies in place. Review the organization's security training programs. 🎯 Evaluate emergency response plans and drills. 🎯 Check for compliance with relevant regulations.

    GENERAL ENVIRONMENT OPERATION

  • 18

    🎯 Inspect fencing for integrity and height. 🎯 Ensure gates are secure and monitored. 🎯 Review access control measures (ID checks, badges). 🎯 Assess the effectiveness of perimeter barriers.

    PERIMETER SECURITY

  • 19

    🎯 Check for visible security personnel during all shifts. 🎯Evaluate the effectiveness of landscaping in hiding potential intruders. 🎯 Inspect for external hazards (lighting, debris). 🎯Review visitor access procedures.

    EXTERIOR SECURITY

  • 20

    🎯Assess lighting levels around the perimeter and entry points. 🎯Ensure lighting is functional and maintained. 🎯Check for coverage in parking lots and walkways.

    SECURITY LIGHTING

  • 21

    🎯 Inspect entry and exit points for security measures. 🎯 Evaluate the strength of doors, windows, and access points. 🎯 Review visitor access policies. 🎯 Check for signs of tampering or forced entry.

    BUILDING SECURITY

  • 22

    🎯Audit key distribution and tracking processes. 🎯 Ensure high-security locks are in place where necessary. 🎯 Check for unauthorized duplicates of keys. 🎯 Review procedures for lost or stolen keys.

    LOCKS AND KEY CONTROL

  • 23

    🎯Review identification processes for employees and visitors. 🎯 Ensure visitor logs are maintained and monitored. 🎯 Check employee access levels and permissions. 🎯Evaluate employee training on security protocols.

    EMPLOYEE AND VISITOR CONTROL

  • 24

    🎯 Assess guard training and qualifications 🎯 Review guard deployment and shift coverage. 🎯Evaluate incident reporting procedures. 🎯 Check for emergency response capabilities.

    THE SECURITY GUARD FORCE

  • 25

    🎯 Inspect the functionality of alarm systems (intrusion, fire). 🎯 Review alarm response protocols. 🎯 Ensure regular testing and maintenance are conducted. 🎯Check for false alarm rates and procedures to address them.

    ALARM SYSTEMS

  • 26

    🎯 Assess the placement and coverage of cameras. 🎯 Review recording capabilities and storage duration. 🎯 Ensure camera feeds are monitored in real- time. 🎯 Check for proper signage indicating surveillance.

    SURVEILLANCE SYSTEM

  • 27

    🎯 Evaluate internal communication systems for emergencies. 🎯 Check the effectiveness of alarm notifications. 🎯 Ensure clear protocols for reporting security incidents. 🎯 Review communication equipment (radios, phones) for functionality.

    COMMUNICATIONS

  • 28

    🎯 Review fire escape routes and exits. 🎯 Check fire extinguishers and alarms for compliance. 🎯Assess training for employees on fire safety procedures. 🎯Ensure regular fire drills are conducted.

    FIRE AND EMERGENCY PLANNING

  • 29

    🎯 Evaluate specific security procedures tailored to the facility. 🎯 Review incident response procedures. 🎯 Check for consistency in operational protocols.

    PROCEDURAL CONTROLS

  • 30

    🎯 Check for any additional security measures unique to the facility. 🎯Review feedback from employees regarding security concerns. 🎯Assess the overall security culture within the organization. 🎯Document and follow up on any identified vulnerabilities.

    MISCELLANEOUS