PSC Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?

A built-in Lock

Define the term "risk" within the context of risks, threats, and vulnerabilities?

A measure of consequence of peril, hazard, or loss, which is incurred from a capable aggressor or the environment.

You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?

A padlock

Which of the following should you conduct to test the placement of IDS sensors?

Acceptance Test

Viewing individuals on a CCTV camera to grant or deny access to a facility?

Access Control

Which of the following is true of access control measures?

Access control is integral and interoperable part of DoD installation physical security programs. The installation commander/facility director is responsible for defining access control measures consistent with DoD policy.

What type of barrier is an automated barrier?

Active

Viewing a CCTV monitor to determine security force response to an alarm?

Alarm Assessment

Which of the following protective barriers would most likely be utilized for its decorative appeal?

Although decorative, a concrete planter can serve as a protective barrier by preventing vehicle access.

Briefly describe the elements of a restricted area?

An area (land, sea, or air) in which there are special restrictive measures employed to prevent or minimize incursions and/or interference, or where special security measures are employed to prevent unauthorized entry. Restricted areas must be authorized by the installation/activity commander/director, properly posted, and employ physical security measures.

To be effective, clear zones should be free of which of the following?

An effective clear zone must be free of visual obstructions such as bushes.

Who is responsible for the installation's antiterrorism program?

Antiterrorism Officer

Which sensor is used on doors, roof hatches, and windows?

Balanced magnetic switch (BMS) / High security switch (HSS)

Can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fencing?

Barbed wire

A high-security facility requires an AACS that makes it extremely difficult to duplicate the user's form of verification for access. Which type of AACS is most appropriate for that facility?

Biometric

Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?

Buried Line Sensor

Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?

CI Support

Which of the following are access control systems?

Card Swipe System, Badge Exchange Program, Personal Recognition, Iris Scanning

Owned by a commercial firm and not usually located on the facility being monitored?

Central Station

Is a common type of perimeter fencing for DoD facilities?

Chain link fencing

Operating mechanism: interacts with the switching device to allow or deny entry?

Cylinder

Who is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility?

DCIP Officer

What reference governs the Certification and Accreditation (C&A) for storage of DoD collateral Classified Information Systems?

DODM 5200.01, DoD Information Security Program, Volume 3, Protection of Classified Information.

Adequate lighting improves the ability of security forces to detect intruders before they attack. Which of the following statements is false concerning lighting?

Dark surfaces, dirty surfaces, or surfaces painted with camouflage paint require more illumination.

Most common and informal oversight tool; immediate action taken to correct deficiencies?

Day-to-day Observations

When planning and/or responding to an emergency, with whom should coordination occur?

Depending on the situation, emergency planning and emergency response may require coordination with local, state, federal, and/or host country officials and organizations.

What is Enclaving?

Designating islands of extreme or high security within a sea of moderate security.

List five of the nine capabilities a security system must provide to achieve Security-in-Depth?

Deter, Detect, Identify, Track, Assess, Record, Communicate, Delay, Respond

True or False: Barbed wire is also known as razor wire?

False

True or False: Wireline DTM, which is good for most ESS data transmission needs, has a high bandwidth?

False

Which federal specification defines the manufacturing requirements for armory vault doors and security vault doors?

Federal Specification AA-D-600D, Door, Vault, Security.

What is the purpose of deploying glare projection?

Glare projection makes it difficult for potential intruders to see inside the area being protected.

Locking device: physically secures area or container?

Latch

The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?

Medium security padlock

Two security professionals, Brian and Melissa, are discussing certification and accreditation (C&A) for Storage of Classified DoD Information Systems. Brian says that the DoD Manual 5100.76M governs the C&A for Storage of Classified DoD Information Systems. Melissa says that Designated Accrediting Authority (DAAs) have the authority and responsibility for accreditation decisions.

Melissa is correct

Central point for collecting alarm status?

Monitoring station

Which of the following can be caused by an animal activating an IDS sensor?

Nuisance Alarm

Who analyzes threats to assets and their vulnerabilities?

OPSEC Officer

Which exterior IDS sensor is NOT vulnerable to bridging?

Open Terrain Sensor

Which exterior IDS sensor is also known as a line-of-sight sensor?

Open Terrain Sensor

Which of the following would best be described as a vulnerability?

Open, unattended installation gate

Which of the following does a physical security program aim to prevent unauthorized access to?

