PSC Study Guide
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
A built-in Lock
Define the term "risk" within the context of risks, threats, and vulnerabilities?
A measure of consequence of peril, hazard, or loss, which is incurred from a capable aggressor or the environment.
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
A padlock
Which of the following should you conduct to test the placement of IDS sensors?
Acceptance Test
Viewing individuals on a CCTV camera to grant or deny access to a facility?
Access Control
Which of the following is true of access control measures?
Access control is integral and interoperable part of DoD installation physical security programs. The installation commander/facility director is responsible for defining access control measures consistent with DoD policy.
What type of barrier is an automated barrier?
Active
Viewing a CCTV monitor to determine security force response to an alarm?
Alarm Assessment
Which of the following protective barriers would most likely be utilized for its decorative appeal?
Although decorative, a concrete planter can serve as a protective barrier by preventing vehicle access.
Briefly describe the elements of a restricted area?
An area (land, sea, or air) in which there are special restrictive measures employed to prevent or minimize incursions and/or interference, or where special security measures are employed to prevent unauthorized entry. Restricted areas must be authorized by the installation/activity commander/director, properly posted, and employ physical security measures.
To be effective, clear zones should be free of which of the following?
An effective clear zone must be free of visual obstructions such as bushes.
Who is responsible for the installation's antiterrorism program?
Antiterrorism Officer
Which sensor is used on doors, roof hatches, and windows?
Balanced magnetic switch (BMS) / High security switch (HSS)
Can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fencing?
Barbed wire
A high-security facility requires an AACS that makes it extremely difficult to duplicate the user's form of verification for access. Which type of AACS is most appropriate for that facility?
Biometric
Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?
Buried Line Sensor
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
CI Support
Which of the following are access control systems?
Card Swipe System, Badge Exchange Program, Personal Recognition, Iris Scanning
Owned by a commercial firm and not usually located on the facility being monitored?
Central Station
Is a common type of perimeter fencing for DoD facilities?
Chain link fencing
Operating mechanism: interacts with the switching device to allow or deny entry?
Cylinder
Who is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility?
DCIP Officer
What reference governs the Certification and Accreditation (C&A) for storage of DoD collateral Classified Information Systems?
DODM 5200.01, DoD Information Security Program, Volume 3, Protection of Classified Information.
Adequate lighting improves the ability of security forces to detect intruders before they attack. Which of the following statements is false concerning lighting?
Dark surfaces, dirty surfaces, or surfaces painted with camouflage paint require more illumination.
Most common and informal oversight tool; immediate action taken to correct deficiencies?
Day-to-day Observations
When planning and/or responding to an emergency, with whom should coordination occur?
Depending on the situation, emergency planning and emergency response may require coordination with local, state, federal, and/or host country officials and organizations.
What is Enclaving?
Designating islands of extreme or high security within a sea of moderate security.
List five of the nine capabilities a security system must provide to achieve Security-in-Depth?
Deter, Detect, Identify, Track, Assess, Record, Communicate, Delay, Respond
True or False: Barbed wire is also known as razor wire?
False
True or False: Wireline DTM, which is good for most ESS data transmission needs, has a high bandwidth?
False
Which federal specification defines the manufacturing requirements for armory vault doors and security vault doors?
Federal Specification AA-D-600D, Door, Vault, Security.
What is the purpose of deploying glare projection?
Glare projection makes it difficult for potential intruders to see inside the area being protected.
Locking device: physically secures area or container?
Latch
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
Medium security padlock
Two security professionals, Brian and Melissa, are discussing certification and accreditation (C&A) for Storage of Classified DoD Information Systems. Brian says that the DoD Manual 5100.76M governs the C&A for Storage of Classified DoD Information Systems. Melissa says that Designated Accrediting Authority (DAAs) have the authority and responsibility for accreditation decisions.
Melissa is correct
Central point for collecting alarm status?
Monitoring station
Which of the following can be caused by an animal activating an IDS sensor?
Nuisance Alarm
Who analyzes threats to assets and their vulnerabilities?
OPSEC Officer
Which exterior IDS sensor is NOT vulnerable to bridging?
Open Terrain Sensor
Which exterior IDS sensor is also known as a line-of-sight sensor?
Open Terrain Sensor
Which of the following would best be described as a vulnerability?
