Frage 1
Frage
The primary purpose of physical security is prevention and protection.
Frage 2
Frage
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Antworten
-
Antiterrorism Executive Committee
-
Mission Assurance Senior Steering Group
-
Threat Working Group
-
Antiterrorism Working Group
Frage 3
Frage
Select ALL the correct responses. Which of the following are facility access control procedures?
Frage 4
Frage
Which of the following physical security countermeasures serve as a security system response force?
Frage 5
Frage
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Antworten
-
Install solid steel doors
-
Mount cameras on the roof
-
Limit the number of entrances and exits to what is necessary
Frage 6
Frage
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Frage 7
Frage
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
Antworten
-
risk management process
-
threat assessment process
-
operation assessment process
-
vulnerability assessment process
Frage 8
Frage
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Frage 9
Frage
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Antworten
-
Standard Operating Procedures and Post Orders
-
Standard Operating Procedures and the Physical Security Plan
-
Post Orders and the Physical Security Plan
Frage 10
Frage
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Frage 11
Frage
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
Frage 12
Frage
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Frage 13
Frage
Which of the following is the purpose of an interior intrusion detection system (IDS)?
Antworten
-
To provide a complete solution to a facility security posture.
-
To terminate any intrusion into a facility.
-
To deter, detect, and document intrusion in the environment.
Frage 14
Frage
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Frage 15
Frage
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Antworten
-
Significant
-
Low
-
High
-
Moderate
Frage 16
Frage
The primary purpose of physical security is ____________ and protection.
Antworten
-
attacking intruders
-
prevention
-
security-in-depth
Frage 17
Frage
Which of the following best defines security-in-depth?
Antworten
-
The use of fencing around the perimeter of a structure
-
The use of barriers around the perimeter of a structure
-
The layering of physical security measures through the application of active and passive complementary security controls
Frage 18
Frage
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Antworten
-
Continuous lighting
-
Standby lighting
-
Movable lighting
-
Emergency
Frage 19
Frage
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Frage 20
Frage
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Antworten
-
Standard Operating Procedures and Post Orders
-
Standard Operating Procedures and the Physical Security Plan
-
Post Orders and the Physical Security Plan
Frage 21
Frage
Select ALL the correct responses. Security Forces may be comprised of which of the following?
Frage 22
Frage
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Antworten
-
Antiterrorism
-
Physical Security Plan
-
Threat Level Indicators
-
Force Protection
Frage 23
Frage
When required, the two-person concept may be part of a facility access control method.
Frage 24
Frage
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Frage 25
Frage
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Frage 26
Frage
__________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
Antworten
-
DoDM 5200.01
-
DoDI 5200.08
-
DoD 5200.08-R
Frage 27
Frage
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
Frage 28
Frage
The two primary purposes of physical security are protection and _______________?
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 29
Frage
A guard checking IDs at the gate of an installation is a good example of what type of security?
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 30
Frage
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 31
Frage
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first?
Select all that apply.
Frage 32
Frage
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 33
Frage
Which policy should you consult to find the physical security requirements of protecting classified information?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 34
Frage
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 35
Frage
Who is charged with management, implementation, and direction of all physical security programs?
Frage 36
Frage
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Frage 37
Frage
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Frage 38
Frage
Which of the following individuals should be included in a Threat Working Group?
Select all that apply.
Antworten
-
Antiterrorism Officer
-
Counterintelligence (CI) representative
-
Law enforcement representative
-
Operations security officer
-
Information operations representative
-
Chemical, biological, radiological, nuclear and high yield explosive representative
Frage 39
Frage
Which of these can be made of solid steel to make them more attack resistant?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 40
Frage
Which of these house ventilation systems that should be secured with steel bars?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 41
Frage
Which of these should be covered with a protective film to make them less dangerous in an attack?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 42
Frage
Which of the following locks are approved to secure classified information or material?
Select all that apply.
Antworten
-
Kaba Mas X-10
-
S&G 8077/AD
-
S&G 833 C
Frage 43
Frage
Standby lighting is used when regular lighting is not available.
Frage 44
Frage
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Frage 45
Frage
Movable lighting is used when supplemental lighting is needed such as at construction sites.
Frage 46
Frage
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Frage 47
Frage
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Frage 48
Frage
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Frage 49
Frage
Commanders may only implement measures according to the FPCON level in force at the time.
