Frage 1
Frage
The two primary purposes of physical security are protection and _______________?
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 2
Frage
A guard checking IDs at the gate of an installation is a good example of what type of security?
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 3
Frage
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Antworten
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Frage 4
Frage
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first?
Frage 5
Frage
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 6
Frage
Which policy should you consult to find the physical security requirements of protecting classified information?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 7
Frage
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Antworten
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Frage 8
Frage
Who is charged with management, implementation, and direction of all physical security programs?
Frage 9
Frage
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Frage 10
Frage
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Frage 11
Frage
Which of the following individuals should be included in a Threat Working Group?
Antworten
-
Antiterrorism Officer
-
Counterintelligence (CI) representative
-
Law enforcement representative
-
Operations security officer
-
Information operations representative
-
Chemical, biological, radiological, nuclear and high yield explosive representative
Frage 12
Frage
Which of these can be made of solid steel to make them more attack resistant?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 13
Frage
Which of these house ventilation systems that should be secured with steel bars?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 14
Frage
Which of these should be covered with a protective film to make them less dangerous in an attack?
Antworten
-
Walls
-
Doors
-
Windows
-
Roofs
Frage 15
Frage
Which of the following locks are approved to secure classified information or material?
Antworten
-
Kaba Mas X-10
-
S&G 8077/AD
-
S&G 833 C
Frage 16
Frage
Standby lighting is used when regular lighting is not available.
Frage 17
Frage
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Frage 18
Frage
Movable lighting is used when supplemental lighting is needed such as at construction sites.
Frage 19
Frage
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Frage 20
Frage
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Frage 21
Frage
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Frage 22
Frage
Commanders may only implement measures according to the FPCON level in force at the time.
Frage 23
Frage
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Frage 24
Frage
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Frage 25
Frage
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Antworten
-
High
-
Moderate
-
Low
-
Significant
Frage 26
Frage
Who is responsible for assessing requirements for physical security and conducting criticality, vulnerability, and risk assessments?
Antworten
-
Antiterrorism Working Group
-
Threat Working Group
-
Antiterrorism Executive Committee
-
Mission Assurance Senior Steering Group
Frage 27
Frage
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Frage 28
Frage
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Frage 29
Frage
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Antworten
-
Standard Operating Procedures and the Physical Security Plan
-
Post Orders and the Physical Security Plan
-
Standard Operating Procedures and Post Orders
Frage 30
Frage
Select ALL the correct responses.
Which of the following are facility access control procedures?
Frage 31
Frage
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Frage 32
Frage
Site lighting supplements other protective measures.
Frage 33
Frage
Who is responsible for identifying threats and informing the installation Commanding Officer on current threats?
Antworten
-
Mission Assurance Senior Steering Group
-
Threat Working Group
-
Antiterrorism Executive Committee
-
Antiterrorism Working Group
Frage 34
Frage
The primary purpose of physical security is prevention and protection.
Frage 35
Frage
When required, the two-person concept may be part of a facility access control method.
Frage 36
Frage
Select ALL the correct responses. Which of the following are appropriate physical security countermeasures?
Frage 37
Frage
Which of the following implements the physical security aspects of protecting classified information?
Antworten
-
DoDM 5200.01
-
DoD 5200.08-R
-
DoDI 5200.08
Frage 38
Frage
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
Frage 39
Frage
Select ALL the correct responses.
Security Forces may be comprised of which of the following?
Frage 40
Frage
Which of the following best defines security-in-depth?
Antworten
-
The use of fencing around the perimeter of a structure
-
The use of barriers around the perimeter of a structure
-
The layering of physical security measures through the application of active and passive complementary security controls
Frage 41
Frage
Which of the following physical security countermeasures serve as a security system response force?
Frage 42
Frage
Which step in the risk management process is designed to identify and assess the perceived imminence of intended aggression by a capable entity to harm a nation, a government, or its instrumentalities?
Antworten
-
Identify and assess Threats
-
Identify and assess Vulnerabilities
-
Determine Countermeasure Options
-
Identify and assess Assets
Frage 43
Frage
Which of the following typically establish duties, roles, and responsibilities at individual assignments, checkpoints, and gates?
Frage 44
Frage
Who is responsible for supporting antiterrorism concerns, efforts, and emergency response and law enforcement activities?
Frage 45
Frage
What regulation covers Physical Security?
Frage 46
Frage
What regulation covers Information Security?