Open, unattended installation gate
Which of the following does a physical security program aim to prevent unauthorized access to?
Personnel, Equipment, Installations, and Information
Who is charged with the management, implementation, and direction of all physical security programs?
Physical Security Officer/ Provost Marshal
Why are Physical Security Measures employed?
Physical security measures are security measures employed to prevent or reduce the potential for sabotage, theft, trespassing, terrorism, espionage, or other criminal activity.
The local police agency monitors a facility's alarms?
Police Connection
Receives change of state and transmits alarm?
Premise Control Unit (PCU)
Which AACS feature would you implement to facilitate egress from a controlled area?
REX Device
Responds to a physical stimulus?
Sensor/detector
What is the central and overriding objective for nuclear security?
The denial of unauthorized access, as outlined in National Security Presidential Directive-28.
Which of the following are true of master key systems?
The great grand master key opens all of the locks in the system. They are convenient for managers, but because of their inherent security risks, their use is discouraged.
What must occur for an individual to be provided access without an escort?
The individual must have been identity proofed and favorably vetted in accordance with applicable regulations.
Fencing has which of the following features for DoD compliance?
The steel mesh wire on a chain link fence should not be greater than 2 inches in diameter to be in compliance with DoD specifications.
What is Surface Lighting?
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
What is the True statement about continuous lighting?
Three primary methods of using continuous lighting are: glare projection, controlled lighting, and surface lighting. Continuous lighting consists of a series of fixed lights arranged to flood a given area continuously during darkness with overlapping cones of light.
What is the purpose of intrusion detection systems?
To detect unauthorized penetration into a secured area.
What is the primary purpose of continuous lighting?
To deter intruders
What is the primary purpose of a concrete Jersey barrier?
To help prevent unauthorized vehicle entry.
True or False: Cost and risk must always be considered when planning which physical security measures to use in a facility or installation?
True
Detects traces of explosive material?
Vapor Trace Detector
Portable equipment that detects metal objects?
Wand
When should I use Point Security?
When an individual resource requires individual protection.
Detects prohibited items?
X-ray machine
List the types of buildings that are exempt from certain DoD antiterrorism site design standards?
• Low occupancy buildings • Low occupancy family housing • Fisher houses • Town centers • Enhanced use leases • Transitional structures and spaces • Temporary and re-locatable buildings • Construction administration structures • Recruiting stations in leased spaces • Stand-alone gas stations and car care centers • Military protective construction (designed to NATO or equivalent standards) • Stand-alone franchised fast food operations • Stand-alone shoppettes, minimarts, and similarly-sized commissaries • Small stand-alone commercial, bank, and pharmacy facilities
What factors do DoD Components consider when determining security priority for weapons systems platforms?
• Mission • Location and vulnerability • Operational readiness • Value • Classification • Replacement costs
Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency?
(COOP) Continuity of Operations Plan
Comprehensive protective measures for an installation, facility, or activity?
(PSP) Physical Security Plan
Operational/administrative procedures for normal and emergency situations?
(SOP) Standard Operating Procedures
What can an AACS do to protect assets in a facility?
- Allow authorized personnel to enter a controlled area after verifying credentials - Assist in preventing unauthorized personnel from entering a controlled area - Communicate with CCTV for assessment purposes - Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts
Which of the following may contain a CCTV within the protected area?
- Arms room - Magazine
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply?
- Do not write a combination down. - Do not change a lock's combination on a Friday or the day before you go on leave. - Change a lock's combination if the container is discovered unlocked and unattended. - Maintain records of who knows lock combinations. - Safeguard the combination at appropriate classification level.
Which of the following require(s) any system-associated cabling that extends beyond protected area perimeter to be installed in rigid conduit?
- SCIF - Top Secret/Secret collateral open storage area - Arms room - Magazine
Which of the following are considerations when planning for a DTM link?
- What is the bandwidth of each ESS subsystem being connected? - What level of security will be required? - Is there an uninterruptible power supply? - Can you use existing networks or will you need to create a new pathway?
You have received a request to add a CCTV system to a building on your installation. Which questions should you ask?
- Will the CCTV system be used inside or outside? - Will the CCTV system be used in a very well-lit area, in low lighting, or in the dark? - Are there any visual obstacles that might block the system from capturing clear images? - Will the system require a person to man the monitor at all times?
