The primary purpose of physical security is prevention and protection.
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Antiterrorism Executive Committee
Mission Assurance Senior Steering Group
Threat Working Group
Antiterrorism Working Group
Select ALL the correct responses. Which of the following are facility access control procedures?
Entry and exit inspections
Electronic gate
Identification systems
Which of the following physical security countermeasures serve as a security system response force?
Security forces
Counterintelligence
OPSEC Personnel
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Install solid steel doors
Mount cameras on the roof
Limit the number of entrances and exits to what is necessary
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
risk management process
threat assessment process
operation assessment process
vulnerability assessment process
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Antiterrorism countermeasures
Physical security layer strategies
Threat levels
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Standard Operating Procedures and Post Orders
Standard Operating Procedures and the Physical Security Plan
Post Orders and the Physical Security Plan
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
OPSEC Officer
CI Support
Antiterrorism Officer
Installation Commander/Facility Director
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Which of the following is the purpose of an interior intrusion detection system (IDS)?
To provide a complete solution to a facility security posture.
To terminate any intrusion into a facility.
To deter, detect, and document intrusion in the environment.
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Secure rooms
Vaults
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Significant
Low
High
Moderate
The primary purpose of physical security is ____________ and protection.
attacking intruders
prevention
security-in-depth
Which of the following best defines security-in-depth?
The use of fencing around the perimeter of a structure
The use of barriers around the perimeter of a structure
The layering of physical security measures through the application of active and passive complementary security controls
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Continuous lighting
Standby lighting
Movable lighting
Emergency
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Self-Inspection
Internal Control Inspection
Compliance Inspection
Select ALL the correct responses. Security Forces may be comprised of which of the following?
Military working dogs
DoD civilian personnel
Military and contract personnel
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Antiterrorism
Physical Security Plan
Threat Level Indicators
Force Protection
When required, the two-person concept may be part of a facility access control method.
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Self-inspection
Compliance inspection
__________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
DoDM 5200.01
DoDI 5200.08
DoD 5200.08-R
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
The two primary purposes of physical security are protection and _______________?
Security-in-depth
Prevention
Point security
Area security
A guard checking IDs at the gate of an installation is a good example of what type of security?
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Select all that apply.
Identify assets
Identify threats
Determine countermeasure options
Identify vulnerabilities
Make risk management decisions
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
DoD 5200.08-R, Physical Security Program
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Which policy should you consult to find the physical security requirements of protecting classified information?
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Who is charged with management, implementation, and direction of all physical security programs?
Law Enforcement
Physical Security Officer
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Which of the following individuals should be included in a Threat Working Group? Select all that apply.
Counterintelligence (CI) representative
Law enforcement representative
Operations security officer
Information operations representative
Chemical, biological, radiological, nuclear and high yield explosive representative
Which of these can be made of solid steel to make them more attack resistant?
Walls
Doors
Windows
Roofs
Which of these house ventilation systems that should be secured with steel bars?
Which of these should be covered with a protective film to make them less dangerous in an attack?
Which of the following locks are approved to secure classified information or material? Select all that apply.
Kaba Mas X-10
S&G 8077/AD
S&G 833 C
Standby lighting is used when regular lighting is not available.
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Movable lighting is used when supplemental lighting is needed such as at construction sites.
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Standard Operating Procedures
Physical Security Plans
Post Orders
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Commanders may only implement measures according to the FPCON level in force at the time.
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Which of the following is an example of a locking device?
Bolt
Cylinder
Key
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
fire alarms on doors
keeping intruders out
emergency exit from a locked door
The use of a master key system is not acceptable in ____________.
barracks
general office areas
secure areas
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Count the number of dial rotations in between each number in the combination.
Turn the dial and stop it when you see the correct number displayed on the LCD.
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Locking device
Switching device
Securing device
Which of the following should you do before changing a combination?
Try the combination three times
Call your FSO
Lock drawer in open position
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
an electromechanical combination lock
a combination padlock
a mechanical combination lock
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Which of the following is not a locking device for a key-operated lock?
Pin
Latch
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Rim cylinder
Interchangeable core cylinder
Mortise cylinder
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
The door must be locked to prevent unauthorized entry and exit.