Frage 50
Frage
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Frage 51
Frage
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Frage 52
Frage
Which of the following is an example of a locking device?
Frage 53
Frage
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
Frage 54
Frage
The use of a master key system is not acceptable in ____________.
Antworten
-
barracks
-
general office areas
-
secure areas
Frage 55
Frage
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Frage 56
Frage
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Antworten
-
Locking device
-
Switching device
-
Securing device
Frage 57
Frage
Which of the following should you do before changing a combination?
Frage 58
Frage
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
Frage 59
Frage
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Frage 60
Frage
Which of the following is not a locking device for a key-operated lock?
Frage 61
Frage
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Frage 62
Frage
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
Antworten
-
The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
-
The door must be locked to prevent unauthorized entry and exit.
-
The door must be unlocked so that those inside can exit without having to unlock the door.
Frage 63
Frage
A key and lock custodian should change or rotate locks at least _____________.
Antworten
-
monthly
-
annually
-
quarterly
Frage 64
Frage
Which of the following statements is true?
Antworten
-
You may not change a combination without a commercial locksmith.
-
You may never allow a commercial locksmith to change your combination.
-
You may allow a commercial locksmith to change your combination under certain circumstances.
Frage 65
Frage
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
Antworten
-
The combination on that security container must be changed.
-
Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
-
The security container must be replaced.
Frage 66
Frage
Which electromechanical lock uses battery power?
Frage 67
Frage
Which of the following is the purpose of a lock’s switching device?
Antworten
-
To allow or deny entry into a container or area
-
To authorize the locking device to open
-
To keep the area or container secured
Frage 68
Frage
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Antworten
-
A padlock
-
A built-in lock
Frage 69
Frage
The two primary types of locks used within DoD are ___________ and key locks.
Antworten
-
Biometric
-
Encoded
-
Voice activated
-
Combination
Frage 70
Frage
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Antworten
-
Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
-
Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
-
Locking solutions that provide a higher level of protection are more costly and labor-intensive.
Frage 71
Frage
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Frage 72
Frage
Pin tumblers are most commonly employed on _______ locks?
Antworten
-
combination
-
tubular
-
cylinder
Frage 73
Frage
What is not a responsibility of the Key Custodian?
Frage 74
Frage
Which of the following is the switching device for a key-operated lock?
Frage 75
Frage
Which of the following is a disadvantage to using a master key system?
Antworten
-
The cost to re-key all of the locks in the system.
-
It is harder to pick the locks.
-
It is harder to copy the locks.
Frage 76
Frage
The S&G 2937 lock is an example of which type of combination lock?
Frage 77
Frage
Many building codes require a facility’s exit doors to contain which of the following devices?
Frage 78
Frage
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
Antworten
-
A built-in lock
-
An approved padlock
Frage 79
Frage
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Antworten
-
Federal Specification FF-L-2740B
-
Federal Specification FF-P-110
-
Federal Specification FF-L-2937
Frage 80
Frage
You need to secure classified information. Which of these locks could you use?
Frage 81
Frage
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Antworten
-
A built-in lock
-
A padlock
Frage 82
Frage
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
Antworten
-
A built-in lock
-
A padlock
Frage 83
Frage
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
Frage 84
Frage
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control? Select all that apply.
Antworten
-
Protect keys and locks at the same level as classified information they are safeguarding.
-
Maintain a key and lock register.
-
Replace keys and locks if they are lost or compromised.
-
Do not remove keys from certain premises.
-
Do not create master keys.
-
Appoint a key and lock custodian to ensure proper custody and handling of locks and keys.
Frage 85
Frage
Which of the following are true of master key systems? Select all that apply.
Antworten
-
The great grand master key opens all of the locks in the system.
-
Replacing a lost master key is inexpensive.
-
They are convenient for managers.
-
They are not authorized for DoD use in barracks.
-
Because of their inherent security risks, their use is discouraged.
Frage 86
Frage
Switching device: authorizes the operating mechanism to open the lock
Antworten
-
Cylinder
-
Combination
-
Latch
Frage 87
Frage
Operating mechanism: interacts with the switching device to allow or deny entry
Antworten
-
Cylinder
-
Combination
-
Latch
Frage 88
Frage
Locking device: physically secures area or container
Antworten
-
Cylinder
-
Combination
-
Latch
Frage 89
Frage
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced and which would you use?
