PSC 1

Descripción

Security Test sobre PSC 1, creado por Arthur Casto el 11/11/2018.
Arthur Casto
Test por Arthur Casto, actualizado hace más de 1 año
Arthur Casto
Creado por Arthur Casto hace alrededor de 6 años
13240
0

Resumen del Recurso

Pregunta 1

Pregunta
The primary purpose of physical security is prevention and protection.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Respuesta
  • Antiterrorism Executive Committee
  • Mission Assurance Senior Steering Group
  • Threat Working Group
  • Antiterrorism Working Group

Pregunta 3

Pregunta
Select ALL the correct responses. Which of the following are facility access control procedures?
Respuesta
  • Entry and exit inspections
  • Electronic gate
  • Identification systems

Pregunta 4

Pregunta
Which of the following physical security countermeasures serve as a security system response force?
Respuesta
  • Security forces
  • Antiterrorism Working Group
  • Counterintelligence
  • OPSEC Personnel

Pregunta 5

Pregunta
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Respuesta
  • Install solid steel doors
  • Mount cameras on the roof
  • Limit the number of entrances and exits to what is necessary

Pregunta 6

Pregunta
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Respuesta
  • True
  • False

Pregunta 7

Pregunta
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
Respuesta
  • risk management process
  • threat assessment process
  • operation assessment process
  • vulnerability assessment process

Pregunta 8

Pregunta
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Respuesta
  • Antiterrorism countermeasures
  • Physical security layer strategies
  • Threat levels

Pregunta 9

Pregunta
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Respuesta
  • Standard Operating Procedures and Post Orders
  • Standard Operating Procedures and the Physical Security Plan
  • Post Orders and the Physical Security Plan

Pregunta 10

Pregunta
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Respuesta
  • True
  • False

Pregunta 11

Pregunta
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
Respuesta
  • OPSEC Officer
  • CI Support
  • Antiterrorism Officer
  • Installation Commander/Facility Director

Pregunta 12

Pregunta
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Respuesta
  • True
  • False

Pregunta 13

Pregunta
Which of the following is the purpose of an interior intrusion detection system (IDS)?
Respuesta
  • To provide a complete solution to a facility security posture.
  • To terminate any intrusion into a facility.
  • To deter, detect, and document intrusion in the environment.

Pregunta 14

Pregunta
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Respuesta
  • Secure rooms
  • Vaults

Pregunta 15

Pregunta
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Respuesta
  • Significant
  • Low
  • High
  • Moderate

Pregunta 16

Pregunta
The primary purpose of physical security is ____________ and protection.
Respuesta
  • attacking intruders
  • prevention
  • security-in-depth

Pregunta 17

Pregunta
Which of the following best defines security-in-depth?
Respuesta
  • The use of fencing around the perimeter of a structure
  • The use of barriers around the perimeter of a structure
  • The layering of physical security measures through the application of active and passive complementary security controls

Pregunta 18

Pregunta
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Respuesta
  • Continuous lighting
  • Standby lighting
  • Movable lighting
  • Emergency

Pregunta 19

Pregunta
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Respuesta
  • Self-Inspection
  • Internal Control Inspection
  • Compliance Inspection

Pregunta 20

Pregunta
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Respuesta
  • Standard Operating Procedures and Post Orders
  • Standard Operating Procedures and the Physical Security Plan
  • Post Orders and the Physical Security Plan

Pregunta 21

Pregunta
Select ALL the correct responses. Security Forces may be comprised of which of the following?
Respuesta
  • Military working dogs
  • Mission Assurance Senior Steering Group
  • DoD civilian personnel
  • Military and contract personnel

Pregunta 22

Pregunta
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Respuesta
  • Antiterrorism
  • Physical Security Plan
  • Threat Level Indicators
  • Force Protection

Pregunta 23

Pregunta
When required, the two-person concept may be part of a facility access control method.
Respuesta
  • True
  • False