Antworten
-
DODM 5200.01 (Vol 1-4)
-
DOD 5200.08-R
Frage 47
Frage
What is the Primary purpose of Physical Security?
Antworten
-
PREVENTION
-
PROTECTION
-
PREPARATION
Frage 48
Frage
Which policy should you consult to find the physical security requirements of protecting classified information?
Antworten
-
DOD 5200.08-R
-
DODI 5200.08
-
DODM 52001.01, Vol 1-4
Frage 49
Frage
Which policy authorizes commanders to issue regulations for the protection or security and places under their command?
Antworten
-
DOD 5200.08-R
-
DOD5200.08
-
DODM 5200.01, Vol 1-4
Frage 50
Frage
Well-designed _______________, including detection, deterrence, delay, denial, and notification, are accomplished through the development of a plan outlining who will do what, where, when, and how.
Frage 51
Frage
The _____________ system allows commanders to be flexible and adaptable in developing and implementing antiterrorism measures that are more stringent than those mandated by higher authorities whenever they are invoked.
Frage 52
Frage
Who is responsible for developing and maintaining physical security plans, establishing standard policies and procedures for a facility and/or installation?
Frage 53
Frage
Select ALL the correct responses. Which of the following are site design considerations that provide a physical and psychological deterrence to intruders?
Frage 54
Frage
Which of the following are supplemental guidance for implementing specific components of the physical security program to cover events such as major accidents, fire, and bomb threats?
Frage 55
Frage
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Antworten
-
Threat Working Group
-
Antiterrorism Working Group
-
Antiterrorism Executive Committee
-
Mission Assurance Senior Steering Group
Frage 56
Frage
Which of the following is conducted by members of your own organization and usually with the aid of a checklist?
Frage 57
Frage
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
Antworten
-
risk management process
-
operation assessment process
-
threat assessment process
-
vulnerability assessment process
Frage 58
Frage
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Antworten
-
Install solid steel doors
-
Limit the number of entrances and exits to what is necessary
-
Mount cameras on the roof
Frage 59
Frage
What is the first line of defense in any physical security system?
Antworten
-
Site lighting
-
Barriers and fencing
-
Sensors
Frage 60
Frage
The Threat Working Group is responsible for identifying foreign, domestic, and local threats and informing the installation commanding officer of current threat trends in the area of responsibility.
Frage 61
Frage
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Antworten
-
Antiterrorism
-
Physical Security Plan
-
Force Protection
-
Threat Level Indicators
Frage 62
Frage
Which threat level signifies anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation?
Antworten
-
High
-
Moderate
-
Significant
-
Low
Frage 63
Frage
Select ALL the correct responses. Which of the following represent the purpose of physical security?
Antworten
-
Deter intruders
-
Prevent theft, damage, or unauthorized access to assets
-
Manpower
-
Safeguard against threats
Frage 64
Frage
Who is responsible for providing information on the capabilities, intentions, and threats of adversaries associated with foreign intelligence entities?
Frage 65
Frage
The ______________________ is a comprehensive written plan for appropriate and economical use of personnel and equipment to prevent or minimize criminal and disruptive activities.
Antworten
-
Physical Security Plan
-
Cybersecurity Plan
-
COMSEC Plan
-
Monthly Action Plan
Frage 66
Frage
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Frage 67
Frage
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Frage 68
Frage
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
Frage 69
Frage
Who is responsible for managing the installation or facility antiterrorism program and using defensive measures to reduce vulnerability of individuals and property from terrorist attacks?
Frage 70
Frage
Select ALL the correct responses. Which of the following is an exterior intrusion detection system (IDS)?
Frage 71
Frage
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Antworten
-
Standby lighting
-
Movable lighting
-
Continuous lighting
-
Emergency lighting
Frage 72
Frage
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Frage 73
Frage
Which type of locks may be appropriate for safeguarding classified information?
Frage 74
Frage
Select ALL the correct responses. Which of the following comprise the Mission Assurance Senior Steering Group?
Frage 75
Frage
Which of the following statements best describes an example of point security?
Frage 76
Frage
Select ALL the correct responses. Which of the following are examples of security-in-depth, layering of physical security countermeasures?
Antworten
-
Staff assist visits
-
Inspections
-
Lighting and cameras
-
Fencing and guards
Frage 77
Frage
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Frage 78
Frage
Select ALL the correct responses. Which of the following are the weakest points in a building?
Frage 79
Frage
The primary purpose of physical security is ____________ and protection.
Antworten
-
attacking intruders
-
security-in-depth
-
prevention