Briefly describe Security-in-Depth?
A determination by the senior agency official that a facility's security program consists of layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility.
What is manual access control?
A guard asking for the proper identification for entry
Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?
Anti-Passback
Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person's credential grants access?
Anti-Tailgating
Which of the following would best be described as a DoD asset?
Arms and Ammunition
A camera on the guard house is part of what type of physical security measure?
Closed Circuit Television (CCTV)
You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?
Coded
Switching device: authorizes the operating mechanism to open the lock?
Combination
Formal reviews conducted by senior officials in the chain-of-command?
Compliance Inspections
Often used as a temporary barrier when rolled out on the ground?
Concertina wire
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
Lighting which is continuously lit during hours of darkness?
Continuous Lighting
Which type of lighting is considered the most common?
Continuous lighting is the most common lighting.
Describe the four types of lighting systems used for security lighting?
Continuous lighting: A series of fixed lights arranged to continuously illuminate a given area. Standby lighting: Luminaires are either automatically or manually turned on at times when suspicious activity is detected by security personnel or an intrusion detection system. A standby system creates the impression of activity and may offer a deterrent value while also conserving energy. Emergency lighting: Emergency lighting is used during a power failure or when regular lighting is not available for any reason. This type of lighting depends on alternative power sources such as batteries or generators. Moveable lighting: Manually-operated searchlights that may be lighted during hours of darkness or as needed, and is normally used to supplement continuous or standby lighting.
Which consideration do you think was more important when selecting this type of fence for this installation? Cost or Appearance?
Cost
Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?
Credential
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. Now that the lock is powered and numbers appear on the LCD, what should you do?
Dial left to the number 27.
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed right to the second number, 4. The number 4 now appears on the LCD. What should you do next?
Dial left to the number 39.
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed left and the number 27 now appears on the LCD. What should you do next?
Dial right to the number 4.
List three policies or regulations that govern the DoD physical security program?
DoD 5200.08-Regulation Physical Security Program DoD Manual 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) DoD Manual 5105.21 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Physical Security, Visitor Control, and Technical Security
Security requirements for classified contracts are stated in?
DoD 5220.22M, NISPOM
The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents?
DoD AT Program
Who must approve all Intrusion Detection Equipment (IDE) installed on Open Storage Areas?
DoD Components approve Underwriters Laboratories' listed equipment.
What is the primary purpose of the CCTV physical security measure?
Documents authorized and unauthorized entry into a controlled area.
Who is responsible for issuing instructions governing the security of weapons systems within their inventory?
Each DoD Component head.
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. Now you need to open a security container that has an S&G 2740 lock. What type of lock is S&G 2740?
Electromechanical combination lock
Which types of locks are associated with Federal Specification FF-L- 2740 and are approved for storage of all types of classified materials, regardless of classification?
Electromechanical combination locks, which include the X-07, X-08, X-09, and S&G 2740, for classified material stored in security containers.
Back-up lighting used during power failures or other emergencies when normal systems are inoperative?
Emergency Lighting
Explain Security in Depth?
Facility planning, the use of barriers, fencing, signs, site lighting, and advanced technologies such as intrusion detection systems, closed circuit television (CCTV) and biometric entry control systems.
True or False: A DTM allows an automated access control system to communicate with a control center?
False
True or False: A wireless network is more secure than a hardwired network?
False
True or False: All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry?
False
True or False: An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS?
False
True or False: An advantage of CCTV is that environmental factors do not affect its performance?
False
True or False: Both the DIA and COCOMs issue FPCONs?
False
True or False: Emergency lighting depends upon the power supply of the utility company?
False
True or False: Flashlights are a reliable form of continuous lighting?
False
True or False: Installation commanders and facility directors issue DoD Terrorist Threat Levels?
False
True or False: Intrusion Detection Systems (IDS) prevent unauthorized entry?
False
True or False: It is essential to be consistent in all areas of the facility when it comes to security lighting?
False
True or False: Local alarm monitoring works best without another type of monitoring used in conjunction with it?
False
True or False: Police connection and central station monitoring generally require an increase in staffing at the facility being monitored?