Pregunta 24

Pregunta
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Respuesta
  • True
  • False

Pregunta 25

Pregunta
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Respuesta
  • Internal Control Inspection
  • Self-inspection
  • Compliance inspection

Pregunta 26

Pregunta
__________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
Respuesta
  • DoDM 5200.01
  • DoDI 5200.08
  • DoD 5200.08-R

Pregunta 27

Pregunta
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
Respuesta
  • True
  • False

Pregunta 28

Pregunta
The two primary purposes of physical security are protection and _______________?
Respuesta
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Pregunta 29

Pregunta
A guard checking IDs at the gate of an installation is a good example of what type of security?
Respuesta
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Pregunta 30

Pregunta
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Respuesta
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Pregunta 31

Pregunta
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Select all that apply.
Respuesta
  • Identify assets
  • Identify threats
  • Determine countermeasure options
  • Identify vulnerabilities
  • Make risk management decisions

Pregunta 32

Pregunta
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
Respuesta
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Pregunta 33

Pregunta
Which policy should you consult to find the physical security requirements of protecting classified information?
Respuesta
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Pregunta 34

Pregunta
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Respuesta
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Pregunta 35

Pregunta
Who is charged with management, implementation, and direction of all physical security programs?
Respuesta
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Pregunta 36

Pregunta
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Respuesta
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Pregunta 37

Pregunta
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Respuesta
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Pregunta 38

Pregunta
Which of the following individuals should be included in a Threat Working Group? Select all that apply.
Respuesta
  • Antiterrorism Officer
  • Counterintelligence (CI) representative
  • Law enforcement representative
  • Operations security officer
  • Information operations representative
  • Chemical, biological, radiological, nuclear and high yield explosive representative

Pregunta 39

Pregunta
Which of these can be made of solid steel to make them more attack resistant?
Respuesta
  • Walls
  • Doors
  • Windows
  • Roofs

Pregunta 40

Pregunta
Which of these house ventilation systems that should be secured with steel bars?
Respuesta
  • Walls
  • Doors
  • Windows
  • Roofs

Pregunta 41

Pregunta
Which of these should be covered with a protective film to make them less dangerous in an attack?
Respuesta
  • Walls
  • Doors
  • Windows
  • Roofs

Pregunta 42

Pregunta
Which of the following locks are approved to secure classified information or material? Select all that apply.
Respuesta
  • Kaba Mas X-10
  • S&G 8077/AD
  • S&G 833 C

Pregunta 43

Pregunta
Standby lighting is used when regular lighting is not available.
Respuesta
  • True
  • False

Pregunta 44

Pregunta
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Respuesta
  • True
  • False

Pregunta 45

Pregunta
Movable lighting is used when supplemental lighting is needed such as at construction sites.
Respuesta
  • True
  • False

Pregunta 46

Pregunta
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Respuesta
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Pregunta 47

Pregunta
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Respuesta
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Pregunta 48

Pregunta
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Respuesta
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Pregunta 49

Pregunta
Commanders may only implement measures according to the FPCON level in force at the time.
Respuesta
  • True
  • False

Pregunta 50

Pregunta
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Respuesta
  • True
  • False

Pregunta 51

Pregunta
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Respuesta
  • True
  • False

Pregunta 52

Pregunta
Which of the following is an example of a locking device?
Respuesta
  • Bolt
  • Cylinder
  • Key

Pregunta 53

Pregunta
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
Respuesta
  • fire alarms on doors
  • keeping intruders out
  • emergency exit from a locked door

Pregunta 54

Pregunta
The use of a master key system is not acceptable in ____________.
Respuesta
  • barracks
  • general office areas
  • secure areas

Pregunta 55

Pregunta
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Respuesta
  • Count the number of dial rotations in between each number in the combination.
  • Turn the dial and stop it when you see the correct number displayed on the LCD.

