CCC Presentation (2007-2)
- 格式:ppt
- 大小:9.14 MB
- 文档页数:27
CCC认证中认可CB报告证书的技术要求1、引言CCC认证是对进入我国市场的部分商品强制性认证制度。
为了确保产品的质量和安全,我国质量认证中心(简称CQC)负责对申请CCC 认证的产品进行审核和认证。
在CCC认证中,CB报告证书是一种被我国认可的技术要求文件,下面将对CB报告证书的技术要求进行具体介绍。
2、CB报告证书的概念CB报告证书是指根据国际电工委员会(简称IEC)制定的CB Scheme所颁发的产品测试报告。
该报告证书显示了产品在CB Scheme成员国家的测试结果及认可信息。
CB Scheme是一个国际性的认证体系,通过该体系认证的产品能在成员国家自由流通,减少重复测试的成本,并且提高了产品在国际市场的竞争力。
3、CB报告证书的技术要求CCC认证要求向CQC提交产品的CB报告证书,以证明产品符合我国的技术标准和安全要求。
CB报告证书需要满足以下技术要求:- 测试合格性:CB报告证书必须展示产品在CB Scheme成员国家的测试结果,确保产品的质量和安全性符合国际标准。
- 有效性:CB报告证书须在规定的有效期内,证明测试结果在一定时间内有效。
- 全面性:CB报告证书需要详细罗列产品的测试项目和测试结果,并且应涵盖产品的所有技术要求,包括电气性能、防护等级、安全性能等。
- 真实性:CB报告证书必须是由经过认可的实验室出具,确保测试结果的真实可信。
- 完整性:CB报告证书应包括检验员签名和实验室盖章,并且应包含产品的详细信息和规格参数。
4、CB报告证书对CCC认证的意义通过提交CB报告证书,对于申请CCC认证的厂商而言具有诸多好处:- 简化流程:CB报告证书是国际通用的测试报告,可以减少重复测试的成本和时间,简化CCC认证的申请流程。
- 提升可信度:CB报告证书展示了产品在国际权威认证机构下的测试结果,能够增加产品的可信度和竞争力。
- 减少风险:CB报告证书减少了产品在技术测试环节中的风险,避免了因为测试不合格而导致的重复测试和延误时间的问题。
•China Compulsory Certification 的头三个字母什么是CCC什么是CCC 认证方式认证方式•型式测试(type testing)+首次工厂检查(initial factory inspection) + 例行工厂检查(follow-up inspection)•新的强制性产品认证目录(CCC)第1批目录涉及9个行业19类132种产品,/cnca/rdht/qzxcprz/rzml/images/20070123/994.htm“8、音视频设备类(不包括广播级音响设备和汽车音响设备)(共16种)”•CCC)自2002年5月1日起实施•旧制度(CCIB、CCEE)自2003年5月1日起废止•国家安全认证(CCEE )、进口安全质量许可制度(CCIB),中国电磁兼容认证(EMC )三合一为一(CCC )中国新的强制性产品认证制度(CCC)中国新的强制性产品认证制度(CCC)强制性产品认证标志-CCC标志强制性产品认证标志-CCC标志CCC标识CCC标识•认证标志的名称为“中国强制认证”(英文缩写“CCC”)•认证标志的图案由基本图案、认证种类标注组成•认证种类标注由代表认证种类的英文单词的缩写字母组成,如图二中的“S”代表安全认证, S & E代表安全认证加EMC•在认证合格的特殊产品(如电线、电缆)上可仅用“CCC”字样•只放一个CCC标志认证标志的使用•认证标识管理办法(颜色, 尺寸, 使用等规定)/cnca/rdht/qzxcprz/flfg/4717.shtml•认证标志的设计和使用必须符合相应规格和要求, 一般为白底黑色, CCC标志必须与标准尺寸成比例不可以改CCC标识.•使用CNCA 印制的标准尺寸的mark(要购买), 引在产品铭牌上或模压在产品上.•适用的产品范围:参照CCC产品目录•认证模式:形式试验+初始工厂检查+获证后监督•适用的国家标准和技术规则:安全和电磁兼容的要求•申请单元的划分:原则上按产品型号申请划分•申请所需材料:CB、电路图和总装图、关键元器件清单、规格书, 中文说明书、铭牌和警告标记,产品差异说明等,产品一致性声明(网上可下载), 企业组织机构代码证复印件•送样要求:原则上送具有代表性的型号•工厂审查的要求:工厂质量保证能力和产品一致性检查•跟踪检查的要求:同上,必要时抽样送检•CCC标志的使用:必须遵守有关CCC标志管理办法的规定CCC实施规则CCC实施规则申请所需材料•已有CB 报告,申请CCC可能会不要求重新做测试.•电气原理图和装配图(爆炸图)•关键元器件和材料清单以及相应的证书(写清楚厂家名, 型号名, 技术规格, 证书号等, 一旦列在报告里要更改要重新收费和评估, 可报备技术参数相同的元器件).•申请同一张证书中各个型号间的差异(认证机构可据此判断, 能不能放在一张证书上, 哪个型号是主要型号, 测试在哪个样品上进行等)•中文铭牌和说明书(备检查和实验操作指导).•产品一致性声明(网上可下载), 厂家要保证生产的产品和认证的产品是一致的, 否则要负法律责任.•企业组织机构代码证复印件, 商标的注册证明复印件,如商标非申请企业所有,应提供商标使用授权书原件怎样提交强制性产品认证申请?•申请人可以从访问中国质量认证中心的网站:,获取必要的信息、资料和表格,在线提交申请。
CCCcertificationdetailsUnofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 Ref. No. CNCA-00C-005DETAILED IMPLEMENTATION RULES FOR COMPULSORY PRODUCTS CERTIFICATIONRequirements for Factory Quality Assurance AbilityIssued on Jan. 2, 2014 Implemented on Sep.1, 2014Published by Certification and Acc reditation Administration of People’s Republicof ChinaUnofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 CONTENTS0. Introduction 3 1. Scope 32. Terms and Definitions 32.1 Director of certification technology ................................................................... 3 2.2 Conformity of certified products (conformity of products) .............................. 3 2.3 Routine test ......................................................................................................... 3 2.4 Verification test ................................................................................................... 3 2.5 Periodic verification test of key parts ................................................................ 3 2.6 Function check ..................................................................................................... 3 3. The quality assurance capability requirements of factory 4 3.1 Duties and resources ........................................................................................... 4 3.2 Documents and records ...................................................................................... 4 3.3 Purchasing and control of key parts .................................................................. 5 3.4 The production process control .......................................................................... 5 3.5 Routine inspection and/or verification test ....................................................... 6 3.6 Inspection and test equipment .......................................................................... 6 3.7 The control of unqualified products . (7)3.8 Internal quality audits ........................................................................................ 7 3.9 The changes and consistency control of certified products .............................. 7 3.10 Product protection and delivery ....................................................................... 7 3.11 CCC certificate and marks (8)Unofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 0. IntroductionBased on Regulations for Compulsory Products Certification , factories should control the consistency of the certified product and their quality assurance ability should keep the pace with certificationrequirements. The implementation rule is developed to set guidelines for factories to maintain quality assurance ability in accordance with certification requirements, whose products are listed in the catalogue of product subject to Compulsory Product Certification (hereinafter referred to as CCC certification).During the process of certification, factories should fully comply with this implementation rule, relevant implementation rules or detailed rules for product certification. With the aim ofmanufacturing products consistent with the type test sample, factories should develop quality assurance ability corresponding to product characteristics and manufacturing characteristics.Note: factories in the implementation rule refer to certification client, producers and production enterprises.1. ScopeThe implementation rule stipulates the basic requirements of factory quality assurance ability, which is also the certificationbasis for the factory inspection.2. Terms and Definitions2.1 Director of certification technologyDirector of certification technology will be producers and / or staff in factories, who master certification standards, confirm and approve the change of certified products and bear thecorresponding responsibility within the scope of duties specified by implementation rules or detailed implementation rules for product certification.2.2 Conformity of certified products (conformity of products)Certified products should be consistent with the type test samples, and the specific requirements of product conformity are specified by the implementation rule / the detailed implementation rule.2.3 Routine testTo eliminate defects caused by accidental factors in the production process, usually in the final stage of the production, there will be a 100% inspection of the certified products. Routine inspection allows the equivalent and fast methods which is certain after verified.Note: for special products, routine inspection can be implemented in the way of the samplinginspection according to the requirements of product certification implementation rules/regulations.2.4 Verification testIt refers to the sampling inspection to verify whether the certified products conform to the standards of certification continually.2.5 Periodic verification test of key partsThe regular sampling inspection to verify the quality characteristics of key parts whether conform to the standards of certification /or the requirements of technology continually.Note: key parts refer to critical components, spare parts, raw materials, etc. which play a significant role to promote products to meet the standards of certification.2.6 Function checkUnofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 The examinations to judge the expected function of the test instruments whether meet the specified requirements.3. The quality assurance capability requirements of factoryFor factories are the main body for the quality of the products, the quality assurance capability should meet the requirements of certification continually, the products should comply with the requirements of standards ,and they should ensure the certified products consistent with the type test samples. Factories should accept and cooperate with all kinds of factory spot inspections, market inspections, sampling inspections implemented by the certification body according to relevant products’certification implementation rules/regulations.3.1 Duties and resources 3.1.1 DutiesFactories should stipulate the responsibilities, authorities and mutual relations of all kinds of personnel related to the standards of certifications, and specify the quality director in themanagement of the organization to own the following responsibility and authority, no matter what role he plays in other aspects of the job:(a) To ensure that the requirements of this document get established effectively, implemented and maintained in the factory.(b) To ensure the consistency of the products and the compliance of products with standards. (c) Using of CCC certificates and marks properly ensure the state of the certificates printed CCC marks effective sustainably.Quality director should have the excellent ability to be competent for his job, and he can act as the authentication technology director.3.1.2 ResourcesFactories should be equipped with necessary production equipment, testing instruments and equipment to meet the stable production requirements of products that need to conform to the standards of certification. They should be equipped with corresponding human resources, to ensure that the staffs whose works have influence on the quality of products certification have the necessary capacity. They shall establish and maintain appropriate product manufacturing, testing experiment, storage and other necessary environment and facilities.For external resources which need to be used on the lease, factories should ensure that external resources can be got continually and used correctly. They should keep the relevant records of external resources, such as the contract agreement, usage records, etc.3.2 Documents and records3.2.1 Factories shall establish and maintain documented procedures to ensure that they can control documents required in this file, necessary external documents and records effectively. The standards or specifications of product design shouldn’t be lower than the standards of certification. For the main content that is likely to affect the product consistency, factories should have the necessary drawings, samples, key parts listings, process documents, work instructions and other design documents ,and ensure them effective continually.3.2.2 Factories shall ensure the files adequate and suitable, and use effective version of files.3.2.3 Factories should ensure the records clear, complete and traceable, as the evidences that prove products conform to specification and requirements. The retention period of records related to theUnofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 quality should meet the requirements of laws and regulations, and ensure that the records after the previous record can be got at least 24 months in this inspection.3.2.4 Factories should recognize and save important documents and quality information related to product certification, such as the type test report, factory inspection result, CCC certificate status information (effective, suspension, revocation, cancellation, etc.), the authentication information of change approval, inspection reports on supervision and sampling, product quality complaints and processing results, etc.3.3 Purchasing and control of key parts 3.3.1 Purchasing ControlFor key parts purchased, factories should identify and make clear the technical requirements defined in the procurement document, the technical requirements should also ensure that the final product meets the certification requirements.Factories shall establish and maintain producer / production company directory that produce qualified key parts, and purchase from these companies. Factories should keep procurement, usage and other records, such as purchased material list, goods receipt, accounts and so on.3.3.2 The quality control of key parts3.2.2.1 Factories shall establish and maintain documented procedures, verify and/or inspect thetechnical requirements of purchasing key parts and save the related records when they replenish their stock.3.3.2.2 For quality characteristics of key parts purchased, factories should choose appropriate control mode to ensure that the mode can satisfy the technical requirements of the key parts continually and final products meet the certification requirements, and save the related records. The appropriate control mode includes:(a) The factory owns the CCC certificate or can certify voluntary products admitted by the compulsory certification of end products as a result, and ensure its certificate status effective.(b) For the key parts which don’t get the related certificate, its regular verification test should conform to the requirements of product certification implementation rules/regulations.