Personnel, Equipment, Installations, and Information

Who is charged with the management, implementation, and direction of all physical security programs?

Physical Security Officer/ Provost Marshal

Why are Physical Security Measures employed?

Physical security measures are security measures employed to prevent or reduce the potential for sabotage, theft, trespassing, terrorism, espionage, or other criminal activity.

The local police agency monitors a facility's alarms?

Police Connection

Receives change of state and transmits alarm?

Premise Control Unit (PCU)

Which AACS feature would you implement to facilitate egress from a controlled area?

REX Device

Responds to a physical stimulus?

Sensor/detector

What is the central and overriding objective for nuclear security?

The denial of unauthorized access, as outlined in National Security Presidential Directive-28.

Which of the following are true of master key systems?

The great grand master key opens all of the locks in the system. They are convenient for managers, but because of their inherent security risks, their use is discouraged.

What must occur for an individual to be provided access without an escort?

The individual must have been identity proofed and favorably vetted in accordance with applicable regulations.

Fencing has which of the following features for DoD compliance?

The steel mesh wire on a chain link fence should not be greater than 2 inches in diameter to be in compliance with DoD specifications.

What is Surface Lighting?

This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.

What is the True statement about continuous lighting?

Three primary methods of using continuous lighting are: glare projection, controlled lighting, and surface lighting. Continuous lighting consists of a series of fixed lights arranged to flood a given area continuously during darkness with overlapping cones of light.

What is the purpose of intrusion detection systems?

To detect unauthorized penetration into a secured area.

What is the primary purpose of continuous lighting?

To deter intruders

What is the primary purpose of a concrete Jersey barrier?

To help prevent unauthorized vehicle entry.

True or False: Cost and risk must always be considered when planning which physical security measures to use in a facility or installation?

True

Detects traces of explosive material?

Vapor Trace Detector

Portable equipment that detects metal objects?

Wand

When should I use Point Security?

When an individual resource requires individual protection.

Detects prohibited items?

X-ray machine

List the types of buildings that are exempt from certain DoD antiterrorism site design standards?

• Low occupancy buildings • Low occupancy family housing • Fisher houses • Town centers • Enhanced use leases • Transitional structures and spaces • Temporary and re-locatable buildings • Construction administration structures • Recruiting stations in leased spaces • Stand-alone gas stations and car care centers • Military protective construction (designed to NATO or equivalent standards) • Stand-alone franchised fast food operations • Stand-alone shoppettes, minimarts, and similarly-sized commissaries • Small stand-alone commercial, bank, and pharmacy facilities

What factors do DoD Components consider when determining security priority for weapons systems platforms?

• Mission • Location and vulnerability • Operational readiness • Value • Classification • Replacement costs

Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency?

(COOP) Continuity of Operations Plan

Comprehensive protective measures for an installation, facility, or activity?

(PSP) Physical Security Plan

Operational/administrative procedures for normal and emergency situations?

(SOP) Standard Operating Procedures

What can an AACS do to protect assets in a facility?

- Allow authorized personnel to enter a controlled area after verifying credentials - Assist in preventing unauthorized personnel from entering a controlled area - Communicate with CCTV for assessment purposes - Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts

Which of the following may contain a CCTV within the protected area?

- Arms room - Magazine

You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply?

- Do not write a combination down. - Do not change a lock's combination on a Friday or the day before you go on leave. - Change a lock's combination if the container is discovered unlocked and unattended. - Maintain records of who knows lock combinations. - Safeguard the combination at appropriate classification level.

Which of the following require(s) any system-associated cabling that extends beyond protected area perimeter to be installed in rigid conduit?

- SCIF - Top Secret/Secret collateral open storage area - Arms room - Magazine

Which of the following are considerations when planning for a DTM link?

- What is the bandwidth of each ESS subsystem being connected? - What level of security will be required? - Is there an uninterruptible power supply? - Can you use existing networks or will you need to create a new pathway?

You have received a request to add a CCTV system to a building on your installation. Which questions should you ask?

- Will the CCTV system be used inside or outside? - Will the CCTV system be used in a very well-lit area, in low lighting, or in the dark? - Are there any visual obstacles that might block the system from capturing clear images? - Will the system require a person to man the monitor at all times?

Briefly describe Security-in-Depth?

A determination by the senior agency official that a facility's security program consists of layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility.