Pregunta 56

Pregunta
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Respuesta
  • Locking device
  • Switching device
  • Securing device

Pregunta 57

Pregunta
Which of the following should you do before changing a combination?
Respuesta
  • Try the combination three times
  • Call your FSO
  • Lock drawer in open position

Pregunta 58

Pregunta
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
Respuesta
  • an electromechanical combination lock
  • a combination padlock
  • a mechanical combination lock

Pregunta 59

Pregunta
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Respuesta
  • True
  • False

Pregunta 60

Pregunta
Which of the following is not a locking device for a key-operated lock?
Respuesta
  • Bolt
  • Pin
  • Latch

Pregunta 61

Pregunta
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Respuesta
  • Rim cylinder
  • Interchangeable core cylinder
  • Mortise cylinder

Pregunta 62

Pregunta
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
Respuesta
  • The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
  • The door must be locked to prevent unauthorized entry and exit.
  • The door must be unlocked so that those inside can exit without having to unlock the door.

Pregunta 63

Pregunta
A key and lock custodian should change or rotate locks at least _____________.
Respuesta
  • monthly
  • annually
  • quarterly

Pregunta 64

Pregunta
Which of the following statements is true?
Respuesta
  • You may not change a combination without a commercial locksmith.
  • You may never allow a commercial locksmith to change your combination.
  • You may allow a commercial locksmith to change your combination under certain circumstances.

Pregunta 65

Pregunta
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
Respuesta
  • The combination on that security container must be changed.
  • Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
  • The security container must be replaced.

Pregunta 66

Pregunta
Which electromechanical lock uses battery power?
Respuesta
  • S&G 2740B
  • X-10
  • X-08

Pregunta 67

Pregunta
Which of the following is the purpose of a lock’s switching device?
Respuesta
  • To allow or deny entry into a container or area
  • To authorize the locking device to open
  • To keep the area or container secured

Pregunta 68

Pregunta
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Respuesta
  • A padlock
  • A built-in lock

Pregunta 69

Pregunta
The two primary types of locks used within DoD are ___________ and key locks.
Respuesta
  • Biometric
  • Encoded
  • Voice activated
  • Combination

Pregunta 70

Pregunta
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Respuesta
  • Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
  • Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
  • Locking solutions that provide a higher level of protection are more costly and labor-intensive.

Pregunta 71

Pregunta
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Respuesta
  • True
  • False

Pregunta 72

Pregunta
Pin tumblers are most commonly employed on _______ locks?
Respuesta
  • combination
  • tubular
  • cylinder

Pregunta 73

Pregunta
What is not a responsibility of the Key Custodian?
Respuesta
  • Audit Keys monthly
  • Change or rotate locks quarterly
  • Audit Locks monthly
  • Keep key control register

Pregunta 74

Pregunta
Which of the following is the switching device for a key-operated lock?
Respuesta
  • bolt
  • cylinder
  • key

Pregunta 75

Pregunta
Which of the following is a disadvantage to using a master key system?
Respuesta
  • The cost to re-key all of the locks in the system.
  • It is harder to pick the locks.
  • It is harder to copy the locks.

Pregunta 76

Pregunta
The S&G 2937 lock is an example of which type of combination lock?
Respuesta
  • mechanical built-in
  • padlock
  • electromechanical built-in

Pregunta 77

Pregunta
Many building codes require a facility’s exit doors to contain which of the following devices?
Respuesta
  • An access card
  • Emergency egress hardware
  • A padlock

Pregunta 78

Pregunta
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
Respuesta
  • A built-in lock
  • An approved padlock

Pregunta 79

Pregunta
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Respuesta
  • Federal Specification FF-L-2740B
  • Federal Specification FF-P-110
  • Federal Specification FF-L-2937

Pregunta 80

Pregunta
You need to secure classified information. Which of these locks could you use?
Respuesta
  • X-10 electromechanical lock
  • S&G 2740B
  • S&G 2937 Mechanical Lock
  • S&G 8077 padlock
  • All of these locks