Frage 90
Frage
What type of lock is S&G 2740?
Antworten
-
Mechanical combination lock
-
Electromechanical combination lock
-
High security operated padlock
Frage 91
Frage
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Antworten
-
Back up to the number
-
Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
-
Restart the process all over again
Frage 92
Frage
You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first?
Antworten
-
Change the combination
-
Open the lock
-
Calibrate the lock
Frage 93
Frage
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply.
Antworten
-
Do not write a combination down.
-
Do not change a lock’s combination on a Friday or the day before you go on leave.
-
Change a lock’s combination if the container is discovered unlocked and unattended.
-
Maintain records of who knows lock combinations.
-
Safeguard the combination at appropriate classification level.
Frage 94
Frage
The S&G 8077/AD combination padlocks are used to secure Secret and Confidential information such as approved bulk and temporary storage indoors.
Frage 95
Frage
What operates most key-operated locks?
Antworten
-
Wheel packs
-
Cylinders
-
Triggers
Frage 96
Frage
How often should a key and lock custodian audit keys?
Frage 97
Frage
The S&G 8077/AD combination padlocks must comply with which regulations/specifications?
Frage 98
Frage
When is it acceptable to change a combination?
Frage 99
Frage
Which lock is approved under the Federal Specification FF-P-110?
Antworten
-
S&G 2740
-
S&G 2740B
-
S&G 2937
-
S&G 8077
Frage 100
Frage
Which dial rotation do the X-09 and X-10 electromechanical built-in combination locks have in common?
Antworten
-
left-right-left
-
right only
-
left only
Frage 101
Frage
What is the locking device for a combination lock?
Antworten
-
Wheel Pack
-
Combination
-
Bolt
Frage 102
Frage
If you write a combination down, which of the following must you do?
Frage 103
Frage
What lock system is considered for Life Safety?
Antworten
-
LMK 7000
-
S&G 941
-
S&G 2900 PDL
-
X09
Frage 104
Frage
As a best practice, when a combination is changed, how many times should the new combination by tried before closing the door or drawer?
Frage 105
Frage
What factor affects decisions made about which users may access a lock, time restrictions on locking/unlocking a lock, and automatic versus manual relocking of a lock?
Frage 106
Frage
Which of the following locking solutions may be used to secure classified information or material?
Frage 107
Frage
For which of the following areas does the DoD use master key systems?
Frage 108
Frage
The type of locking device required is determined by the environment and _________.
Antworten
-
Facility classification
-
Authorized personnel
-
Asset type
-
Installation commander
Frage 109
Frage
Which level of security do key-operated built-in locks provide?
Frage 110
Frage
Which type of cylinder is most commonly used on inward-opening or front doors?
Frage 111
Frage
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
Frage 112
Frage
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Antworten
-
Manual
-
Combination
-
Biometric
-
Physical
-
Mechanical
-
Automated
Frage 113
Frage
Controlled lighting is used when it is necessary to limit the brightness of the light.
Frage 114
Frage
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Antworten
-
Glare projection
-
Emergency projection
-
Downside illumination
-
Standby illumination
Frage 115
Frage
Response forces ___________________________________ .
Antworten
-
respond to alarms and incidents
-
dispatch response forces and mobile patrols
-
guard a high-priority resource
-
can cover large areas in a timely manner
Frage 116
Frage
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Antworten
-
Forbid
-
Prevent
-
Document
-
Thwart
Frage 117
Frage
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
Frage 118
Frage
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Frage 119
Frage
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
Antworten
-
Combination
-
Automated
-
Manual
-
Mechanical
-
Physical
Frage 120
Frage
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
Antworten
-
control
-
area security
-
enclaving
-
separation
Frage 121
Frage
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Frage 122
Frage
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
Frage 123
Frage
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
Frage 124
Frage
When is a security force response required?
Antworten
-
When an Intrusion Detection System (IDS) sensor is triggered.
-
When an Intrusion Detection System (IDS) is not reporting an alarm.
-
When an Intrusion Detection System (IDS) protects a highly critical asset.
-
When an Intrusion Detection System (IDS) alarm notification is received.