False
True or False: Rapidly flowing rivers are considered active barriers?
False
True or False: Standby lighting is the type of lighting used when the primary power source fails?
False
True or False: The schedules for entry and exit inspections should be posted in view of all DoD personnel?
False
True or False: Threats against an asset are determined when you conduct a site survey?
False
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Federal Specification FF-L-2740
Which of the following would best be described as a countermeasure?
Fence
Which exterior IDS sensor is usually the least expensive?
Fence Associated Sensor
Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information?
Force Protection
A system that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets?
Force Protection Conditions
List three examples of physical security threats?
Foreign intelligence services, Foreign military and paramilitary forces, Terrorists, Saboteurs, Criminals, Protest groups, Disaffected persons, Natural disasters
Which type of sensor would be most effective in protecting a permanently secured window?
Glass Break Sensor
Which of the following is considered an access control measure?
Identification Cards, Security Guards, Locks and Keys
List two reasons for which physical security programs should be tailored to local conditions?
In overseas areas, COCOMS may deviate from DoD policy where required by treaties, agreements, and arrangements with foreign governments and allied forces. Threats, vulnerabilities, and critical assets may vary.
Who is responsible for the safety of people and property under their command?
Installation Commander/ Facility Director
Define Security in Depth?
Integrating and using (layers) active and passive complimentary physical security measures together.
Who must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation?
Law Enforcement
Requires roving security forces?
Local Alarm
Which of the following would best be described as a risk?
Loss of life
Explain strengths and weaknesses of various types of padlocks?
Low security padlocks (also known as secondary padlocks) are used for deterrence purposes but provide minimal resistance to force. High security padlocks deploy a high security hasp, provide maximum resistance to unauthorized entry, and may be used to secure arms, ammunition, and explosives facilities.
What are the two basic systems to be used to provide practical and effective security lighting?
Low-level lighting is used on security personnel. Low contrast lighting helps security personnel to detect indistinct outlines of silhouettes.
Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity?
MOU/MOA
Which of the following must have vibration sensors on its walls to detect boundary penetration attempts?
Magazine
Fixed equipment that detects metal objects?
Magnetometer
Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program?
Management / Self-Inspections
Which of the following is NOT a physical security measure?
Marking classified documents.
Two security professionals, Brian and Melissa, are discussing the purpose of physical security. Brian says physical security is the branch of security that is only concerned with active measures designed to prevent unauthorized access. Melissa says that physical security aims to safeguard assets against espionage, sabotage, terrorism, damage, and criminal activity.
Melissa is correct
It's more difficult for intruders to scale?
Metal ornamental high security fencing
Which of the following is part of an acceptance test?
PCU Test
What type of barrier is a concrete Jersey barrier?
Passive
Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?
Passive Infared Sensor
Which of the following is a physical security measure?
Perimeter Fences, Security Guards, Alarm Systems
List three examples of Security-in-Depth?
Perimeter fence, Employee/visitor access control, Intrusion detection system, Random guard patrols, Closed circuit video monitoring
Roles and responsibilities for individual work areas such as checkpoints and guard gates?
Post Orders
A facility owns and operates the dispatch center and security forces?
Proprietary Station
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control?
Protect keys and locks at the same level as classified information they are safeguarding. Maintain a key and lock register. Replace keys and locks if they are lost or compromised. Do not remove keys from certain premises. Do not create master keys. Appoint a key and lock custodian to ensure proper custody and handling of locks and keys. Inventory keys at each change of custody.
Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection?
Staff Assist Visits
Lighting illuminated manually or automatically when suspicious activity is detected or suspected by the security force, alarm system, or motion detector?
Stand-by Lighting
Monitoring a military exchange?
Surveillance
Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility?
Surveys
Which of the following would best be described as a threat?
Terrorist
Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests?
Terrorist Threat Levels
What is the role of the National Response Framework (NRF) for installation emergency management?
The NRF establishes clear objectives for a concerted national effort to prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other domestic emergencies. The NRF provides the structure and mechanism for a consistent, nationwide approach for federal, state, and local governments to effectively and efficiently work together to manage domestic incidents, regardless of cause, size, or complexity.
To whom should incidents involving stolen, lost, or recovered Arms, Ammunition, and Explosives (AA&E), which cause significant news coverage or have the potential to cause such coverage, be reported?
The Office of the Under Secretary of Defense for Intelligence.
The protection of DoD assets is accomplished through?
The application of active and passive complimentary physical security measures.
Which statement best describes the mission of security forces?
The mission of all government security forces, civilian or military, contract forces, and military working dogs is to protect DoD assets.
Describe the purpose of the 5200.08-R (Physical Security Program)?
The regulation implements DoD policies and provides minimum standards for the physical protection of DoD personnel, installations, operations, and related resources.
Which of the following statements are true of physical security planning and implementation?
The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets. Use of oversight tools is an important part of physical security implementation. Facility design must be considered in physical security planning. Physical security countermeasures must always be planned for when designing a facility.
What is Controlled Lighting?
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
What is Glare Projection?
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
How do Security Measures ensure security?
To ensure security, the security measures must provide the capability to deter, detect, identify, track, assess, record, communicate, delay, and respond to unauthorized access activities.
When should I use Area Security?
To protect consolidated resources, such as an installation or facility.
What is the primary purpose of an Active barrier?
To stop vehicles for guard authorization
Which of the following require(s) a mechanical/automated access control system or visual recognition as the access control method?
Top Secret/Secret collateral open storage area
Assures communications between the alarmed area and the monitoring station?
Transmission Line Security
True or False: A CCTV camera may capture activity missed by security force personnel?
True
True or False: A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection?
True
True or False: A CCTV is only as good as the people who operate it?
True
True or False: Access control systems help to prevent unauthorized entry?
True
True or False: An ESS is a component of an overall physical protection system?
True
True or False: An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur?
True
True or False: Assets, threats, and vulnerabilities are all part of the risk calculation?
True
True or False: Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground?
True
True or False: CCTV can deter loss, theft, or misuse of government property and resources?
True
True or False: Certain types of lighting can incapacitate an intruder?
True
True or False: Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs?
True
True or False: Contract security forces may be either military or civilian?
True
True or False: Controlled lighting is used to illuminate the perimeter of a facility?
True
True or False: Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility?
True
True or False: Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area?
True
True or False: FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels?
True
True or False: Government security forces may be either military or civilian?
True
True or False: Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings?
True
True or False: Military working dogs can seek, detect, defend their handlers, and guard suspects?
True
True or False: Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines?
True
True or False: Proprietary station monitoring is the method used most by DoD installations?
True
True or False: Securing man-passable openings is one of the most overlooked physical security protective measures?
True
True or False: Software-based integration is the preferred DTM method for most projects?
True
True or False: Surface lighting helps to exaggerate the shadow of a potential intruder approaching a building?
True
True or False: Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions?
True
True or False: When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station?
True
True or False: While a security lighting system may deter unsophisticated criminals or vandals, the system alone may not be sufficient to deter sophisticated criminals or terrorists?
True
True or False: You must consider operational and maintenance costs of an ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset?
True
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. What should you do first?
Turn the dial left 4 to 6 turns.
You need to open a security container that has an X-09 electromechanical lock. The combination is 27-4-39. You have dialed left to the third number, 39. The number 39 now appears on the LCD. What should you do next?
Turn the dial to the right to retract the lock.
Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?
Two-Person Rule
What is the reference that provides minimum construction requirements for fencing?
UFC 4-022-03, Security Fences and Gates
You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?
UFC, 4-021-02, Electronic Security Systems
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced? use?
X-09 electromechanical lock
You need to secure classified information. Which of these locks could you use?
X-09 electromechanical lock La Gard 3330 mechanical lock S&G 8077 padlock
What type of ID would you most likely be required to show a guard at a DoD Military Access Control Point?
Your Common Access Card (CAC)
Define the two main types of electromechanical locks according to Federal Specification FF-L-2740B?
• Basic Self-Contained: Does not have external power source, external data transfer port, or ability to transfer data • Interoperable/Networked: Power source may be contained within and integral to lock assembly; power source may be replaceable; external data transfers shall meet FIPS standards; data transfers may be used to monitor authorized/unauthorized openings, personnel access, combination verification, and combination changes.
What are some of the considerations for selecting and implementing a particular intrusion detection system?
• Completeness of coverage • False and nuisance response rates • Probability of detection • Zone at which the alarm occurred
What are some examples of passive barrier systems?
• Concrete-filled bollard • Concrete median (also known as Jersey barrier) • King Tut block • Concrete planter • Excavations and ditches • Guardrails • Heavy equipment tires • Tire shredders • Steel cable barriers • Steel cable-reinforced chain link fencing • Reinforced concrete knee walls
Name examples of authorized locking devices used within the Department of Defense?
• Cylindrical locksets • Dead-bolt locksets • Drop-bolt locks • Padlocks • Mechanical push-button combination locks • Mechanical combination locks • Electro-mechanical combination locks • Warded locks • Pin tumbler locks
What are some of the considerations a physical security professional should take into account for controlling access?
• Escort qualifications, responsibilities, and authorizations • Sponsorship qualifications, responsibilities, and authorizations • Access privileges at each security level and each FPCON • Mission-essential employee designation, if applicable • Emergency response designation, if applicable • Day and time designation for access • Locations authorized for access
What are the four basic functional elements that must operate in an integrated and timely manner to achieve an overall effective security system that defeats design threats?
• Intrusion detection and access control sensors and/or guards • Threat assessment from guards and/or CCTV • Appropriately designed and located barriers • Responding guards
What are some of the exemptions to the DoD Antiterrorism Standards?
• Low occupancy buildings • Low occupancy family housing • Fisher houses • Town centers • Enhanced use leases • Transitional structures and spaces • Temporary and re-locatable buildings • Construction administration structures • Recruiting stations in leased spaces • Stand-alone gas stations and car care centers • Military protective construction (designed to NATO or equivalent standards) • Stand-alone franchised fast food operations • Stand-alone shopettes, minimarts, and similarly-sized commissaries • Small stand-alone commercial, bank, and pharmacy facilities
The DoD Antiterrorism Standards are applicable to which types of buildings?
• New construction • Existing buildings • Major investments • Change of occupancy level • Window replacement • Roadway improvement projects • Building additions • Leased buildings • Partial occupancy • National Guard buildings • Visitor centers and museums • Expeditionary structures
What are the three goals of the DoD Installation Emergency Management Program?
• Prepare DoD installations for emergencies • Respond appropriately to protect personnel and save lives • Recover and restore operations after an emergency
Define preparedness in the context of emergency management?
• Preparedness is the range of deliberate, critical tasks and activities necessary to build, sustain, and improve the operational capability to prevent, protect against, respond to, and recover from domestic incidents. Preparedness is a continuous process. • Preparedness involves efforts at all levels of government and coordination among government, private sector, and non-governmental organizations to identify threats, determine vulnerabilities, and identify required resources. Within the National Incident Management System, preparedness is operationally focused on establishing guidelines, protocols, and standards for planning, training and exercises, personnel qualification and certification, equipment certification, and publication management.
What are some of the primary uses of fencing?
• Provides a legal boundary by defining the outermost limit of a facility • Assists in controlling and screening authorized vehicle entries into a secured area by deterring overt entry elsewhere along the boundary • Supports detection, assessment, and other security functions by providing a "clear zone" for installing lighting, intrusion detection equipment, and CCTV • Deters "casual" intruders from penetrating into a secured area by presenting a barrier that requires over action to penetrate • Causes an intruder to make an overt action that will demonstrate intent
What are included as considerations during inspections of Arms, Ammunition, and Explosives (AA&E) storage facilities?
• Review of physical security measures and policy compliance • Review of existing deviations from policy • Review of suitability and screening of personnel with access to AA&E • Inventory and accountability procedures • Facility design and construction
At minimum, what should inspections of Arms, Ammunition, and Explosives (AA&E) storage facilities include?
• Review physical security measures and policy compliance • Review existing deviations from policy • Review suitability and screening of personnel with access to AA&E • Review inventory and accountability procedures • Facility design and construction
Before loss of Arms, Ammunition, and Explosives (AA&E) can be attributed to any inventory or accountability discrepancy, one must first determine the loss was not a result of what three factors?
• Theft • Abandonment • Misappropriation
What are the four considerations/ risk factors used for determining the security risk category (SRC) of sensitive conventional Arms, Ammunition, and Explosives (AA&E)?
• Utility • Casualty or damage risk • Adaptability risk • Portability risk