Pregunta 81

Pregunta
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Respuesta
  • A built-in lock
  • A padlock

Pregunta 82

Pregunta
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
Respuesta
  • A built-in lock
  • A padlock

Pregunta 83

Pregunta
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
Respuesta
  • A medium security padlock
  • A deadbolt lock

Pregunta 84

Pregunta
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control? Select all that apply.
Respuesta
  • Protect keys and locks at the same level as classified information they are safeguarding.
  • Maintain a key and lock register.
  • Replace keys and locks if they are lost or compromised.
  • Do not remove keys from certain premises.
  • Do not create master keys.
  • Appoint a key and lock custodian to ensure proper custody and handling of locks and keys.

Pregunta 85

Pregunta
Which of the following are true of master key systems? Select all that apply.
Respuesta
  • The great grand master key opens all of the locks in the system.
  • Replacing a lost master key is inexpensive.
  • They are convenient for managers.
  • They are not authorized for DoD use in barracks.
  • Because of their inherent security risks, their use is discouraged.

Pregunta 86

Pregunta
Switching device: authorizes the operating mechanism to open the lock
Respuesta
  • Cylinder
  • Combination
  • Latch

Pregunta 87

Pregunta
Operating mechanism: interacts with the switching device to allow or deny entry
Respuesta
  • Cylinder
  • Combination
  • Latch

Pregunta 88

Pregunta
Locking device: physically secures area or container
Respuesta
  • Cylinder
  • Combination
  • Latch

Pregunta 89

Pregunta
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced and which would you use?
Respuesta
  • S&G 2740B and Kaba Mas X-10
  • S&G 8088 and Kaba Mas X-09
  • Kaba Mas X-07 and X-08

Pregunta 90

Pregunta
What type of lock is S&G 2740?
Respuesta
  • Mechanical combination lock
  • Electromechanical combination lock
  • High security operated padlock

Pregunta 91

Pregunta
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Respuesta
  • Back up to the number
  • Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
  • Restart the process all over again

Pregunta 92

Pregunta
You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first?
Respuesta
  • Change the combination
  • Open the lock
  • Calibrate the lock

Pregunta 93

Pregunta
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply.
Respuesta
  • Do not write a combination down.
  • Do not change a lock’s combination on a Friday or the day before you go on leave.
  • Change a lock’s combination if the container is discovered unlocked and unattended.
  • Maintain records of who knows lock combinations.
  • Safeguard the combination at appropriate classification level.

Pregunta 94

Pregunta
The S&G 8077/AD combination padlocks are used to secure Secret and Confidential information such as approved bulk and temporary storage indoors.
Respuesta
  • True
  • False

Pregunta 95

Pregunta
What operates most key-operated locks?
Respuesta
  • Wheel packs
  • Cylinders
  • Triggers

Pregunta 96

Pregunta
How often should a key and lock custodian audit keys?
Respuesta
  • Monthly
  • At each change of custody
  • Annually

Pregunta 97

Pregunta
The S&G 8077/AD combination padlocks must comply with which regulations/specifications?
Respuesta
  • Federal Specification FF-P-110
  • Federal Specification FF-L-2937

Pregunta 98

Pregunta
When is it acceptable to change a combination?
Respuesta
  • Up to three days before going on leave
  • When a lock is taken out of service
  • On Fridays

Pregunta 99

Pregunta
Which lock is approved under the Federal Specification FF-P-110?
Respuesta
  • S&G 2740
  • S&G 2740B
  • S&G 2937
  • S&G 8077

Pregunta 100

Pregunta
Which dial rotation do the X-09 and X-10 electromechanical built-in combination locks have in common?
Respuesta
  • left-right-left
  • right only
  • left only

Pregunta 101

Pregunta
What is the locking device for a combination lock?
Respuesta
  • Wheel Pack
  • Combination
  • Bolt

Pregunta 102

Pregunta
If you write a combination down, which of the following must you do?
Respuesta
  • Keep it locked in your desk drawer
  • Destroy it the same day
  • Protect it in the same manner as the highest level of classified information the combination protects.