Frage 125
Frage
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Antworten
-
Pedestrian
-
Fixed
-
Intrusive
-
Portable
Frage 126
Frage
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Frage 127
Frage
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Antworten
-
Response/Assessment
-
Detection
-
Dispatch
-
Reporting
Frage 128
Frage
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Frage 129
Frage
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
Antworten
-
Combination
-
Physical
-
Manual
-
Automated
-
Biometric
Frage 130
Frage
How are military working dogs employed by security force members?
Antworten
-
Assist in drug testing
-
Assist in law enforcement
-
Assist in detecting explosives
-
Assist in confrontation management
-
Assist in pest control
Frage 131
Frage
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Antworten
-
Standby lighting
-
Surface lighting
-
Emergency lighting
-
Continuous lighting
Frage 132
Frage
What are signs, barriers, and fences used for in perimeter protection systems?
Antworten
-
Deterring unlawful or unauthorized entry
-
Establishing legal boundaries
-
Preventing all types of penetration
-
Integrating protection assets
-
Preventing observation from outside
Frage 133
Frage
A waterway is an example of what kind of barrier?
Antworten
-
Clear zone
-
Perimeter
-
Natural
-
Active
Frage 134
Frage
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
Frage 135
Frage
When are static observation posts used?
Antworten
-
When continuous surveillance is required.
-
To cover large areas in a timely manner.
-
To monitor alarms and respond to emergencies.
-
To monitor entry to a facility or secure area.
Frage 136
Frage
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
Frage 137
Frage
What does an Intrusion Detection System (IDS) detect?
Antworten
-
Only unauthorized intrusions
-
A change in the state of an indoor detection device by a change in outdoor environmental devices
-
A change in state of detection devices that may require further investigation
-
Prevention of an unauthorized intrusion
Frage 138
Frage
Integrating layers of security to protect DoD assets is
Antworten
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Frage 139
Frage
Guarding a specific asset or resource is
Antworten
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Frage 140
Frage
Protecting an entire area such as an installation or facility is called
Antworten
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Frage 141
Frage
Designating islands of high security within a sea of moderate security is called
Antworten
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Frage 142
Frage
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground.
Frage 143
Frage
Barbed wire is also known as razor wire.
Frage 144
Frage
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
Frage 145
Frage
Rapidly flowing rivers are considered active barriers.
Frage 146
Frage
Which of the following protective barriers would most likely be utilized for its decorative appeal? Select the best answer.
Antworten
-
Trench
-
Berm
-
Concrete planter
-
Jersey barrier
Frage 147
Frage
To be effective, clear zones should be free of which of the following? Select the best answer.
Antworten
-
Trimmed grass
-
Bushes
-
Dirt
-
Fencing
Frage 148
Frage
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Antworten
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Frage 149
Frage
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Antworten
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Frage 150
Frage
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Antworten
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Frage 151
Frage
When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station.
Frage 152
Frage
Flashlights are a reliable form of continuous lighting.
Frage 153
Frage
Emergency lighting depends upon the power supply of the utility company.
Frage 154
Frage
Standby lighting is the type of lighting used when the primary power source fails.
Frage 155
Frage
Standby lighting is the type of lighting used when the primary power source fails.
Frage 156
Frage
Contract security forces may be either military or civilian.
Frage 157
Frage
Military working dogs can seek, detect, defend their handlers, and guard suspects.
Frage 158
Frage
Which statement best describes the mission of security forces? Select the best answer.
Antworten
-
To secure Department of Defense buildings inside and out
-
To monitor facility access in the interest of national security
-
To protect Department of Defense assets
-
To protect key Department of Defense officials
Frage 159
Frage
_________ responds to a physical stimulus
Frage 160
Frage
______________ receives change of state and transmits alarm.
Frage 161
Frage
_____________ is the central point for collecting alarm status.
Frage 162
Frage
__________ assures communications between the alarmed area and the monitoring station
Frage 163
Frage
A CCTV camera may capture activity missed by security force personnel.
Frage 164
Frage
A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection.
Frage 165
Frage
An advantage of CCTV is that environmental factors do not affect its performance.
Frage 166
Frage
A CCTV is only as good as the people who operate it.
Frage 167
Frage
Which of the following are access control systems? Select all that apply.
Antworten
-
Closed circuit television
-
Card-swipe system
-
Joint Personnel Adjudication System (JPAS)
-
Badge exchange program
-
Personal recognition
-
Iris scanning
-
Intrusion detection system
Frage 168
Frage
Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area.
Frage 169
Frage
The schedules for entry and exit inspections should be posted in view of all DoD personnel.