What is manual access control?

A guard asking for the proper identification for entry

Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?

Anti-Passback

Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person's credential grants access?

Anti-Tailgating

Which of the following would best be described as a DoD asset?

Arms and Ammunition

A camera on the guard house is part of what type of physical security measure?

Closed Circuit Television (CCTV)

You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?

Coded

Switching device: authorizes the operating mechanism to open the lock?

Combination

Formal reviews conducted by senior officials in the chain-of-command?

Compliance Inspections

Often used as a temporary barrier when rolled out on the ground?

Concertina wire

If you overshoot your combination when dialing the S&G 2740 lock, what should you do?

Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number

Lighting which is continuously lit during hours of darkness?

Continuous Lighting

Which type of lighting is considered the most common?

Continuous lighting is the most common lighting.

Describe the four types of lighting systems used for security lighting?

Continuous lighting: A series of fixed lights arranged to continuously illuminate a given area. Standby lighting: Luminaires are either automatically or manually turned on at times when suspicious activity is detected by security personnel or an intrusion detection system. A standby system creates the impression of activity and may offer a deterrent value while also conserving energy. Emergency lighting: Emergency lighting is used during a power failure or when regular lighting is not available for any reason. This type of lighting depends on alternative power sources such as batteries or generators. Moveable lighting: Manually-operated searchlights that may be lighted during hours of darkness or as needed, and is normally used to supplement continuous or standby lighting.

Which consideration do you think was more important when selecting this type of fence for this installation? Cost or Appearance?

Cost

Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?

Credential

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. Now that the lock is powered and numbers appear on the LCD, what should you do?

Dial left to the number 27.

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed right to the second number, 4. The number 4 now appears on the LCD. What should you do next?

Dial left to the number 39.

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed left and the number 27 now appears on the LCD. What should you do next?

Dial right to the number 4.

List three policies or regulations that govern the DoD physical security program?

DoD 5200.08-Regulation Physical Security Program DoD Manual 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) DoD Manual 5105.21 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Physical Security, Visitor Control, and Technical Security

Security requirements for classified contracts are stated in?

DoD 5220.22M, NISPOM

The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents?

DoD AT Program

Who must approve all Intrusion Detection Equipment (IDE) installed on Open Storage Areas?

DoD Components approve Underwriters Laboratories' listed equipment.

What is the primary purpose of the CCTV physical security measure?

Documents authorized and unauthorized entry into a controlled area.

Who is responsible for issuing instructions governing the security of weapons systems within their inventory?

Each DoD Component head.

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. Now you need to open a security container that has an S&G 2740 lock. What type of lock is S&G 2740?

Electromechanical combination lock

Which types of locks are associated with Federal Specification FF-L- 2740 and are approved for storage of all types of classified materials, regardless of classification?

Electromechanical combination locks, which include the X-07, X-08, X-09, and S&G 2740, for classified material stored in security containers.

Back-up lighting used during power failures or other emergencies when normal systems are inoperative?

Emergency Lighting

Explain Security in Depth?

Facility planning, the use of barriers, fencing, signs, site lighting, and advanced technologies such as intrusion detection systems, closed circuit television (CCTV) and biometric entry control systems.

True or False: A DTM allows an automated access control system to communicate with a control center?

False

True or False: A wireless network is more secure than a hardwired network?

False

True or False: All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry?

False

True or False: An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS?

False

True or False: An advantage of CCTV is that environmental factors do not affect its performance?

False

True or False: Both the DIA and COCOMs issue FPCONs?

False

True or False: Emergency lighting depends upon the power supply of the utility company?

False

True or False: Flashlights are a reliable form of continuous lighting?

False

True or False: Installation commanders and facility directors issue DoD Terrorist Threat Levels?

False

True or False: Intrusion Detection Systems (IDS) prevent unauthorized entry?

False

True or False: It is essential to be consistent in all areas of the facility when it comes to security lighting?

False

True or False: Local alarm monitoring works best without another type of monitoring used in conjunction with it?

False

True or False: Police connection and central station monitoring generally require an increase in staffing at the facility being monitored?

False

True or False: Rapidly flowing rivers are considered active barriers?

False

True or False: Standby lighting is the type of lighting used when the primary power source fails?

False

True or False: The schedules for entry and exit inspections should be posted in view of all DoD personnel?

False

True or False: Threats against an asset are determined when you conduct a site survey?

False

You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?

Federal Specification FF-L-2740

Which of the following would best be described as a countermeasure?

Fence

Which exterior IDS sensor is usually the least expensive?

Fence Associated Sensor

Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information?

Force Protection

A system that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets?

Force Protection Conditions

List three examples of physical security threats?

Foreign intelligence services, Foreign military and paramilitary forces, Terrorists, Saboteurs, Criminals, Protest groups, Disaffected persons, Natural disasters

Which type of sensor would be most effective in protecting a permanently secured window?

Glass Break Sensor

Which of the following is considered an access control measure?

Identification Cards, Security Guards, Locks and Keys

List two reasons for which physical security programs should be tailored to local conditions?

In overseas areas, COCOMS may deviate from DoD policy where required by treaties, agreements, and arrangements with foreign governments and allied forces. Threats, vulnerabilities, and critical assets may vary.

Who is responsible for the safety of people and property under their command?

Installation Commander/ Facility Director

Define Security in Depth?

Integrating and using (layers) active and passive complimentary physical security measures together.

Who must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation?

Law Enforcement

Requires roving security forces?

Local Alarm

Which of the following would best be described as a risk?

Loss of life

Explain strengths and weaknesses of various types of padlocks?

Low security padlocks (also known as secondary padlocks) are used for deterrence purposes but provide minimal resistance to force. High security padlocks deploy a high security hasp, provide maximum resistance to unauthorized entry, and may be used to secure arms, ammunition, and explosives facilities.

What are the two basic systems to be used to provide practical and effective security lighting?

Low-level lighting is used on security personnel. Low contrast lighting helps security personnel to detect indistinct outlines of silhouettes.

Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity?

MOU/MOA

Which of the following must have vibration sensors on its walls to detect boundary penetration attempts?

Magazine

Fixed equipment that detects metal objects?

Magnetometer

Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program?

Management / Self-Inspections

Which of the following is NOT a physical security measure?

Marking classified documents.

Two security professionals, Brian and Melissa, are discussing the purpose of physical security. Brian says physical security is the branch of security that is only concerned with active measures designed to prevent unauthorized access. Melissa says that physical security aims to safeguard assets against espionage, sabotage, terrorism, damage, and criminal activity.

Melissa is correct

It's more difficult for intruders to scale?

Metal ornamental high security fencing

Which of the following is part of an acceptance test?

PCU Test

What type of barrier is a concrete Jersey barrier?

Passive

Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?

Passive Infared Sensor

Which of the following is a physical security measure?

Perimeter Fences, Security Guards, Alarm Systems

List three examples of Security-in-Depth?

Perimeter fence, Employee/visitor access control, Intrusion detection system, Random guard patrols, Closed circuit video monitoring

Roles and responsibilities for individual work areas such as checkpoints and guard gates?

Post Orders

A facility owns and operates the dispatch center and security forces?

Proprietary Station

You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control?

Protect keys and locks at the same level as classified information they are safeguarding. Maintain a key and lock register. Replace keys and locks if they are lost or compromised. Do not remove keys from certain premises. Do not create master keys. Appoint a key and lock custodian to ensure proper custody and handling of locks and keys. Inventory keys at each change of custody.

Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection?

Staff Assist Visits

Lighting illuminated manually or automatically when suspicious activity is detected or suspected by the security force, alarm system, or motion detector?

Stand-by Lighting

Monitoring a military exchange?

Surveillance

Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility?

Surveys

Which of the following would best be described as a threat?

Terrorist

Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests?

Terrorist Threat Levels

What is the role of the National Response Framework (NRF) for installation emergency management?

The NRF establishes clear objectives for a concerted national effort to prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other domestic emergencies. The NRF provides the structure and mechanism for a consistent, nationwide approach for federal, state, and local governments to effectively and efficiently work together to manage domestic incidents, regardless of cause, size, or complexity.

To whom should incidents involving stolen, lost, or recovered Arms, Ammunition, and Explosives (AA&E), which cause significant news coverage or have the potential to cause such coverage, be reported?

The Office of the Under Secretary of Defense for Intelligence.

The protection of DoD assets is accomplished through?

The application of active and passive complimentary physical security measures.

Which statement best describes the mission of security forces?

The mission of all government security forces, civilian or military, contract forces, and military working dogs is to protect DoD assets.

Describe the purpose of the 5200.08-R (Physical Security Program)?

The regulation implements DoD policies and provides minimum standards for the physical protection of DoD personnel, installations, operations, and related resources.

Which of the following statements are true of physical security planning and implementation?

The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets. Use of oversight tools is an important part of physical security implementation. Facility design must be considered in physical security planning. Physical security countermeasures must always be planned for when designing a facility.

What is Controlled Lighting?

This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.

What is Glare Projection?

This method is intended to make the inside of a protected area difficult to see from outside the protected area.

How do Security Measures ensure security?

To ensure security, the security measures must provide the capability to deter, detect, identify, track, assess, record, communicate, delay, and respond to unauthorized access activities.

When should I use Area Security?

To protect consolidated resources, such as an installation or facility.

What is the primary purpose of an Active barrier?

To stop vehicles for guard authorization

Which of the following require(s) a mechanical/automated access control system or visual recognition as the access control method?

Top Secret/Secret collateral open storage area

Assures communications between the alarmed area and the monitoring station?

Transmission Line Security

True or False: A CCTV camera may capture activity missed by security force personnel?

True

True or False: A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection?

True

True or False: A CCTV is only as good as the people who operate it?

True

True or False: Access control systems help to prevent unauthorized entry?

True

True or False: An ESS is a component of an overall physical protection system?

True

True or False: An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur?

True

True or False: Assets, threats, and vulnerabilities are all part of the risk calculation?

True

True or False: Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground?

True

True or False: CCTV can deter loss, theft, or misuse of government property and resources?

True

True or False: Certain types of lighting can incapacitate an intruder?

True

True or False: Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs?

True

True or False: Contract security forces may be either military or civilian?

True

True or False: Controlled lighting is used to illuminate the perimeter of a facility?

True

True or False: Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility?

True

True or False: Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area?

True

True or False: FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels?

True

True or False: Government security forces may be either military or civilian?

True

True or False: Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings?

True

True or False: Military working dogs can seek, detect, defend their handlers, and guard suspects?

True

True or False: Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines?

True

True or False: Proprietary station monitoring is the method used most by DoD installations?

True

True or False: Securing man-passable openings is one of the most overlooked physical security protective measures?

True

True or False: Software-based integration is the preferred DTM method for most projects?

True

True or False: Surface lighting helps to exaggerate the shadow of a potential intruder approaching a building?

True

True or False: Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions?

True

True or False: When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station?

True

True or False: While a security lighting system may deter unsophisticated criminals or vandals, the system alone may not be sufficient to deter sophisticated criminals or terrorists?

True

True or False: You must consider operational and maintenance costs of an ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset?

True

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. What should you do first?

Turn the dial left 4 to 6 turns.

You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed left to the third number, 39. The number 39 now appears on the LCD. What should you do next?

Turn the dial to the right to retract the lock.

Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?

Two-Person Rule

What is the reference that provides minimum construction requirements for fencing?

UFC 4-022-03, Security Fences and Gates

You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?

UFC, 4-021-02, Electronic Security Systems

You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced? use?

X-09 electromechanical lock

You need to secure classified information. Which of these locks could you use?

X-09 electromechanical lock La Gard 3330 mechanical lock S&G 8077 padlock

What type of ID would you most likely be required to show a guard at a DoD Military Access Control Point?

Your Common Access Card (CAC)

Define the two main types of electromechanical locks according to Federal Specification FF-L-2740B?

• Basic Self-Contained: Does not have external power source, external data transfer port, or ability to transfer data • Interoperable/Networked: Power source may be contained within and integral to lock assembly; power source may be replaceable; external data transfers shall meet FIPS standards; data transfers may be used to monitor authorized/unauthorized openings, personnel access, combination verification, and combination changes.

What are some of the considerations for selecting and implementing a particular intrusion detection system?

• Completeness of coverage • False and nuisance response rates • Probability of detection • Zone at which the alarm occurred

What are some examples of passive barrier systems?

• Concrete-filled bollard • Concrete median (also known as Jersey barrier) • King Tut block • Concrete planter • Excavations and ditches • Guardrails • Heavy equipment tires • Tire shredders • Steel cable barriers • Steel cable-reinforced chain link fencing • Reinforced concrete knee walls

Name examples of authorized locking devices used within the Department of Defense?

• Cylindrical locksets • Dead-bolt locksets • Drop-bolt locks • Padlocks • Mechanical push-button combination locks • Mechanical combination locks • Electro-mechanical combination locks • Warded locks • Pin tumbler locks

What are some of the considerations a physical security professional should take into account for controlling access?

• Escort qualifications, responsibilities, and authorizations • Sponsorship qualifications, responsibilities, and authorizations • Access privileges at each security level and each FPCON • Mission-essential employee designation, if applicable • Emergency response designation, if applicable • Day and time designation for access • Locations authorized for access

What are the four basic functional elements that must operate in an integrated and timely manner to achieve an overall effective security system that defeats design threats?

• Intrusion detection and access control sensors and/or guards • Threat assessment from guards and/or CCTV • Appropriately designed and located barriers • Responding guards

What are some of the exemptions to the DoD Antiterrorism Standards?

• Low occupancy buildings • Low occupancy family housing • Fisher houses • Town centers • Enhanced use leases • Transitional structures and spaces • Temporary and re-locatable buildings • Construction administration structures • Recruiting stations in leased spaces • Stand-alone gas stations and car care centers • Military protective construction (designed to NATO or equivalent standards) • Stand-alone franchised fast food operations • Stand-alone shopettes, minimarts, and similarly-sized commissaries • Small stand-alone commercial, bank, and pharmacy facilities

The DoD Antiterrorism Standards are applicable to which types of buildings?

• New construction • Existing buildings • Major investments • Change of occupancy level • Window replacement • Roadway improvement projects • Building additions • Leased buildings • Partial occupancy • National Guard buildings • Visitor centers and museums • Expeditionary structures

What are the three goals of the DoD Installation Emergency Management Program?

• Prepare DoD installations for emergencies • Respond appropriately to protect personnel and save lives • Recover and restore operations after an emergency

Define preparedness in the context of emergency management?

• Preparedness is the range of deliberate, critical tasks and activities necessary to build, sustain, and improve the operational capability to prevent, protect against, respond to, and recover from domestic incidents. Preparedness is a continuous process. • Preparedness involves efforts at all levels of government and coordination among government, private sector, and non-governmental organizations to identify threats, determine vulnerabilities, and identify required resources. Within the National Incident Management System, preparedness is operationally focused on establishing guidelines, protocols, and standards for planning, training and exercises, personnel qualification and certification, equipment certification, and publication management.

What are some of the primary uses of fencing?

• Provides a legal boundary by defining the outermost limit of a facility • Assists in controlling and screening authorized vehicle entries into a secured area by deterring overt entry elsewhere along the boundary • Supports detection, assessment, and other security functions by providing a "clear zone" for installing lighting, intrusion detection equipment, and CCTV • Deters "casual" intruders from penetrating into a secured area by presenting a barrier that requires over action to penetrate • Causes an intruder to make an overt action that will demonstrate intent

What are included as considerations during inspections of Arms, Ammunition, and Explosives (AA&E) storage facilities?

• Review of physical security measures and policy compliance • Review of existing deviations from policy • Review of suitability and screening of personnel with access to AA&E • Inventory and accountability procedures • Facility design and construction

At minimum, what should inspections of Arms, Ammunition, and Explosives (AA&E) storage facilities include?

• Review physical security measures and policy compliance • Review existing deviations from policy • Review suitability and screening of personnel with access to AA&E • Review inventory and accountability procedures • Facility design and construction

Before loss of Arms, Ammunition, and Explosives (AA&E) can be attributed to any inventory or accountability discrepancy, one must first determine the loss was not a result of what three factors?

• Theft • Abandonment • Misappropriation

What are the four considerations/ risk factors used for determining the security risk category (SRC) of sensitive conventional Arms, Ammunition, and Explosives (AA&E)?

• Utility • Casualty or damage risk • Adaptability risk • Portability risk


Ensembles d'études connexes

GenSpark Java Interview Questions

View Set

List the steps taken to preserve a crime scene

View Set

Basic Java Quiz (AP Computer Science in Java (Mocha))

View Set

Chapter 26- Face and Neck Injuries

View Set

Market Equilibrium and Policy SmartBook

View Set

Unit 4 Day 1 - Mood/Affect; Coping; Sexuality

View Set

UNIT #15: Insurance-Based Products

View Set

HI State Real Estate Practice Exam

View Set