Pregunta 103

Pregunta
What lock system is considered for Life Safety?
Respuesta
  • LMK 7000
  • S&G 941
  • S&G 2900 PDL
  • X09

Pregunta 104

Pregunta
As a best practice, when a combination is changed, how many times should the new combination by tried before closing the door or drawer?
Respuesta
  • 1
  • 2
  • 3

Pregunta 105

Pregunta
What factor affects decisions made about which users may access a lock, time restrictions on locking/unlocking a lock, and automatic versus manual relocking of a lock?
Respuesta
  • The level of security needed
  • The cost of a lock
  • Life safety

Pregunta 106

Pregunta
Which of the following locking solutions may be used to secure classified information or material?
Respuesta
  • Deadbolt locks
  • Approved key-operated padlocks
  • Cylindrical locks

Pregunta 107

Pregunta
For which of the following areas does the DoD use master key systems?
Respuesta
  • General office areas and barracks type settings
  • Ammunition depots
  • Storage of classified information

Pregunta 108

Pregunta
The type of locking device required is determined by the environment and _________.
Respuesta
  • Facility classification
  • Authorized personnel
  • Asset type
  • Installation commander

Pregunta 109

Pregunta
Which level of security do key-operated built-in locks provide?
Respuesta
  • high
  • low
  • medium

Pregunta 110

Pregunta
Which type of cylinder is most commonly used on inward-opening or front doors?
Respuesta
  • Rim cylinder
  • Mortise cylinder
  • Interchangeable core cylinder

Pregunta 111

Pregunta
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
Respuesta
  • True
  • False

Pregunta 112

Pregunta
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Respuesta
  • Manual
  • Combination
  • Biometric
  • Physical
  • Mechanical
  • Automated

Pregunta 113

Pregunta
Controlled lighting is used when it is necessary to limit the brightness of the light.
Respuesta
  • True
  • False

Pregunta 114

Pregunta
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Respuesta
  • Glare projection
  • Emergency projection
  • Downside illumination
  • Standby illumination

Pregunta 115

Pregunta
Response forces ___________________________________ .
Respuesta
  • respond to alarms and incidents
  • dispatch response forces and mobile patrols
  • guard a high-priority resource
  • can cover large areas in a timely manner

Pregunta 116

Pregunta
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Respuesta
  • Forbid
  • Prevent
  • Document
  • Thwart

Pregunta 117

Pregunta
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
Respuesta
  • screening equipment
  • visual monitoring and deterrence
  • access control systems
  • closed circuit television (CCTV)

Pregunta 118

Pregunta
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Respuesta
  • Transmission line hub
  • Security technology and equipment installation
  • monitoring station

Pregunta 119

Pregunta
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
Respuesta
  • Combination
  • Automated
  • Manual
  • Mechanical
  • Physical

Pregunta 120

Pregunta
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
Respuesta
  • control
  • area security
  • enclaving
  • separation

Pregunta 121

Pregunta
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Respuesta
  • Proprietary monitoring
  • Central station monitoring
  • Local monitoring
  • None of the above

Pregunta 122

Pregunta
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
Respuesta
  • a visitor badge
  • an "escort required" visitor badge only
  • an "escort required" visitor badge and escort
  • a CAC and escort

Pregunta 123

Pregunta
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
Respuesta
  • True
  • False

Pregunta 124

Pregunta
When is a security force response required?
Respuesta
  • When an Intrusion Detection System (IDS) sensor is triggered.
  • When an Intrusion Detection System (IDS) is not reporting an alarm.
  • When an Intrusion Detection System (IDS) protects a highly critical asset.
  • When an Intrusion Detection System (IDS) alarm notification is received.