Frage 170
Frage
All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry.
Frage 171
Frage
Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility.
Frage 172
Antworten
-
Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Frage 173
Frage
Vapor trace detector
Antworten
-
\Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Frage 174
Antworten
-
Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Frage 175
Frage
What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access?
Antworten
-
Automated
-
Biometric
-
Programmed
-
Manual
-
Combination
Frage 176
Frage
What are some important considerations in planning for your monitoring station?
Select all that apply.
Frage 177
Frage
What kind of screening equipment is effective for screening the things people bring in to facilities?
Frage 178
Frage
What are the characteristics of passive barrier systems?
Select one or more:
Antworten
-
Have substantial bulk or mass
-
Are permanently installed or require heavy equipment to move
-
Require manual operation by security forces
-
Have moving parts
Frage 179
Frage
Government security forces are made up of military personnel, civilian employees or contractor personnel.
Frage 180
Frage
When an individual resource requires individual protection, you would employ ____________ security.
Antworten
-
point
-
direct
-
moderate
-
area
Frage 181
Frage
The Joint Personnel Adjudication System (JPAS) is an access control system because it is used to verify the level of access eligibility for specific individuals.
Frage 182
Frage
What method of security lighting uses lights slightly inside a security perimeter and directed outward?
Antworten
-
Controlled lighting
-
Emergency projection
-
Downside illumination
-
Glare projection
Frage 183
Frage
Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions.
Frage 184
Frage
An Intrusion Detection System (IDS) is composed of a combination of components integrated to operate in a specific manner to detect a change in the environment by a change of state of detection device.
Frage 185
Frage
What is an appropriate response when fixed screening equipment sets of an alarm?
Antworten
-
Refer to local law enforcement
-
Using portable screening equipment
-
Experimental technology
-
Hand screening
-
Monitor closed circuit television (CCTV)
-
Manual search
Frage 186
Frage
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters.
Frage 187
Frage
Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes?
Antworten
-
Controlled
-
Surface
-
Emergency
-
Glare projection
Frage 188
Frage
An Intrusion Detection System (IDS) used with a closed circuit television (CCTV) system is likely to result in distractions to the operator and a reduction in security efficiency.
Frage 189
Frage
What are the operational phases of an Intrusion Detection system?
Antworten
-
Detection, Reporting, Dispatch, and Response/Assessment
-
Alarm Initiation, Response, Termination, Assessment/Cancellation
-
Alarm Silencing, Dispatch, Response, Termination
-
Diversion, Response Force Dispatch, Response, Assessment/Cancellation
Frage 190
Frage
If a raccoon sets off a fence sensor, what kind of alarm occurs?
Antworten
-
Nuisance alarm
-
False alarm
-
Intruder alarm
-
Maintenance alarm
Frage 191
Frage
______________ fencing is used to protect a stationary perimeter.
Antworten
-
Portable
-
Permanent
-
Electric
-
Adaptable
Frage 192
Frage
What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli?
Antworten
-
Reporting
-
Dispatch
-
Detection
-
Response/Assessment
Frage 193
Frage
Identify the best practices for security inspections. (Entry/Exit)
Select all that apply.
Antworten
-
Conduct security inspections randomly or during periods of increased alertness
-
No notice should be provided to individuals that they may be subject to inspections
-
Security inspections should prevent or deter the introduction of unauthorized or prohibited material into an installation or facility
-
Only senior officials and security personnel should know security inspection schedules
Frage 194
Frage
What comprises an Intrusion Detection System (IDS) “alarmed area.”
Antworten
-
Sensors and alarm zones
-
The PCU and the monitoring station
-
The PCU and the sensors it serves
-
A dedicated panel or central processor unit
Frage 195
Frage
Selection of a manual or automated access control system is based on _______________ .
Antworten
-
availability of funding
-
risk management
-
threat assessment
-
availability of assets
Frage 196
Frage
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Antworten
-
Vulnerabilities
-
Risks
-
Threats
Frage 197
Frage
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Frage 198
Frage
Rivers, cliffs, and dense growth are examples of which type of barrier?
Antworten
-
Active barrier
-
Natural barrier
-
Passive barrier
Frage 199
Frage
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
Frage 200
Frage
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Antworten
-
Compliance inspections
-
Self-inspections
-
Surveys
-
Staff assist visits