(c) The factory itself makes control scheme, and the control effect is not lower than that of 3.3.2.2 (a) or (b).3.3.2.3 When purchasing key parts from dealers and traders, factories should take appropriate measures to ensure the consistency of purchasing key parts and meet the technical requirements continually.For the key components, components, subassembly, assembly, semi-finished products entrusted by the subcontractor, factories should control by the way of purchasing key parts, and ensure that the entrusted products could meet specified requirements continually. For homegrown key parts, factories should control according to 3.4.3.4 The production process control3.4.1 Factories should identify the process which influences the quality certification (hereinafterreferred to as the key process) to ensure that key process complies with the specified requirements. The key process operators shall have the corresponding ability. The control of the key process should ensure conformity of the products with the standard and product consistency. If there is no file to regulate the key process, it will not be able to ensure certificated products quality, factories should formulate the corresponding working instruction to make the production process controlled.Unofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔3.4.2 If there are requirements for environmental conditions in production process, the factory shall ensure that working conditions meet the specified requirements.3.4.3 When necessary, the factory should deal with appropriate process parameters monitoring and measurement.3.4.4 The factory shall establish and maintain the equipment maintenance system to ensure that the equipment's ability could meet the production requirements continually.3.4.5 When necessary, factories should inspect, monitor and measure the products andcharacteristics of products in the appropriate stages of production according to the specified requirements to ensure conformity of the products with the standards and product consistency.3.5 Routine inspection and/or verification testThe factory shall establish and maintain documented procedures to control routine inspection and/or confirmation of final products. Testing procedures shall conform to the requirements of the regulations, and the content of the program should include the inspection frequency, program, content, methods, judgments, etc. The factory should implement and keep relevant inspection records.For the inspection entrusted by external institutions, the factory should ensure that the ability of external agencies meet the inspection requirements, and save the evaluation results of relevant ability, such as laboratory accreditation certificate, etc.3.6 Inspection and test equipment 3.6.1 Basic requirementsFactory shall be equipped with adequate inspection and test equipment to ensure the capacity of equipment used in the procurement, equipment manufacturing, and other aspects of the finalinspection and test meets the requirements of inspection and test in the mass production of certified products.Inspection and test personnel should be able to use the equipment properly, and master inspection and testing requirements and implement effectively.3.6.2 Calibration, verificationThe inspection and test equipment used to determine the certified products whether meet the specified requirements should be calibrated or verified according to a prescriptive cycle, andcalibration or test cycle can be set by the frequency of using the equipment, the previous calibration conditions, etc. For the internal calibration, the factory should regulate calibration method,acceptance criteria, calibration cycle etc. Calibration or verification shall be traceable to national or international standards. The calibration or verification status of equipment shall be easily used and identified by management personnel. The factory shall maintain the calibration or test records of equipment.For the calibration or verification activities entrusted by external agencies, the factory should ensure that the ability of externalagencies meets the requirements of calibration or verification, and save the relevant evaluation results of the ability. Note: For the critical monitoring measuring device used in the process control of production, factories should manage based on product certification Implementing Rules / Regulations.Unofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔3.6.3 Function testWhen necessary, factories should implement function test for routine test equipment according to the requirements. When the results of function test cannot meet the requirements, factories should be able to trace back to those tested products. When necessary, factories should recheck theseproducts. Factories should stipulate the measure which should be taken when instrument equipment failure.Factories should save function inspection result and the records of measures taken when instrument equipment failure.3.7 The control of unqualified products3.7.1 For the unqualified products found during procurement, manufacturing, inspection and other steps, identification, isolation, disposal measures should be taken to avoid the unintended use or delivery of unqualified products. The products after the reworking or repairing should be re-examined.3.7.2 For the unqualified information of certified products from the external, such as national and provincial supervision and checks, product recalls, customer complaints and so on, factories should analyze the causes of unqualified products, and take appropriate corrective action. Factories should maintain the unqualified information of certified products, cause analysis and treatment and corrective action records, etc.3.7.3 When the factory finds out that major quality problems exist in certified products (such asnational and provincial supervision and spot check is unqualified, etc.),it should notify the certification bodies promptly.3.8 Internal quality auditsThe factory shall establish a documented internal quality audit procedures to ensure the continuous compliance of the quality assurance ability of the factory, product consistency and compliance of the products with the standards. For the problems found during the audits, the factory should take appropriate corrective action and preventive measures. The factory shall maintain the results of internal quality audits.3.9 The changes and consistency control of certified productsThe factory shall establish and maintain documented procedures to control the changes that may affect the product consistency and compliance of the products with the standards (such as technology, production conditions, key parts and product structure, etc.), and program shouldconform to specified requirements. Only just the changes get the approval of certification body or the principal of authentication technology, they can be implemented, and the factory should keep the relevant records.The factory should control the product consistency from product design (design changes), process and resources, procurement, manufacturing, inspection, product protection and delivery and other applicable quality links, to ensure that the products conform to the requirements of the certified standards continually.3.10 Product protection and deliveryThe product protection implemented by factories in the procurement, manufacturing, inspection and other links, such as identification, handling, packaging, storage, protection, etc., should comply withUnofficial English translation offered by EuropElectro, for reference onlyIn Cooperation with: ZVEI, Frankfurt . ORGALIME, Brussels合作⽅: ZVEI, 法兰克福 . ORGALIME, 布鲁塞尔 the specified requirements. When necessary, factories should control the product delivery according to the specified requirements for process.3.11 CCC certificate and marksThe management and use of CCC certificates and marks shall conform to Regulations for Compulsory Products Certification , The measures for the administration of the compulsory product certification marks , etc. For standard CCC marks printed uniformly or using the way such as printing, molding, etc., factories should keep the usage records. For the following products, do not add CCC marks or release:(a) The products in the directory which lists the compulsory products that did not get a certification. (b) The unconfirmed products when they have changes after certificated although the changes need to be confirmed by the certification body.(c) The products that surpass the validity of certification.(d) The products listed on the certificates which has been suspended, revoked, cancelled. (e) The unqualified products.。
presentation讲稿Good morning/afternoon/evening, ladies and gentlemen/esteemed guests/colleagues,I would like to start by expressing my gratitude for giving me the opportunity to speak today. Today, I would like to discuss a topic that is crucial in our professional and personal lives - the art of effective presentations. Presentations play a vital role in many aspects of our lives, whether it is conveying information to clients, pitching ideas to colleagues, or even delivering an academic speech. A well-crafted and well-delivered presentation can make a lasting impact on our audience and achieve the desired goals. Therefore, in this discussion, I will outline some key elements and strategies for creating an impactful and successful presentation.1. Introduction:To begin, it is essential to grab the attention of the audience from the very start. You can achieve this by using a captivating opening statement, a thought-provoking question, or even a relevant anecdote. The introduction should clearly state the purpose of the presentation and provide a brief overview of what will follow.2. Structure:A well-structured presentation helps convey information in a logical and organized manner. The body of the presentation should be divided into clear sections or key points, emphasizing the main ideas. Each section should flow seamlessly into the next, making it easy for the audience to follow along.3. Visual Aids:Utilizing visual aids can significantly enhance the impact of a presentation. Graphics, images, charts, and videos can engage the audience visually and provide a deeper understanding of the content. However, it is crucial to use visual aids sparingly, ensuring they support the information being conveyed rather than distract from it.4. Engaging Content:The content of your presentation should be engaging and relevant to your audience. It is essential to understand their needs, interests, and expectations. Tailoring your message to meet their specific requirements will help capture their attention and maintain their interest throughout the presentation.5. Clear and Concise Language:Using clear and concise language is key to ensuring that your message is effectively communicated. Avoid jargon or technical terms that your audience may not understand. Instead, opt for simple and straightforward language that everyone can comprehend. Additionally, using appropriate transitions and linking words will help the presentation flow smoothly.6. Verbal Delivery:Aside from the presentation content, your delivery style plays a critical role in engaging the audience. Speak with confidence, varying your tone and pace to maintain interest. Maintain eye contact with the audience, addressing them as individuals rather than merely reading from prepared notes.Additionally, practice your presentation beforehand to ensure a smooth and confident delivery.7. Body Language:Non-verbal communication is just as important as verbal communication. Your body language can portray confidence, enthusiasm, and credibility. Stand tall and use hand gestures naturally to emphasize key points. Move around the stage or designated speaking area to create a sense of energy and captivate the audience's attention.8. Q&A and Interaction:Allocate time for questions and answers at the end of your presentation. Encourage audience participation and be prepared to respond thoughtfully and confidently. Engaging in a dialogue with your audience not only clarifies any doubts but also builds credibility and rapport.9. Conclusion:The conclusion is an opportunity to summarize the main points of your presentation and leave a lasting impression on the audience. It is essential to re-emphasize the key messages and ensure they resonate with the audience. Ending with a memorable quote or a call to action can inspire the audienceto take the desired steps.To conclude my presentation, I would like to emphasize that preparing and delivering an effective presentation requires careful planning, practice, and a keen understanding of the audience. By implementing the strategies discussed today, you can enhance the impact of your presentations and achieve successful outcomes.Thank you for your time and attention. I would be delighted to answer any questions you may have.。
3C认证授课讲义3C认证授课讲义各位领导、同志们:下午好今天根据局领导的安排,让我来给大家讲讲3C认证的有关知识,去年是3C认证执法的重点,大家通过去年的学习和执法,对3C认证的知识都比较了解和熟悉。
我今天在这里主要就是把去年7月份,局里安排我和五科的梁科长、六科的赵科长参加省局组织的强制性认证执法培训班的情况给大家作一汇报,共大家参考,有汇报不全面和有错误的地方请梁科长、赵科长及同志们作补充和指正。
培训班的时间为2004年7月14日—16日共三天的时间。
在培训班上由省局认证处的范钦楠处长对《认证认可条例》、国家和省局的有关3C认证内容文件的基本内容作了介绍,同时也把强制性产品认证制度实施情况、强制性产品认证行政执法应把握的几个原则作了介绍,对如何做好下一步强制性产品认证执法工作提出了要求;由省局检验研究院的高级工程师林蓝波、王锋、张继斌分别对电线电缆、家电类、电焊机等产品的3C认证的知识作了介绍;山东低压电器检测站烟台站的主任董强把低压电器3C认证知识作了介绍;省稽查局执法科长介绍了3C认证的执法工作目前的状况;由省局监察室主任给我们讲了廉政建设课。
由于时间关系,下面我就把培训中有关情况给大家作一汇报,汇报中,如有不当之处,请领导和同志们批评指正。
一、强制性产品认证和生产许可证的区别1、强制性产品虽没经认证,但可以生产。
生产后只能放在仓库里,不能销售。
而生产许可证的产品就和强制性产品不一样,它无证就不能生产。
3C认证是中介机构的行为,而生产许可证是政府行为。
二、3C行政执法的主体根据《认证认可条例》和国家质检总局和国家认监委2003年的联合发文《关于实施认证行政处罚有关问题的通知》(国质检认联[2003]443号),认证认可行政执法的主体是:国家认监委和地方质检部门。
在3C行政执法工作中做到,既按法定职责,又能互通信息,通力合作,加强3C行政执法工作的有效性、统一性,确保3C行政执法工作健康、有序地进行。
Physical SecurityYour quiz results:1.Question: 339 | Difficulty: 5/5 | Relevancy: 3/3Crime Prevention Through Environmental Design (CPTED) is adiscipline that:o Outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.o Outlines how the proper design of the logical environment can reduce crime by directly affecting human behavior.o Outlines how the proper design of the detective control environment can reduce crime by directly affecting human behavior.o Outlines how the proper design of the administrative controlenvironment can reduce crime by directly affecting human behavior.A. Crime Prevention Through Environmental Design (CPTED) is a discipline thatoutlines how the proper design of a physical environment can reduce crime bydirectly affecting human behavior. It provides guidance in lose and crimeprevention through proper facility contruction and evnrionmental compoents and procedufesFrom: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rdEdition, McGraw-Hill/Osborne, 2005, page 344.Contributed by Mike Young, CISSP, November 9, 2007.Comment:This is a physical security question designed to familarize the test taker with theCPTED concept. Some other sources are://Contributor: Jane E. MurleyStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Site Selection, Facility Design, and Configuration2.Question: 1199 | Difficulty: 5/5 | Relevancy: 3/3The Physical Security domain focuses on three areas that are the basis to physically protecting an enterprise's resources and sensitive information. Which of the following is not one of these areas?o Threatso Countermeasureso Vulnerabilitieso RisksB. The correct answer is:CountermeasuresCountermeasures are used to mitigate the risks, threats, and vulnerabilities and are not areas that are protected.Security is very important to organizations and their infrastructures, and physical security is no exception. Physical security encompasses a different set of threats, vulnerabilities, and risks than the other types of security that have been addressed so far. Physical security mechanisms include site design and layout,environmental components, emergency response readiness, training, accesscontrol, intrusion detection, and power andfire protection. Physical securitymechanisms protect people, data, equipment, systems, facilities, and a long list of company assets.Last modified 10/17/2007 - J. HajecThanks to crusador0407 and vijayu for providing feedback to help clarify this question.Comment:References:AIOv3 Physical Security (pages 337 - 345)OIG CBK Physical Security (pages 281 - 285)Contributor: Nick MackovskiStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topics (2):Risk management, Physical security controls3.Question: 345 | Difficulty: 1/5 | Relevancy: 3/3A prolonged complete loss of electirc power is a:o brownouto blackouto surgeo faultB. A prolonged power outage is a blackout.From: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rd.Edition McGraw-Hill/Osborne, 2005, page 368.Edited November 9, 2007 by Mike Young, CISSPContributor: Jane E. MurleyStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Power considerationsThis question © Copyright 2003–2006 Jane E. Murley, .4.Question: 1208 | Difficulty: 2/5 | Relevancy: 3/3The ideal operating humidity range is defined as 40 percent to 60 percent. Low humidity (less than 40 percent) can produce what type of problem on computer parts?o Static electricityo Electro-platingo Energy-platingo Element-platingA. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 333.Contributor: Nick MackovskiStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:HVAC considerationsThis question © Copyright 2003–2006 Nick Mackovski, .5.Question: 1363 | Difficulty: 1/5 | Relevancy: 3/3Which fire class can water be most appropriate for?o Class A fireso Class B fireso Class C fireso Class D firesA. Water is appropriate for class A (common combustibles) fires. Class B fires(liquid) are best handled by CO2, soda acid or Halon. Class C fires (electrical) are best handled by CO2 and Halon. Fire class D is used for combustible metals like magnesium.Source: WALLHOFF, John, CBK#10 Physical Security (CISSP Study Guide), April 2002 (page 3). Available at .Last modified 07/02/2007, Ron HehemannContributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Christian Vezina, .6.Question: 1364 | Difficulty: 3/5 | Relevancy: 3/3Critical areas should be lighted:o Eight feet high and two feet out.o Eight feet high and four feet out.o Ten feet high and four feet out.o Ten feet high and six feet out.A. Lighting should be used to discourage intruders and provide safety forpersonnel, entrances, parking areas and critical sections. Critical areas should be illuminated 8 feet high and 2 feet out.Source: WALLHOFF, John, CBK#10 Physical Security (CISSP Study Guide), April 2002 (page 4). Available at .Last modified 07/02/2007, Ron HehemannContributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Physical security controlsThis question © Copyright 2003–2006 Christian Vezina, .7.Question: 338 | Difficulty: 2/5 | Relevancy: 3/3Which of the following is not a physical control for physical security?o lightingo fenceso trainingo facility construction materialsC. Some physical controls include fences, lights, locks, and facility constructionmaterials. Some administrative controls include facility selection and construction, facility management, personnel controls, training, and emergency response and procedures.From: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 3rd. Ed., Chapter 6, page 403.Edited August 8, 2007, Mike Young, CISSPContributors:Jane E. Murley, don murdochStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Physical security controlsThis question © Copyright 2003–2006 Jane E. Murley, .8.Question: 1206 | Difficulty: 4/5 | Relevancy: 3/3In a dry pipe system, there is no water standing in the pipe - it isbeing held back by what type of valve?o Relief valveo Emergency valveo Release valveo Clapper valveD. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 336.And: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: GOLD EDITION, John Wiley & Sons, 2002, page 471.Contributors:Nick Mackovski, Patrick TongeStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Nick Mackovski, .9.Question: 238 | Difficulty: 5/5 | Relevancy: 3/3Which of the following is NOT a type of motion detector?o photoelectric sensor.o Passive infrared sensors.o Microwave.o Ultrasonic.A. The correct answer is:photoelectric sensor.A photoelectric sensor does not directly sense motion there is a narrow beam thatwon't set off the sensor unless broken. Photoelectric sensors, along with dry contact switches, are a type of perimeter intrusion detector.All of the other answers are valid types of motion detectors.There are basically three types of sensors used in motion detectors spectrum.Passive infrared sensors, Microwave, and Ultrasonic.Last Modified 08/27/2007 J. HajecThanks to David Ellis for providing feedback to improve this question.Comment:References:/wiki/Motion_detectorContributor: Eric YandellStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Motion detectors, sensors, and alarmsThis question © Copyright 2003–2006 Eric Yandell, .10.Question: 1617 | Difficulty: 5/5 | Relevancy: 3/3To be in compliance with the Montreal Protocol, which of thefollowing options can be taken to refill a Halon flooding system in the event that Halon is fully discharged in the computer room?o Order an immediate refill with Halon 1201 from the manufacturer.o Contact a Halon recycling bank to make arrangements for a refill.o Order a different chlorofluorocarbon compound from themanufacturer.o Order an immediate refill with Halon 1301 from the manufacturer.B. Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.Available at .Comment:The Montreal Protocol controls on the production of ozone-depleting substances such as HALON and restricts its production and use.References:/ozone/pdfs/Montreal-Protocol2000.pdfContributor: Hal TiptonStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Hal Tipton, .11.Question: 178 | Difficulty: 1/5 | Relevancy: 3/3Under what conditions would the use of a Class C fire extinguisher be preferable to a Class A extinguisher?o When the fire involves paper productso When the fire is caused by flammable productso When the fire involves electrical equipmento When the fire is in an enclosed areaC. Source: KRUTZ, Ronald L. & VINES, RusselD., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical security (page 335).Contributor: Donnie SaundersStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 .12.Question: 344 | Difficulty: 2/5 | Relevancy: 3/3A prolonged high voltage is a:o spikeo blackouto surgeo faultC. A prolonged high voltage is a surge.From: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rd.Edition McGraw-Hill/Osborne, 2005, page 368.Edited November 9, 2007 by Mike Young, CISSPContributor: Jane E. MurleyStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Power considerationsThis question © Copyright 2003–2006 Jane E. Murley, .13.Question: 1202 | Difficulty: 5/5 | Relevancy: 3/3If the floor is a concrete slab, the concerns are the physical weight it can bear and its fire rating. Known as loading, this type of floormust be capable of a live load of?o250 pounds per square footo150 pounds per square footo350 pounds per square footo450 pounds per square footB. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 329.Contributor: Nick MackovskiStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Facility RequirementsThis question © Copyright 2003–2006 Nick Mackovski, .14.Question: 1175 | Difficulty: 4/5 | Relevancy: 3/3Which of the following fire extinguishing systems is currently the most recommended water system for a computer room?o Wet pipeo Dry pipeo Delugeo PreactionD. The preaction system combines both the dry and wet pipe systems, by firstreleasing the water into the pipes when heat is detected (dry pipe), then releasing the water flow when the link is the nozzle melts (wet pipe). This allows manual intervention before a full discharge of water on the equipment occurs. This iscurrently the most recommended water system for a computer room.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical security (page 336).Contributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Christian Vezina, .15.Question: 1176 | Difficulty: 4/5 | Relevancy: 3/3What fence height will stop a determined intruder?o3' to 4' high.o6' to 7' high.o8' high and above with strands of barbed wire.o No fence can stop a determined intruder.D. Although an 8' high fence with strands of barbed wire is likely to deter mostintruders, a fence in itself cannot stop a determined intruder.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical security (page 340).Contributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Physical security controlsThis question © Copyright 2003–2006 Christian Vezina, .16.Question: 348 | Difficulty: 4/5 | Relevancy: 3/3Because ordinary cable introduces a toxic hazard in the event of fire, special cabling is required in a separate area provided for aircirculation for heating, ventilation, and air-conditioning (sometimes referred to as HVAC) and typically provided in the space between the structural ceiling and a drop-down ceiling. This area is referred to as the:o smoke boundry areao fire detection areao Plenum areao Intergen areaC. In building construction, a plenum (pronounced PLEH-nuhm, from Latinmeaning full) is a separate space provided for air circulation for heating,ventilation, and air-conditioning (sometimes referred to as HVAC) and typically provided in the space between the structural ceiling and a drop-down ceiling. A plenum may also be under a raised floor. In buildings with computer installations, the plenum space is often used to house connecting communication cables.Because ordinary cable introduces a toxic hazard in the event of fire, specialplenum cabling is required in plenum areas.Source:/sDefinition/0,,sid80_gci213716,00.html Contributed November 9, 2007 by Mike Young, CISSPComment:Addtional resources:HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rd Edition,McGraw-Hill/Osborne, 2005, page 377.Contributors:Jane E. Murley, Scot HartmanStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Jane E. Murley, .17.Question: 342 | Difficulty: 2/5 | Relevancy: 3/3A momentary high voltage is a:o spikeo blackouto surgeo faultA. A momentary high voltage is a spike.From: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rd.Edition McGraw-Hill/Osborne, 2005, page 368.Edited by Mike Young, CISSPContributor: Jane E. MurleyStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Power considerationsThis question © Copyright 2003–2006 Jane E. Murley, .18.Question: 1366 | Difficulty: 4/5 | Relevancy: 3/3What static charge is able to cause disk drive data loss?o550 voltso1000 voltso1500 voltso2000 voltsC. A static charge of 1500 volts is able to cause disk drive data loss. A charge of1000 volts is likely to scramble monitor display and a charge of 2000 volts can cause a system shutdown. It should be noted that charges of up to 20,000 volts or more are possible under conditions of very low humidity with non-static-free carpeting.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical Security (page 333).Last modified 07/02/2007, Ron HehemannContributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:HVAC considerationsThis question © Copyright 2003–2006 Christian Vezina, .19.Question: 1201 | Difficulty: 3/5 | Relevancy: 3/3The environment that must be protected includes all personnel,equipment, data, communication devices, power supply and wiring.The necessary level of protection depends on the value of the data, the computer systems, and the company assets within the facility.The value of these items can be determined by what type of analysis?o Critical-channel analysiso Covert channel analysiso Critical-path analysiso Critical-conduit analysisC. Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide,McGraw-Hill/Osborne, 2001, Page 281.Contributor: Nick MackovskiStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Critical path analysisThis question © Copyright 2003–2006 Nick Mackovski, .20.Question: 1200 | Difficulty: 3/5 | Relevancy: 3/3Physical security is accomplished through proper facilityconstruction, fire and water protection, anti-theft mechanisms,intrusion detection systems, and security procedures that areadhered to and enforced. Which of the following is not a component that achieves this type of security?o Administrative control mechanismso Integrity control mechanismso Technical control mechanismso Physical control mechanismsB. Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide,McGraw-Hill/Osborne, 2001, Page 280.Contributors:Nick Mackovski, Don GalarowiczStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Physical security controlsThis question © Copyright 2003–2006 Nick Mackovski, .21.Question: 1055 | Difficulty: 4/5 | Relevancy: 3/3Which of the following related to physical security is not considereda technical control?o Access controlso Intrusion detectiono Fire detection and suppressiono Library Control SystemsC. All of the above are considered technical controls except for locks, which arephysical controls.Administrative, Technical, and Physical Security ControlsAdministrative security controls are primarily policies and procedures put into place to define and guide employee actions in dealing with the organization'ssensitive information. For example, policy might dictate (and procedures indicate how) that human resources conduct background checks on employees with access to sensitive information. Requiring that information be classified and the process to classify and review information classifications is another example of anadministrative control. The organization security awareness program is anadministrative control used to make employees cognizant of their security roles and responsibilities. Note that administrative security controls in the form of a policy can be enforced or verified with technical or physical security controls. For instance, security policy may state that computers without antivirus softwarecannot connect to the network, but a technical control, such as network access control software, will check for antivirus software when a computer tries to attach to the network.Technical security controls (also called logical controls) are devices, processes, protocols, and other measures used to protect the C.I.A. of sensitive information.Examples include logical access systems, encryptions systems, antivirus systems, firewalls, and intrusion detection systems.Physical security controls are devices and means to control physical access to sensitive information and to protect the availability of the information. Examples are physical access systems (fences, mantraps, guards), physical intrusiondetection systems (motion detector, alarm system), and physical protectionsystems (sprinklers, backup generator). Administrative and technical controls depend on proper physical security controls being in place. An administrativepolicy allowing only authorized employees access to the data center do little good without some kind of physical access control.From the websiteLast modified 10/19/2007 - J. HajecA special thanks to ukhant for providing feedback to improve this question. (notto mention crusador0407 who initially doubted the answers previously provided) Comment:References:/library/2770/resources/whitepaper/operations/207.phpContributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topics (2):Technical physical security controls, Physical securitycontrolsThis question © Copyright 2003–2006 Christian Vezina, .22.Question: 234 | Difficulty: 5/5 | Relevancy: 3/3Which of the following suppresses the fuel supply of the fire?o soda acido CO2o Halono waterA. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, page 335.It must be noted that Halon is now banned in most country or cities.Contributor: Eric YandellStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Fire and smoke detection and suppression systemsThis question © Copyright 2003–2006 Eric Yandell, .23.Question: 1429 | Difficulty: 3/5 | Relevancy: 3/3Which of the following questions is less likely to help in assessing physical and environmental protection?o Are sensitive data files encrypted on all portable systems?o Are deposits and withdrawals of tapes and other storage media from the library authorized and logged?o Are computer monitors located to eliminate viewing by unauthorized persons?o Are procedures in place to determine compliance with password policies?D. Physical security and environmental security are part of operational controls,and are measures taken to protect systems, buildings, and related supportinginfrastructures against threats associated with their physical environment.All the choices above are useful in assessing physical and environmentalprotection except for procedures regarding password policies, which areoperational controls related to data integrity.Source: SWANSON, Marianne, NIST Special Publication 800-26, Security Self-Assessment Guide for Information Technology Systems, November 2001 (Pages A-21 to A-24).Last modified 07/02/2007, Ron HehemannContributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topics (2):Humidity and environmental controls, Physical security controlsThis question © Copyright 2003–2006 Christian Vezina, .24.Question: 1529 | Difficulty: 5/5 | Relevancy: 3/3How should a doorway with automatic locks to a man-operatedinformation processing facility be configured?o It should be configured to be fail-secure.o It should be configured to be fail-safe.o It should have a door delay cipher lock.o It should not allow piggybacking.B. Access controls are meant to protect facilities and computers as well as people.In some situations, the objectives of physical access controls and the protection of people's lives may come into conflict. In theses situations, a person's life always takes precedence. Many physical security controls make entry into and out of a facility hard, if not impossible. However, special consideration needs to be taken when this could affect lives. In an information processing facility, different types of locks can be used and piggybacking should be prevented, but the issue here with automatic locks is that they can either be configured as fail-safe or fail-secure. Since there should only be one access door to an information processing facility, the automatic lock to the only door to a man-operated room must beconfigured to allow people out in case of emergency, hence to be fail-safe(sometimes called fail-open), meaning that upon fire alarm activation or electric power failure, the locking device unlocks. This is because the solinoid thatmaintains power to the lock to keep it in a locked state fails and thus opens or unlocks the electronic lock. Fail Secure works just the other way. The lock device is in a locked or secure state with no power applied. Upon authorized entry, a solinoid unlocks the lock temporarily. Thus in a Fail Secure lock, loss of power of fire alarm activation causes the lock to remain in a secure mode.Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 6: Physical Security (pages 318, 330).Contributors:Christian Vezina, Roy MellingerStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topics (2):Facility Requirements, Physical security controlsThis question © Copyright 2003–2006 Christian Vezina, .25.Question: 1178 | Difficulty: 3/5 | Relevancy: 3/3Which of the following protection devices is used for spot protection within a few inches of the object, rather than for overall roomsecurity monitoring?o Wave pattern motion detectorso Capacitance detectorso Field-powered deviceso Audio detectorsB. Capacitance detectors monitor an electrical field surrounding the object beingmonitored. They are used for spot protection within a few inches of the object, rather than for overall room security monitoring used by wave detectors.Penetration of this field changes the electrical capacitance of the field enough to generate and alarm. Wave pattern motion detectors generate a frequency wave pattern and send an alarm if the pattern is disturbed as it is reflected back to its receiver. Field-powered devices are a type of personnel access control devices.Audio detectors simply monitor a room for any abnormal sound wave generation and trigger an alarm.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide:Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical security (page 344).Contributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) SecurityCovered topic:Motion detectors, sensors, and alarmsThis question © Copyright 2003–2006 Christian Vezina, .26.Question: 1530 | Difficulty: 3/5 | Relevancy: 3/3Which of the following is a proximity identification device that does not require action by the user and works by responding with anaccess code to signals transmitted by a reader?o A passive system sensing deviceo A transpondero A card swipeo A smart cardB. A transponder is a proximity identification device that does not require actionby the user. The reader transmits signals to the device and the device responds with an access code. These transponder devices contain a radio receiver andtransmitter, a storage place for the access code, control logic, and a battery. A passive device only uses the power from the reader to detect the presence of the card. Card swipes and smart cards are not proximity identification devices.Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 6: Physical Security (page 323).Contributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topic:Technical physical security controlsThis question © Copyright 2003–2006 Christian Vezina, .27.Question: 1365 | Difficulty: 4/5 | Relevancy: 3/3At which temperature does damage start occurring to magneticmedia?o100 degrees Fahrenheito125 degrees Fahrenheito150 degrees Fahrenheito175 degrees FahrenheitA. Magnetic media are affected from 100 degrees Fahrenheit. Disks are damagedat 150 degrees Fahrenheit, computer equipment at 175 degrees Fahrenheit, and paper products at 350 degrees Fahrenheit.Source: ROTHKE, Ben, CISSP CBK Review presentation on domain 10.Available at .Last modified 07/02/2007, Ron HehemannLast modified 09/23/2007 - J. HajecThanks to Robert Frink for providing feedback to improve the quality of thisquestion.Contributor: Christian VezinaStudy area:CISSP CBK domain #10 - Physical (Environmental) Security Covered topics (2):Fire and smoke detection and suppression systems, Sensitive information and media handlingThis question © Copyright 2003–2006 Christian Vezina, .28.Question: 1207 | Difficulty: 3/5 | Relevancy: 3/3The National Institute of Standards and Technology (NIST)standard pertaining to perimeter protection states that critical areas should be illuminated up to?。