Pregunta 125

Pregunta
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Respuesta
  • Pedestrian
  • Fixed
  • Intrusive
  • Portable

Pregunta 126

Pregunta
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Respuesta
  • Intrusive and unobtrusive
  • Fixed and portable
  • Portable and closed circuit television (CCTV)
  • Detection and reporting

Pregunta 127

Pregunta
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Respuesta
  • Response/Assessment
  • Detection
  • Dispatch
  • Reporting

Pregunta 128

Pregunta
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Respuesta
  • Central station monitoring
  • Proprietary monitoring
  • Remote monitoring
  • Local monitoring

Pregunta 129

Pregunta
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
Respuesta
  • Combination
  • Physical
  • Manual
  • Automated
  • Biometric

Pregunta 130

Pregunta
How are military working dogs employed by security force members?
Respuesta
  • Assist in drug testing
  • Assist in law enforcement
  • Assist in detecting explosives
  • Assist in confrontation management
  • Assist in pest control

Pregunta 131

Pregunta
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Respuesta
  • Standby lighting
  • Surface lighting
  • Emergency lighting
  • Continuous lighting

Pregunta 132

Pregunta
What are signs, barriers, and fences used for in perimeter protection systems?
Respuesta
  • Deterring unlawful or unauthorized entry
  • Establishing legal boundaries
  • Preventing all types of penetration
  • Integrating protection assets
  • Preventing observation from outside

Pregunta 133

Pregunta
A waterway is an example of what kind of barrier?
Respuesta
  • Clear zone
  • Perimeter
  • Natural
  • Active

Pregunta 134

Pregunta
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
Respuesta
  • True
  • False

Pregunta 135

Pregunta
When are static observation posts used?
Respuesta
  • When continuous surveillance is required.
  • To cover large areas in a timely manner.
  • To monitor alarms and respond to emergencies.
  • To monitor entry to a facility or secure area.

Pregunta 136

Pregunta
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
Respuesta
  • access control
  • closed circuit television (CCTV)
  • a visual deterrent system
  • screening equipment

Pregunta 137

Pregunta
What does an Intrusion Detection System (IDS) detect?
Respuesta
  • Only unauthorized intrusions
  • A change in the state of an indoor detection device by a change in outdoor environmental devices
  • A change in state of detection devices that may require further investigation
  • Prevention of an unauthorized intrusion

Pregunta 138

Pregunta
Integrating layers of security to protect DoD assets is
Respuesta
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Pregunta 139

Pregunta
Guarding a specific asset or resource is
Respuesta
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Pregunta 140

Pregunta
Protecting an entire area such as an installation or facility is called
Respuesta
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Pregunta 141

Pregunta
Designating islands of high security within a sea of moderate security is called
Respuesta
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Pregunta 142

Pregunta
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground.
Respuesta
  • True
  • False

Pregunta 143

Pregunta
Barbed wire is also known as razor wire.
Respuesta
  • True
  • False

Pregunta 144

Pregunta
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
Respuesta
  • True
  • False

Pregunta 145

Pregunta
Rapidly flowing rivers are considered active barriers.
Respuesta
  • True
  • False

Pregunta 146

Pregunta
Which of the following protective barriers would most likely be utilized for its decorative appeal? Select the best answer.
Respuesta
  • Trench
  • Berm
  • Concrete planter
  • Jersey barrier

Pregunta 147

Pregunta
To be effective, clear zones should be free of which of the following? Select the best answer.
Respuesta
  • Trimmed grass
  • Bushes
  • Dirt
  • Fencing

Pregunta 148

Pregunta
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Respuesta
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Pregunta 149

Pregunta
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Respuesta
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Pregunta 150

Pregunta
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Respuesta
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Pregunta 151

Pregunta
When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station.
Respuesta
  • True
  • False