The door must be unlocked so that those inside can exit without having to unlock the door.
A key and lock custodian should change or rotate locks at least _____________.
monthly
annually
quarterly
Which of the following statements is true?
You may not change a combination without a commercial locksmith.
You may never allow a commercial locksmith to change your combination.
You may allow a commercial locksmith to change your combination under certain circumstances.
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
The combination on that security container must be changed.
Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
The security container must be replaced.
Which electromechanical lock uses battery power?
S&G 2740B
X-10
X-08
Which of the following is the purpose of a lock’s switching device?
To allow or deny entry into a container or area
To authorize the locking device to open
To keep the area or container secured
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
A padlock
A built-in lock
The two primary types of locks used within DoD are ___________ and key locks.
Biometric
Encoded
Voice activated
Combination
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
Locking solutions that provide a higher level of protection are more costly and labor-intensive.
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Pin tumblers are most commonly employed on _______ locks?
combination
tubular
cylinder
What is not a responsibility of the Key Custodian?
Audit Keys monthly
Change or rotate locks quarterly
Audit Locks monthly
Keep key control register
Which of the following is the switching device for a key-operated lock?
bolt
key
Which of the following is a disadvantage to using a master key system?
The cost to re-key all of the locks in the system.
It is harder to pick the locks.
It is harder to copy the locks.
The S&G 2937 lock is an example of which type of combination lock?
mechanical built-in
padlock
electromechanical built-in
Many building codes require a facility’s exit doors to contain which of the following devices?
An access card
Emergency egress hardware
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
An approved padlock
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Federal Specification FF-L-2740B
Federal Specification FF-P-110
Federal Specification FF-L-2937
You need to secure classified information. Which of these locks could you use?
X-10 electromechanical lock
S&G 2937 Mechanical Lock
S&G 8077 padlock
All of these locks
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
A medium security padlock
A deadbolt lock
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control? Select all that apply.
Protect keys and locks at the same level as classified information they are safeguarding.
Maintain a key and lock register.
Replace keys and locks if they are lost or compromised.
Do not remove keys from certain premises.
Do not create master keys.
Appoint a key and lock custodian to ensure proper custody and handling of locks and keys.
Which of the following are true of master key systems? Select all that apply.
The great grand master key opens all of the locks in the system.
Replacing a lost master key is inexpensive.
They are convenient for managers.
They are not authorized for DoD use in barracks.
Because of their inherent security risks, their use is discouraged.
Switching device: authorizes the operating mechanism to open the lock
Operating mechanism: interacts with the switching device to allow or deny entry
Locking device: physically secures area or container
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced and which would you use?
S&G 2740B and Kaba Mas X-10
S&G 8088 and Kaba Mas X-09
Kaba Mas X-07 and X-08
What type of lock is S&G 2740?
Mechanical combination lock
Electromechanical combination lock
High security operated padlock
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Back up to the number
Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
Restart the process all over again
You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first?
Change the combination
Open the lock
Calibrate the lock
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply.
Do not write a combination down.
Do not change a lock’s combination on a Friday or the day before you go on leave.
Change a lock’s combination if the container is discovered unlocked and unattended.
Maintain records of who knows lock combinations.
Safeguard the combination at appropriate classification level.
The S&G 8077/AD combination padlocks are used to secure Secret and Confidential information such as approved bulk and temporary storage indoors.
What operates most key-operated locks?
Wheel packs
Cylinders
Triggers
How often should a key and lock custodian audit keys?
Monthly
At each change of custody
Annually
The S&G 8077/AD combination padlocks must comply with which regulations/specifications?
When is it acceptable to change a combination?
Up to three days before going on leave
When a lock is taken out of service
On Fridays
Which lock is approved under the Federal Specification FF-P-110?
S&G 2740
S&G 2937
S&G 8077
Which dial rotation do the X-09 and X-10 electromechanical built-in combination locks have in common?
left-right-left
right only
left only
What is the locking device for a combination lock?
Wheel Pack
If you write a combination down, which of the following must you do?
Keep it locked in your desk drawer
Destroy it the same day
Protect it in the same manner as the highest level of classified information the combination protects.
What lock system is considered for Life Safety?
LMK 7000
S&G 941
S&G 2900 PDL
X09
As a best practice, when a combination is changed, how many times should the new combination by tried before closing the door or drawer?
1
2
3
What factor affects decisions made about which users may access a lock, time restrictions on locking/unlocking a lock, and automatic versus manual relocking of a lock?
The level of security needed
The cost of a lock
Life safety
Which of the following locking solutions may be used to secure classified information or material?
Deadbolt locks
Approved key-operated padlocks
Cylindrical locks
For which of the following areas does the DoD use master key systems?
General office areas and barracks type settings
Ammunition depots
Storage of classified information
The type of locking device required is determined by the environment and _________.
Facility classification
Authorized personnel
Asset type
Installation commander
Which level of security do key-operated built-in locks provide?
high
low
medium
Which type of cylinder is most commonly used on inward-opening or front doors?
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Manual
Physical
Mechanical
Automated
Controlled lighting is used when it is necessary to limit the brightness of the light.
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Glare projection
Emergency projection
Downside illumination
Standby illumination
Response forces ___________________________________ .
respond to alarms and incidents
dispatch response forces and mobile patrols
guard a high-priority resource
can cover large areas in a timely manner
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Forbid
Prevent
Document
Thwart
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
screening equipment
visual monitoring and deterrence
access control systems
closed circuit television (CCTV)
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Transmission line hub
Security technology and equipment installation
monitoring station
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
control
area security
enclaving
separation
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Proprietary monitoring
Central station monitoring
Local monitoring
None of the above
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
a visitor badge
an "escort required" visitor badge only
an "escort required" visitor badge and escort
a CAC and escort
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
When is a security force response required?
When an Intrusion Detection System (IDS) sensor is triggered.
When an Intrusion Detection System (IDS) is not reporting an alarm.
When an Intrusion Detection System (IDS) protects a highly critical asset.
When an Intrusion Detection System (IDS) alarm notification is received.
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Pedestrian
Fixed
Intrusive
Portable
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Intrusive and unobtrusive
Fixed and portable
Portable and closed circuit television (CCTV)
Detection and reporting
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Response/Assessment
Detection
Dispatch
Reporting
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Remote monitoring
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
How are military working dogs employed by security force members?
Assist in drug testing
Assist in law enforcement
Assist in detecting explosives
Assist in confrontation management
Assist in pest control
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Surface lighting
Emergency lighting
What are signs, barriers, and fences used for in perimeter protection systems?
Deterring unlawful or unauthorized entry
Establishing legal boundaries
Preventing all types of penetration
Integrating protection assets
Preventing observation from outside
A waterway is an example of what kind of barrier?
Clear zone
Perimeter
Natural
Active
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
When are static observation posts used?
When continuous surveillance is required.
To cover large areas in a timely manner.
To monitor alarms and respond to emergencies.
To monitor entry to a facility or secure area.
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
access control
a visual deterrent system
What does an Intrusion Detection System (IDS) detect?
Only unauthorized intrusions
A change in the state of an indoor detection device by a change in outdoor environmental devices
A change in state of detection devices that may require further investigation
Prevention of an unauthorized intrusion
Integrating layers of security to protect DoD assets is
Point Security
Enclaving
Area Security
Guarding a specific asset or resource is
Protecting an entire area such as an installation or facility is called
Designating islands of high security within a sea of moderate security is called
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground.
Barbed wire is also known as razor wire.
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
Rapidly flowing rivers are considered active barriers.
Which of the following protective barriers would most likely be utilized for its decorative appeal? Select the best answer.
Trench
Berm
Concrete planter
Jersey barrier
To be effective, clear zones should be free of which of the following? Select the best answer.
Trimmed grass
Bushes
Dirt
Fencing
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Glare Projection
Controlled Lighting
Surface Lighting
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station.
Flashlights are a reliable form of continuous lighting.
Emergency lighting depends upon the power supply of the utility company.
Standby lighting is the type of lighting used when the primary power source fails.
Contract security forces may be either military or civilian.
Military working dogs can seek, detect, defend their handlers, and guard suspects.
Which statement best describes the mission of security forces? Select the best answer.
To secure Department of Defense buildings inside and out
To monitor facility access in the interest of national security
To protect Department of Defense assets
To protect key Department of Defense officials
_________ responds to a physical stimulus
Sensor/detector
Transmission line security
Premise Control Unit (PCU)
Monitoring station
______________ receives change of state and transmits alarm.
_____________ is the central point for collecting alarm status.
__________ assures communications between the alarmed area and the monitoring station
A CCTV camera may capture activity missed by security force personnel.
A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection.
An advantage of CCTV is that environmental factors do not affect its performance.
A CCTV is only as good as the people who operate it.
Which of the following are access control systems? Select all that apply.
Closed circuit television
Card-swipe system
Joint Personnel Adjudication System (JPAS)
Badge exchange program
Personal recognition
Iris scanning
Intrusion detection system
Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area.
The schedules for entry and exit inspections should be posted in view of all DoD personnel.
All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry.
Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility.
Magnetometer
Fixed equipment that detects metal objects
Detects traces of explosive material
Portable equipment that detects metal objects
Detects prohibited items
Vapor trace detector
\Fixed equipment that detects metal objects
Wand
What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access?
Programmed
What are some important considerations in planning for your monitoring station? Select all that apply.
Alarm zones
Staffing
Response levels
What kind of screening equipment is effective for screening the things people bring in to facilities?
Vapor trace detectors
Magnetometers
Conveyor belt style x-ray machines
Infrared scanners
What are the characteristics of passive barrier systems? Select one or more:
Have substantial bulk or mass
Are permanently installed or require heavy equipment to move
Require manual operation by security forces
Have moving parts
Government security forces are made up of military personnel, civilian employees or contractor personnel.
When an individual resource requires individual protection, you would employ ____________ security.
point
direct
moderate
area
The Joint Personnel Adjudication System (JPAS) is an access control system because it is used to verify the level of access eligibility for specific individuals.
What method of security lighting uses lights slightly inside a security perimeter and directed outward?
Controlled lighting
Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions.
An Intrusion Detection System (IDS) is composed of a combination of components integrated to operate in a specific manner to detect a change in the environment by a change of state of detection device.
What is an appropriate response when fixed screening equipment sets of an alarm?
Refer to local law enforcement
Using portable screening equipment
Experimental technology
Hand screening
Monitor closed circuit television (CCTV)
Manual search
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters.
Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes?
Controlled
Surface
An Intrusion Detection System (IDS) used with a closed circuit television (CCTV) system is likely to result in distractions to the operator and a reduction in security efficiency.
What are the operational phases of an Intrusion Detection system?
Detection, Reporting, Dispatch, and Response/Assessment
Alarm Initiation, Response, Termination, Assessment/Cancellation
Alarm Silencing, Dispatch, Response, Termination
Diversion, Response Force Dispatch, Response, Assessment/Cancellation
If a raccoon sets off a fence sensor, what kind of alarm occurs?
Nuisance alarm
False alarm
Intruder alarm
Maintenance alarm
______________ fencing is used to protect a stationary perimeter.
Permanent
Electric
Adaptable
What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli?
Identify the best practices for security inspections. (Entry/Exit) Select all that apply.
Conduct security inspections randomly or during periods of increased alertness
No notice should be provided to individuals that they may be subject to inspections
Security inspections should prevent or deter the introduction of unauthorized or prohibited material into an installation or facility
Only senior officials and security personnel should know security inspection schedules
What comprises an Intrusion Detection System (IDS) “alarmed area.”
Sensors and alarm zones
The PCU and the monitoring station
The PCU and the sensors it serves
A dedicated panel or central processor unit
Selection of a manual or automated access control system is based on _______________ .
availability of funding
risk management
threat assessment
availability of assets
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Vulnerabilities
Risks
Threats
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Rivers, cliffs, and dense growth are examples of which type of barrier?
Active barrier
Natural barrier
Passive barrier
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Compliance inspections
Self-inspections
Surveys
Staff assist visits