Pregunta 152

Pregunta
Flashlights are a reliable form of continuous lighting.
Respuesta
  • True
  • False

Pregunta 153

Pregunta
Emergency lighting depends upon the power supply of the utility company.
Respuesta
  • True
  • False

Pregunta 154

Pregunta
Standby lighting is the type of lighting used when the primary power source fails.
Respuesta
  • True
  • False

Pregunta 155

Pregunta
Standby lighting is the type of lighting used when the primary power source fails.
Respuesta
  • True
  • False

Pregunta 156

Pregunta
Contract security forces may be either military or civilian.
Respuesta
  • True
  • False

Pregunta 157

Pregunta
Military working dogs can seek, detect, defend their handlers, and guard suspects.
Respuesta
  • True
  • False

Pregunta 158

Pregunta
Which statement best describes the mission of security forces? Select the best answer.
Respuesta
  • To secure Department of Defense buildings inside and out
  • To monitor facility access in the interest of national security
  • To protect Department of Defense assets
  • To protect key Department of Defense officials

Pregunta 159

Pregunta
_________ responds to a physical stimulus
Respuesta
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Pregunta 160

Pregunta
______________ receives change of state and transmits alarm.
Respuesta
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Pregunta 161

Pregunta
_____________ is the central point for collecting alarm status.
Respuesta
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Pregunta 162

Pregunta
__________ assures communications between the alarmed area and the monitoring station
Respuesta
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Pregunta 163

Pregunta
A CCTV camera may capture activity missed by security force personnel.
Respuesta
  • True
  • False

Pregunta 164

Pregunta
A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection.
Respuesta
  • True
  • False

Pregunta 165

Pregunta
An advantage of CCTV is that environmental factors do not affect its performance.
Respuesta
  • True
  • False

Pregunta 166

Pregunta
A CCTV is only as good as the people who operate it.
Respuesta
  • True
  • False

Pregunta 167

Pregunta
Which of the following are access control systems? Select all that apply.
Respuesta
  • Closed circuit television
  • Card-swipe system
  • Joint Personnel Adjudication System (JPAS)
  • Badge exchange program
  • Personal recognition
  • Iris scanning
  • Intrusion detection system

Pregunta 168

Pregunta
Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area.
Respuesta
  • True
  • False

Pregunta 169

Pregunta
The schedules for entry and exit inspections should be posted in view of all DoD personnel.
Respuesta
  • True
  • False

Pregunta 170

Pregunta
All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry.
Respuesta
  • True
  • False

Pregunta 171

Pregunta
Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility.
Respuesta
  • True
  • False

Pregunta 172

Pregunta
Magnetometer
Respuesta
  • Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Pregunta 173

Pregunta
Vapor trace detector
Respuesta
  • \Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Pregunta 174

Pregunta
Wand
Respuesta
  • Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Pregunta 175

Pregunta
What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access?
Respuesta
  • Automated
  • Biometric
  • Programmed
  • Manual
  • Combination

Pregunta 176

Pregunta
What are some important considerations in planning for your monitoring station? Select all that apply.
Respuesta
  • Alarm zones
  • Staffing
  • Transmission line security
  • Response levels
  • Premise Control Unit (PCU)

Pregunta 177

Pregunta
What kind of screening equipment is effective for screening the things people bring in to facilities?
Respuesta
  • Vapor trace detectors
  • Magnetometers
  • Conveyor belt style x-ray machines
  • Infrared scanners

Pregunta 178

Pregunta
What are the characteristics of passive barrier systems? Select one or more:
Respuesta
  • Have substantial bulk or mass
  • Are permanently installed or require heavy equipment to move
  • Require manual operation by security forces
  • Have moving parts

Pregunta 179

Pregunta
Government security forces are made up of military personnel, civilian employees or contractor personnel.
Respuesta
  • True
  • False

Pregunta 180

Pregunta
When an individual resource requires individual protection, you would employ ____________ security.
Respuesta
  • point
  • direct
  • moderate
  • area

Pregunta 181

Pregunta
The Joint Personnel Adjudication System (JPAS) is an access control system because it is used to verify the level of access eligibility for specific individuals.
Respuesta
  • True
  • False

Pregunta 182

Pregunta
What method of security lighting uses lights slightly inside a security perimeter and directed outward?
Respuesta
  • Controlled lighting
  • Emergency projection
  • Downside illumination
  • Glare projection

Pregunta 183

Pregunta
Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions.
Respuesta
  • True
  • False

Pregunta 184

Pregunta
An Intrusion Detection System (IDS) is composed of a combination of components integrated to operate in a specific manner to detect a change in the environment by a change of state of detection device.
Respuesta
  • True
  • False

Pregunta 185

Pregunta
What is an appropriate response when fixed screening equipment sets of an alarm?
Respuesta
  • Refer to local law enforcement
  • Using portable screening equipment
  • Experimental technology
  • Hand screening
  • Monitor closed circuit television (CCTV)
  • Manual search

Pregunta 186

Pregunta
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters.
Respuesta
  • True
  • False

Pregunta 187

Pregunta
Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes?
Respuesta
  • Controlled
  • Surface
  • Emergency
  • Glare projection

Pregunta 188

Pregunta
An Intrusion Detection System (IDS) used with a closed circuit television (CCTV) system is likely to result in distractions to the operator and a reduction in security efficiency.
Respuesta
  • True
  • False

Pregunta 189

Pregunta
What are the operational phases of an Intrusion Detection system?
Respuesta
  • Detection, Reporting, Dispatch, and Response/Assessment
  • Alarm Initiation, Response, Termination, Assessment/Cancellation
  • Alarm Silencing, Dispatch, Response, Termination
  • Diversion, Response Force Dispatch, Response, Assessment/Cancellation

Pregunta 190

Pregunta
If a raccoon sets off a fence sensor, what kind of alarm occurs?
Respuesta
  • Nuisance alarm
  • False alarm
  • Intruder alarm
  • Maintenance alarm

Pregunta 191

Pregunta
______________ fencing is used to protect a stationary perimeter.
Respuesta
  • Portable
  • Permanent
  • Electric
  • Adaptable

Pregunta 192

Pregunta
What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli?
Respuesta
  • Reporting
  • Dispatch
  • Detection
  • Response/Assessment

Pregunta 193

Pregunta
Identify the best practices for security inspections. (Entry/Exit) Select all that apply.
Respuesta
  • Conduct security inspections randomly or during periods of increased alertness
  • No notice should be provided to individuals that they may be subject to inspections
  • Security inspections should prevent or deter the introduction of unauthorized or prohibited material into an installation or facility
  • Only senior officials and security personnel should know security inspection schedules

Pregunta 194

Pregunta
What comprises an Intrusion Detection System (IDS) “alarmed area.”
Respuesta
  • Sensors and alarm zones
  • The PCU and the monitoring station
  • The PCU and the sensors it serves
  • A dedicated panel or central processor unit

Pregunta 195

Pregunta
Selection of a manual or automated access control system is based on _______________ .
Respuesta
  • availability of funding
  • risk management
  • threat assessment
  • availability of assets

Pregunta 196

Pregunta
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Respuesta
  • Vulnerabilities
  • Risks
  • Threats

Pregunta 197

Pregunta
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Respuesta
  • True
  • False

Pregunta 198

Pregunta
Rivers, cliffs, and dense growth are examples of which type of barrier?
Respuesta
  • Active barrier
  • Natural barrier
  • Passive barrier

Pregunta 199

Pregunta
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
Respuesta
  • True
  • False

Pregunta 200

Pregunta
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Respuesta
  • Compliance inspections
  • Self-inspections
  • Surveys
  • Staff assist visits
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls