Arthur Casto
Test por , creado hace más de 1 año

Security Test sobre PSC 2, creado por Arthur Casto el 12/11/2018.

7259
0
0
Arthur Casto
Creado por Arthur Casto hace alrededor de 6 años
Cerrar

PSC 2

Pregunta 1 de 200

1

In a tactical environment, Physical Security Plans should be based on METT-TC, which stands for mission, _______________, terrain and weather, troops, time available, and civilian considerations.

Selecciona una de las siguientes respuestas posibles:

  • Exercises

  • Equipment

  • Enemy

Explicación

Pregunta 2 de 200

1

Providing information on the capabilities and intentions of our adversaries is the responsibility of the ____________.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Officer

  • Commander or Director

  • Antiterrorism Officer

  • Operational Security Officer

  • Counterintelligence Agent

Explicación

Pregunta 3 de 200

1

Force Protection Conditions (FPCONs) are graduated categories of measures or actions commanders take to protect personnel and assets from attack.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 4 de 200

1

________________ establish duties, roles and responsibilities at individual assignments, checkpoints, gates and guard posts.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Plans (PSP)

  • Memorandums of Understanding (MOU)

  • Post Orders

Explicación

Pregunta 5 de 200

1

_________________, the inspector should review any local security directives, the Physical Security Plan, its Standard Operating Procedures, and any previous inspection reports, exceptions, and waivers.

Selecciona una de las siguientes respuestas posibles:

  • When preparing the inspection report

  • During the inspection

  • In preparation for an inspection

Explicación

Pregunta 6 de 200

1

A ______________ defines emergency delegations of authority and orders of succession to ensure DoD Component Mission Essential Functions (MEFs) continue under all circumstances.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Plan (PSP)

  • Continuity of Operations Plan (COOP)

  • Memorandum of Agreement (MOA)

Explicación

Pregunta 7 de 200

1

Threat levels assist senior leaders to determine the appropriate ________ level.

Selecciona una de las siguientes respuestas posibles:

  • Classification designation

  • FPCON

  • SOP

  • GSA security specification

Explicación

Pregunta 8 de 200

1

Two antiterrorism tools the DoD uses to safeguard DoD assets are __________________ and _______________.

Selecciona una de las siguientes respuestas posibles:

  • Force Protection Conditions (FPCONs) and Terrorist Threat Levels

  • Threat Working Group and Post Orders

  • Countermeasures and Standard Operating Procedures

Explicación

Pregunta 9 de 200

1

__________________ issue Force Protection Conditions (FPCONs).

Selecciona una de las siguientes respuestas posibles:

  • COCOMs and Installation Commanders/Facility Directors

  • The DHS and COCOMs

  • The DIA and COCOMs

Explicación

Pregunta 10 de 200

1

It’s better for an inspector not to announce the inspection in order to create a surprise effect and see how everything really operates.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 11 de 200

1

Which system detects a change in the environment and transmits an alarm?

Selecciona una de las siguientes respuestas posibles:

  • CCTV

  • Access Controls Systems

  • IDS

Explicación

Pregunta 12 de 200

1

___________________ are often overlooked in physical security planning and implementation.

Selecciona una de las siguientes respuestas posibles:

  • Lights

  • Barriers

  • Man-passable openings

Explicación

Pregunta 13 de 200

1

Lighting deters unauthorized entry by providing a psychological deterrence to intruders.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 14 de 200

1

______________________ are formal agreements that provide security assistance between DoD activities and from local law enforcement agencies as well as mutual aid from local fire and medical services.

Selecciona una de las siguientes respuestas posibles:

  • Standard Operating Procedures (SOP)

  • Physical Security Plans (PSP)

  • Memorandums of Understanding and Agreement (MOU/MOA)

Explicación

Pregunta 15 de 200

1

When assessing an asset, you must determine the nature and the value of that asset and the degree of impact if the asset is damaged or lost.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 16 de 200

1

FPCON _________ applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific target is imminent.

Selecciona una de las siguientes respuestas posibles:

  • Normal

  • Alpha

  • Bravo

  • Charlie

  • Delta

Explicación

Pregunta 17 de 200

1

There is a one for one correlation between Terrorist Threat Levels and force Protection Conditions.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 18 de 200

1

The _____________________ develops and refines terrorism threat assessments and coordinates and disseminates threat warnings, reports, and summaries.

Selecciona una de las siguientes respuestas posibles:

  • Defense Critical Infrastructure Protection (DCIP) Working Group

  • Antiterrorism Working Group (ATWG)

  • Threat Working Group (TWG)

Explicación

Pregunta 19 de 200

1

Examples of oversight tools include day-to-day observations, surveys, staff assist visits, ______________, and the operational environment.

Selecciona una de las siguientes respuestas posibles:

  • Policy manuals

  • Inspections

  • Executive Orders

Explicación

Pregunta 20 de 200

1

_____________________ are based on information about terrorist groups such as their operational capability, intentions, activity, and the operational environment.

Selecciona una de las siguientes respuestas posibles:

  • Continuity of Operations Plans (COOPs)

  • Counterterrorism measures

  • DoD Terrorist Threat Levels

  • Force Protection Conditions (FPCONs)

Explicación

Pregunta 21 de 200

1

Although the DoD issues DoD-wide guidance for physical security planning and implementation, you should always consult ______________ for specific guidance.

Selecciona una de las siguientes respuestas posibles:

  • Your component’s policies

  • Congressional legislation

  • Executive Orders

Explicación

Pregunta 22 de 200

1

As a physical security specialist, you may assume different physical security roles or serve on different working groups, such as the ATWG, TWG, and DCIP.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 23 de 200

1

_______________ can result from day-to-day observations or more formal oversight.

Selecciona una de las siguientes respuestas posibles:

  • Inspection reports

  • Incident reports

  • Surveys

Explicación

Pregunta 24 de 200

1

Antiterrorism physical security measures incorporate detection, deterrence, denial and ____________.

Selecciona una de las siguientes respuestas posibles:

  • Documentation

  • Evaluation

  • Determination

  • Notification

Explicación

Pregunta 25 de 200

1

Which of the following statements are true of physical security planning and implementation? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets.

  • Protection of DoD assets must be performed at any cost; therefore, a cost vs. benefit analysis is not necessary.

  • Use of oversight tools is an important part of physical security implementation.

  • Facility design must be considered in physical security planning.

Explicación

Pregunta 26 de 200

1

Which of the following would best be described as a DoD asset?

Selecciona una de las siguientes respuestas posibles:

  • Terrorist

  • Fence

  • Open, unattended installation gate

  • Arms and ammunition

  • Loss of life

Explicación

Pregunta 27 de 200

1

Which of the following would best be described as a threat?

Selecciona una de las siguientes respuestas posibles:

  • Terrorist

  • Fence

  • Open, unattended installation gate

  • Arms and ammunition

  • Loss of life

Explicación

Pregunta 28 de 200

1

Which of the following would best be described as a vulnerability?

Selecciona una de las siguientes respuestas posibles:

  • Terrorist

  • Fence

  • Open, unattended installation gate

  • Arms and ammunition

  • Loss of life

Explicación

Pregunta 29 de 200

1

Which of the following would best be described as a risk?

Selecciona una de las siguientes respuestas posibles:

  • Terrorist

  • Fence

  • Open, unattended installation gate

  • Arms and ammunition

  • Loss of life

Explicación

Pregunta 30 de 200

1

Which of the following would best be described as a countermeasure?

Selecciona una de las siguientes respuestas posibles:

  • Terrorist

  • Fence

  • Open, unattended installation gate

  • Arms and ammunition

  • Loss of life

Explicación

Pregunta 31 de 200

1

The ________ is responsible for the installation’s antiterrorism program.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 32 de 200

1

________ is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 33 de 200

1

The ________ analyzes threats to assets and their vulnerabilities.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 34 de 200

1

________ must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 35 de 200

1

The ________ is charged with the management, implementation, and direction of all physical security programs.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 36 de 200

1

The ________ is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility.

Selecciona una de las siguientes respuestas posibles:

  • Law Enforcement

  • Antiterrorism Officer

  • OPSEC Officer

  • CI Support

  • Physical Security Officer

  • DCIP Officer

  • Installation Commander/Facility Director

Explicación

Pregunta 37 de 200

1

Flashlights are a reliable form of continuous lighting.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 38 de 200

1

Emergency lighting depends upon the power supply of the utility company.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 39 de 200

1

Standby lighting is the type of lighting used when the primary power source fails.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 40 de 200

1

Certain types of lighting can incapacitate an intruder.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 41 de 200

1

Controlled lighting is used to illuminate the perimeter of a facility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 42 de 200

1

_________ is often used as a temporary barrier when rolled out on the ground.

Selecciona una de las siguientes respuestas posibles:

  • Barbed wire

  • Concertina wire

  • Chain-link fencing

  • Metal ornamental high-security fencing

Explicación

Pregunta 43 de 200

1

_________ can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fencing.

Selecciona una de las siguientes respuestas posibles:

  • Barbed wire

  • Concertina wire

  • Chain-link fencing

  • Metal ornamental high-security fencing

Explicación

Pregunta 44 de 200

1

_________ is more difficult for intruders to scale.

Selecciona una de las siguientes respuestas posibles:

  • Barbed wire

  • Concertina wire

  • Chain-link fencing

  • Metal ornamental high-security fencing

Explicación

Pregunta 45 de 200

1

_________ is a common type of perimeter fencing for DoD facilities.

Selecciona una de las siguientes respuestas posibles:

  • Barbed wire

  • Concertina wire

  • Chain-link fencing

  • Metal ornamental high-security fencing

Explicación

Pregunta 46 de 200

1

Securing man-passable openings is one of the most overlooked physical security protective measures.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 47 de 200

1

Intrusion Detection Systems (IDS) prevent unauthorized entry.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 48 de 200

1

Cost and risk must always be considered when planning which physical security measures to use in a facility or installation.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 49 de 200

1

Access control systems help to prevent unauthorized entry.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 50 de 200

1

CCTV can deter loss, theft, or misuse of government property and resources.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 51 de 200

1

Operational/administrative procedures for normal and emergency situations

Selecciona una de las siguientes respuestas posibles:

  • COOP

  • MOU/MOA

  • Post Orders

  • SOP

  • PSP

Explicación

Pregunta 52 de 200

1

Comprehensive protective measures for an installation, facility, or activity

Selecciona una de las siguientes respuestas posibles:

  • COOP

  • MOU/MOA

  • Post Orders

  • SOP

  • PSP

Explicación

Pregunta 53 de 200

1

Roles and responsibilities for individual work areas such as checkpoints and guard gates

Selecciona una de las siguientes respuestas posibles:

  • COOP

  • MOU/MOA

  • Post Orders

  • SOP

  • PSP

Explicación

Pregunta 54 de 200

1

Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency

Selecciona una de las siguientes respuestas posibles:

  • COOP

  • MOU/MOA

  • Post Orders

  • SOP

  • PSP

Explicación

Pregunta 55 de 200

1

Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity

Selecciona una de las siguientes respuestas posibles:

  • COOP

  • MOU/MOA

  • Post Orders

  • SOP

  • PSP

Explicación

Pregunta 56 de 200

1

Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 57 de 200

1

Both the DIA and COCOMs issue FPCONs.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 58 de 200

1

Installation commanders and facility directors issue DoD Terrorist Threat Levels.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 59 de 200

1

Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 60 de 200

1

FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 61 de 200

1

System that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets

Selecciona una de las siguientes respuestas posibles:

  • Terrorist Threat Levels

  • Force Protection

  • DoD AT Program

  • Force Protection Conditions

Explicación

Pregunta 62 de 200

1

The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents

Selecciona una de las siguientes respuestas posibles:

  • Terrorist Threat Levels

  • Force Protection

  • DoD AT Program

  • Force Protection Conditions

Explicación

Pregunta 63 de 200

1

Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests

Selecciona una de las siguientes respuestas posibles:

  • Terrorist Threat Levels

  • Force Protection

  • DoD AT Program

  • Force Protection Conditions

Explicación

Pregunta 64 de 200

1

Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information

Selecciona una de las siguientes respuestas posibles:

  • Terrorist Threat Levels

  • Force Protection

  • DoD AT Program

  • Force Protection Conditions

Explicación

Pregunta 65 de 200

1

Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program

Selecciona una de las siguientes respuestas posibles:

  • Surveys

  • Staff assist visits

  • Compliance inspections

  • Day-to-day observations

  • Management/self-inspections

Explicación

Pregunta 66 de 200

1

Formal reviews conducted by senior officials in the chain-of-command

Selecciona una de las siguientes respuestas posibles:

  • Surveys

  • Staff assist visits

  • Compliance inspections

  • Day-to-day observations

  • Management/self-inspections

Explicación

Pregunta 67 de 200

1

Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection

Selecciona una de las siguientes respuestas posibles:

  • Surveys

  • Staff assist visits

  • Compliance inspections

  • Day-to-day observations

  • Management/self-inspections

Explicación

Pregunta 68 de 200

1

Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility

Selecciona una de las siguientes respuestas posibles:

  • Surveys

  • Staff assist visits

  • Compliance inspections

  • Day-to-day observations

  • Management/self-inspections

Explicación

Pregunta 69 de 200

1

Most common and informal oversight tool; immediate action taken to correct deficiencies

Selecciona una de las siguientes respuestas posibles:

  • Surveys

  • Staff assist visits

  • Compliance inspections

  • Day-to-day observations

  • Management/self-inspections

Explicación

Pregunta 70 de 200

1

You must use the ________________ process to acquire and analyze the information necessary for protecting assets and allocating security resources against the threats

Selecciona una de las siguientes respuestas posibles:

  • physical security implementation

  • oversight and inspection

  • risk management

Explicación

Pregunta 71 de 200

1

The first line of defense in any facility is usually some form of perimeter protection.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 72 de 200

1

The purpose of oversight of physical security programs is to ensure the security program complies with DoD and other policies, is cost-effective, and protects DoD assets.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 73 de 200

1

Authorized personnel may augment their FPCON by adding measures from higher FPCON standards as they deem necessary.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 74 de 200

1

A __________ threat level signifies anti-U.S. terrorists are operationally active and the operating environment favors the terrorists.

Selecciona una de las siguientes respuestas posibles:

  • High

  • Significant

  • Low

  • Moderate

Explicación

Pregunta 75 de 200

1

During an inspection, the inspector should use a checklist, talk with people, examine and test products, advise personnel about policy and changes to policy, and __________________________________.

Selecciona una de las siguientes respuestas posibles:

  • send violators to the senior manager’s office for reprimand

  • issue security violation citations on the spot

  • take good notes

Explicación

Pregunta 76 de 200

1

The use of glare lighting can incapacitate intruders.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 77 de 200

1

Physical security planning includes facility design, creation of written plans such as a Physical Security Plan (PSP), and antiterrorism planning.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 78 de 200

1

Barriers are generally used to deter and delay unauthorized entry, define boundaries, and _______________.

Selecciona una de las siguientes respuestas posibles:

  • Channel vehicular and pedestrian traffic

  • Detect intruders

  • Incapacitate intruders

Explicación

Pregunta 79 de 200

1

____________________________________ develop and maintain physical security plans.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Officers

  • Defense Critical Infrastructure Protection (DCIP) Program Officers

  • Operations Security (OPSEC) Officers

Explicación

Pregunta 80 de 200

1

Low threat levels designate that a terrorist group is in the vicinity and is _________.

Selecciona una de las siguientes respuestas posibles:

  • Threatening

  • Non-threatening

  • Active

  • Targeted

Explicación

Pregunta 81 de 200

1

__________________________ are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA.

Selecciona una de las siguientes respuestas posibles:

  • Force Protection Conditions

  • DoD Terrorist Threat Levels

  • Counterterrorism measures

Explicación

Pregunta 82 de 200

1

A Bomb Threat Plan, a Natural Disaster Plan, and a Communications Plan are all examples of ____________________ that must be included with a Physical Security Plan.

Selecciona una de las siguientes respuestas posibles:

  • Memorandums of Understanding (MOU)

  • annexes

  • Standard Operating Procedures (SOP)

Explicación

Pregunta 83 de 200

1

____________________________________ provide information on the capabilities, intentions, and threats of adversaries.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Officers

  • Counterintelligence (CI) support personnel

  • Antiterrorism Officers (ATO)

Explicación

Pregunta 84 de 200

1

Which of the following physical security coordinating activities is made up of multiple individuals such as the Antiterrorism Officer, a Counterintelligence representative, Operations Security officer, and Law Enforcement representative?

Selecciona una de las siguientes respuestas posibles:

  • Threat Working Group

  • Antiterrorism Executive Committee

  • Antiterrorism Working Group

Explicación

Pregunta 85 de 200

1

FPCON ________ applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against U.S. personnel of DoD assets is likely.

Selecciona una de las siguientes respuestas posibles:

  • Bravo

  • Normal

  • Alpha

  • Charlie

  • Delta

Explicación

Pregunta 86 de 200

1

SCIFs, AA&E storage facilities, and nuclear storage facilities are examples of restricted areas.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 87 de 200

1

While both Class V and Class VI GSA-approved containers offer protection against covert and surreptitious entry, only Class V containers offer protection against forced entry.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 88 de 200

1

What is the purpose of the warning label on GSA-approved containers manufactured beginning April 2007?

Selecciona una de las siguientes respuestas posibles:

  • Warns against storing classified information with sensitive materials such as money and weapons

  • Warns against storing unclassified information in the container

  • Warns against unapproved modification of the container

Explicación

Pregunta 89 de 200

1

In AA&E storage facilities, why must drainage structures be secured if they cross the fence line and meet certain size requirements?

Selecciona una de las siguientes respuestas posibles:

  • To prevent rats from infesting the facility

  • To prevent anyone from crawling into the area

  • To prevent water from backing up into the facility

Explicación

Pregunta 90 de 200

1

Unauthorized entrance into restricted areas is subject to prosecution.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 91 de 200

1

Which is NOT approved for the open storage of classified information?

Selecciona una de las siguientes respuestas posibles:

  • Storage closet

  • Secure room

  • Vault

Explicación

Pregunta 92 de 200

1

Which DoD-mandated practice reduces protection, storage, and inventory costs?

Selecciona una de las siguientes respuestas posibles:

  • Consolidate AA&E storage facilities

  • Categorize and store AA&E by security risk categories

  • Demilitarize/dispose of obsolete and unserviceable AA&E

Explicación

Pregunta 93 de 200

1

Which of the following statements is true about locks and keys for security containers?

Selecciona una de las siguientes respuestas posibles:

  • Keys may be stored in your desk drawer as long as it locks.

  • Key-operated locks may not be used on storage containers securing classified material.

  • Locks and keys should be afforded the same level of protection as the material or information being secured.

Explicación

Pregunta 94 de 200

1

Certain non-GSA-approved security containers are never approved for storage of classified information in the DoD.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 95 de 200

1

The design goal for an AA&E storage facility is that is must meet or exceed 10 minutes of resistance to _________________ entry.

Selecciona una de las siguientes respuestas posibles:

  • covert

  • surreptitious

  • forced

Explicación

Pregunta 96 de 200

1

Why should you categorize, store, and protect AA&E by security risk categories?

Selecciona una de las siguientes respuestas posibles:

  • To reduce overall protection costs

  • To save space

  • To identify obsolete AA&E

Explicación

Pregunta 97 de 200

1

Storage containers and facilities protect valuable, sensitive, and classified information by ________________.

Selecciona una de las siguientes respuestas posibles:

  • consolidating no longer needed classified information

  • delaying unauthorized entry

  • preventing all unauthorized entry

Explicación

Pregunta 98 de 200

1

If you need to know the manufacture date of a GSA-approved container, on which label would you find that information?

Selecciona una de las siguientes respuestas posibles:

  • Number label

  • GSA-approved label

  • Warning label

  • Test certification label

  • Container identification label

Explicación

Pregunta 99 de 200

1

Which of these statements is true about storage of Confidential information?

Selecciona una de las siguientes respuestas posibles:

  • Supplemental protection is not normally required when storing Confidential information in an approved storage container.

  • Supplemental protection is always required when storing Confidential information regardless of which storage container is used.

  • Supplemental protection is usually required when storing Confidential information in a secure room.

Explicación

Pregunta 100 de 200

1

Storage containers and facilities are not only important to our national security, but also to the safety of the general public.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 101 de 200

1

For AA&E SRC III & IV, if no IDS is present Security Force checks during non-duty hours is required.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 102 de 200

1

Storage containers or facilities will always provide enough protection for certain types of information or material on their own.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 103 de 200

1

To store classified information, you may only use Class V or Class VI GSA-approved containers as the other classes of containers may no longer be used.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 104 de 200

1

What is considered an additional measure for AA&E storage?

Selecciona una de las siguientes respuestas posibles:

  • IDS

  • Communications

  • CCTV

  • Security Forces

Explicación

Pregunta 105 de 200

1

There are certain times when you must change the combination on locks securing classified information. Which of the following is not a time when you must change the combination?

Selecciona una de las siguientes respuestas posibles:

  • When the container is taken out of service

  • When the container or lock has been subject to possible compromise

  • When anyone with knowledge of the combination no longer requires access

  • Prior to going on extended leave

Explicación

Pregunta 106 de 200

1

Which group uses the same set of storage requirements based on security risk categories?

Selecciona una de las siguientes respuestas posibles:

  • Arms and ammunition

  • Arms and explosives

  • Ammunition and explosives

Explicación

Pregunta 107 de 200

1

What items can a Nuclear Storage Facility store?

Selecciona una de las siguientes respuestas posibles:

  • Critical Nuclear Weapons

  • SAP documents

  • AA&E SRC I&II

  • SCIF information

Explicación

Pregunta 108 de 200

1

Which of the following items may be stored with classified information?

Selecciona una de las siguientes respuestas posibles:

  • Nothing

  • Weapons

  • Precious metals

  • Money

Explicación

Pregunta 109 de 200

1

Perimeter lighting in AA&E storage facilities is _________________________.

Selecciona una de las siguientes respuestas posibles:

  • Determined by DoD Components

  • A good best practice

  • Required

Explicación

Pregunta 110 de 200

1

Which of these statements is true about storage of Secret information?

Selecciona una de las siguientes respuestas posibles:

  • Supplemental protection is not required when storing Secret information in a vault.

  • Supplemental protection is always required when storing Secret information.

  • Supplemental protection is never required when storing Secret information in a secure room.

Explicación

Pregunta 111 de 200

1

What do the classes of GSA-approved containers represent?

Selecciona una de las siguientes respuestas posibles:

  • Which ones are approved for the storage of classified information

  • The types of sensitive material for which each container is approved

  • Varying degrees of protection against different types of unauthorized entry

Explicación

Pregunta 112 de 200

1

Who uses SCIFs?

Selecciona una de las siguientes respuestas posibles:

  • The intelligence community

  • Only those who have a Top Secret clearance

  • Anyone who stores classified information

Explicación

Pregunta 113 de 200

1

If you needed to find information on physical security standards for SCIFs, which reference would you consult?

Selecciona una de las siguientes respuestas posibles:

  • ICD 705

  • The NISPOM

  • DoDM 5200.01, Volumes 1-4

Explicación

Pregunta 114 de 200

1

For storage of classified you may use which GSA-approved containers?

Selecciona una de las siguientes respuestas posibles:

  • Only containers with black labels

  • Containers with any GSA-approved label

  • Only containers with red labels

Explicación

Pregunta 115 de 200

1

Which of the following statements are true of storage containers and facilities? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • Storage containers and facilities protect valuable and/or sensitive assets by delaying unauthorized entry.

  • They are categorized by how well they delay different types of unauthorized entry.

  • They are important to our national security and to the safety of the general public.

  • They are required only for the storage of classified information.

Explicación

Pregunta 116 de 200

1

Which of the following would be factors you would need to consider when selecting storage containers and facilities? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • Whether the TOP SECRET material being stored is a set of documents or a weapon system

  • If the material is being stored in a war zone or not

  • Whether a document is CONFIDENTIAL or TOP SECRET

  • Whether the items being stored are conventional AA&E or nuclear weapons

Explicación

Pregunta 117 de 200

1

In the DoD, classified information may be stored in a non-GSA approved container.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 118 de 200

1

COMSEC material is stored in GSA-approved containers.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 119 de 200

1

Class V and Class VI are the only models of GSA-approved storage containers that are currently being manufactured for the storage of classified information.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 120 de 200

1

Class V and Class VI models of GSA-approved storage containers both provide protection against surreptitious, covert, and forced entry.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 121 de 200

1

Which of the following labels must be clearly displayed on the face of the container in order for it to be used to store classified information?

Selecciona una de las siguientes respuestas posibles:

  • Test certification label

  • Number label

  • Cabinet identification label

  • GSA-approved label

  • Warning label

Explicación

Pregunta 122 de 200

1

Which of the following labels is displayed on the face of the container and contains the serial number of the container?

Selecciona una de las siguientes respuestas posibles:

  • Test certification label

  • Number label

  • Cabinet identification label

  • GSA-approved label

  • Warning label

Explicación

Pregunta 123 de 200

1

For containers manufactured beginning April 2007, which label is attached to the top inside of the control drawer and states that any modification of the container that is not in accordance with Federal Standard 809 will invalidate the GSA approval of the container?

Selecciona una de las siguientes respuestas posibles:

  • Test certification label

  • Number label

  • Cabinet identification label

  • GSA-approved label

  • Warning label

Explicación

Pregunta 124 de 200

1

Top Secret information can only be stored in a GSA-approved security container, secure room, or vault.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 125 de 200

1

Vaults are more secure than secure rooms.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 126 de 200

1

Vault doors are made of hardened steel and must retain their original gray color.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 127 de 200

1

Vaults are more secure than modular vaults.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 128 de 200

1

Secure rooms and vaults may both be authorized for the open storage of classified information.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 129 de 200

1

Which of the following are required practices when using storage containers? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • Safeguard keys, locks, and combinations at the same level of the classified information being stored.

  • Change combinations when anyone with knowledge of the combination no longer requires access and when the container or lock has been subject to possible compromise.

  • Store classified information with sensitive items or weapons.

  • Keep records of security containers, vaults, and secure rooms used for the storage

Explicación

Pregunta 130 de 200

1

Who provides construction and security requirements for SCIFs?

Selecciona una de las siguientes respuestas posibles:

  • Director of National Intelligence (DNI)

  • Central Intelligence Agency (CIA)

  • Defense Intelligence Agency (DIA)

  • General Services Administration (GSA)

  • Department of Defense (DoD)

Explicación

Pregunta 131 de 200

1

Who provides accreditation for SCIFs?

Selecciona una de las siguientes respuestas posibles:

  • Director of National Intelligence (DNI)

  • Central Intelligence Agency (CIA)

  • Defense Intelligence Agency (DIA)

  • General Services Administration (GSA)

  • Department of Defense (DoD)

Explicación

Pregunta 132 de 200

1

Which of the following statements are true of SCIFs? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • They are used by the intelligence community to store classified information.

  • They are used by the DoD to store AA&E.

  • They are used to store sensitive compartmented information.

  • They are used to store nuclear weapons.

Explicación

Pregunta 133 de 200

1

Warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 134 de 200

1

The use of master key systems is acceptable in the storage of AA&E.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 135 de 200

1

The use of deadly force is authorized against anyone who enters a nuclear storage facility without proper authorization.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 136 de 200

1

Securing drainage structures must be considered if they cross the fence line of an AA&E storage area.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 137 de 200

1

Securing drainage structures must be considered if they cross the fence line of an AA&E storage area.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 138 de 200

1

Emergency lighting and security lighting for the entire perimeter of nuclear weapon storage facilities are ____________________.

Selecciona una de las siguientes respuestas posibles:

  • determined by DoD Components

  • required

  • utilized when necessary

Explicación

Pregunta 139 de 200

1

Fences are always required for storage of _____________________ .

Selecciona una de las siguientes respuestas posibles:

  • SRC I and II ammunition and explosives

  • Storage of arms, ammunition, and explosives

  • All SRC of ammunition and explosives

Explicación

Pregunta 140 de 200

1

If you arrived at work one day and noticed that someone had pried open the drawer of the locked filing cabinet in your office, you would know that ___________ entry had occurred.

Selecciona una de las siguientes respuestas posibles:

  • forced

  • surreptitious

  • covert

Explicación

Pregunta 141 de 200

1

You don’t have to procure new security storage equipment from the GSA Federal Supply Schedule. You can get an exception from USD (P).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 142 de 200

1

One general principle is the more sensitive the material to be stored, or the greater the threat to it, the stricter your storage and protection methods must be.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 143 de 200

1

AA&E storage facilities must have a primary and back-up means of communications for emergency purposes.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 144 de 200

1

You can find construction standards for secure rooms at cleared contractor facilities by reviewing ____________.

Selecciona una de las siguientes respuestas posibles:

  • ICS 705

  • the NISPOM

  • DoDM 5200.01, Volumes 1-4, Information Security Program

Explicación

Pregunta 145 de 200

1

Restricted area signs posted around the perimeter of nuclear weapon storage facilities states that if anyone attempts to enter the area without permission of the Installation Commander _____________________.

Selecciona una de las siguientes respuestas posibles:

  • they can be subject to the Uniform Code of Military Justice

  • use of deadly force is authorized

  • they can be subject to radiation

Explicación

Pregunta 146 de 200

1

GSA-approved containers require recertification if the GSA-approved label is missing.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 147 de 200

1

GSA-approved containers require recertification if the GSA-approved label is missing.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 148 de 200

1

For storage of SRC I and II AA&E, exterior building lighting is _________________________.

Selecciona una de las siguientes respuestas posibles:

  • Determined by DoD Components

  • Required

  • A good best practice

Explicación

Pregunta 149 de 200

1

When two or more units store their AA&E in one facility, both units are responsible for the security of that facility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 150 de 200

1

When purchasing new security storage equipment, you must use the GSA Federal Supply Schedule, except when an exception is made by the DoD component head with notification to the USD(I).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 151 de 200

1

If the GSA-approved label comes off the front of your filing cabinet, you can still use it to store classified information as long as you have the label reattached in a timely manner.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 152 de 200

1

Vaults ____________________modular vaults.

Selecciona una de las siguientes respuestas posibles:

  • are more secure than

  • provide the same level of security as

  • are less secure than

Explicación

Pregunta 153 de 200

1

An ESS is a component of an overall physical protection system.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 154 de 200

1

An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 155 de 200

1

An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 156 de 200

1

You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?

Selecciona una de las siguientes respuestas posibles:

  • DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives

  • UFC, 4-021-02, Electronic Security Systems

  • ICS 705-1, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities

  • DoD Manual on ESS Planning

Explicación

Pregunta 157 de 200

1

Assets, threats, and vulnerabilities are all part of the risk calculation.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 158 de 200

1

Threats against an asset are determined when you conduct a site survey.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 159 de 200

1

You must consider operational and maintenance costs of an ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 160 de 200

1

What can an AACS do to protect assets in a facility?
Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • Allow authorized personnel to enter a controlled area after verifying credentials

  • Assist in preventing unauthorized personnel from entering a controlled area

  • Communicate with CCTV for assessment purposes

  • Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts

Explicación

Pregunta 161 de 200

1

A high-security facility requires an AACS that makes it extremely difficult to duplicate the user’s form of verification for access. Which type of AACS is most appropriate for that facility?

Selecciona una de las siguientes respuestas posibles:

  • Coded

  • Credential

  • Biometric

Explicación

Pregunta 162 de 200

1

You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?

Selecciona una de las siguientes respuestas posibles:

  • Coded

  • Credential

  • Biometric

Explicación

Pregunta 163 de 200

1

Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?

Selecciona una de las siguientes respuestas posibles:

  • Coded

  • Credential

  • Biometric

Explicación

Pregunta 164 de 200

1

Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?

Selecciona una de las siguientes respuestas posibles:

  • Two person rule

  • Antipassback

  • REX device

  • Antitailgating

Explicación

Pregunta 165 de 200

1

Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?

Selecciona una de las siguientes respuestas posibles:

  • Two person rule

  • Antipassback

  • REX device

  • Antitailgating

Explicación

Pregunta 166 de 200

1

Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person’s credential grants access?

Selecciona una de las siguientes respuestas posibles:

  • Two person rule

  • Antipassback

  • REX device

  • Antitailgating

Explicación

Pregunta 167 de 200

1

Which AACS feature would you implement to facilitate egress from a controlled area?

Selecciona una de las siguientes respuestas posibles:

  • Two person rule

  • Antipassback

  • REX device

  • Antitailgating

Explicación

Pregunta 168 de 200

1

Which of the following should you conduct to test the placement of IDS sensors?

Selecciona una de las siguientes respuestas posibles:

  • Acceptance test

  • Nuisance alarm

  • PCU test

Explicación

Pregunta 169 de 200

1

Which of the following can be caused by an animal activating an IDS sensor?

Selecciona una de las siguientes respuestas posibles:

  • Acceptance test

  • Nuisance alarm

  • PCU test

Explicación

Pregunta 170 de 200

1

Which of the following is part of an acceptance test?

Selecciona una de las siguientes respuestas posibles:

  • Acceptance test

  • Nuisance alarm

  • PCU test

Explicación

Pregunta 171 de 200

1

Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?

Selecciona una de las siguientes respuestas posibles:

  • Open terrain sensor

  • Buried line sensor

  • Fence-associated sensor

Explicación

Pregunta 172 de 200

1

Which exterior IDS sensor is NOT vulnerable to bridging?

Selecciona una de las siguientes respuestas posibles:

  • Open terrain sensor

  • Buried line sensor

  • Fence-associated sensor

Explicación

Pregunta 173 de 200

1

Which exterior IDS sensor is usually the least expensive?

Selecciona una de las siguientes respuestas posibles:

  • Open terrain sensor

  • Buried line sensor

  • Fence-associated sensor

Explicación

Pregunta 174 de 200

1

Which exterior IDS sensor is also known as a line-of-sight sensor?

Selecciona una de las siguientes respuestas posibles:

  • Open terrain sensor

  • Buried line sensor

  • Fence-associated sensor

Explicación

Pregunta 175 de 200

1

Which type of sensor would be most effective in protecting a permanently secured window?

Selecciona una de las siguientes respuestas posibles:

  • Balanced magnetic switch (BMS) / High security switch (HSS)

  • Glass break sensor

  • Passive infrared sensor

  • Dual-technology sensor

Explicación

Pregunta 176 de 200

1

Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?

Selecciona una de las siguientes respuestas posibles:

  • Balanced magnetic switch (BMS) / High security switch (HSS)

  • Glass break sensor

  • Passive infrared sensor

  • Dual-technology sensor

Explicación

Pregunta 177 de 200

1

Which sensor is used on doors, roof hatches, and windows?

Selecciona una de las siguientes respuestas posibles:

  • Balanced magnetic switch (BMS) / High security switch (HSS)

  • Glass break sensor

  • Passive infrared sensor

  • Dual-technology sensor

Explicación

Pregunta 178 de 200

1

What capability does monitoring a military exchange demonstrate?

Selecciona una de las siguientes respuestas posibles:

  • Access Control

  • Alarm Assessment

  • Surveillance

Explicación

Pregunta 179 de 200

1

What capability does viewing a CCTV monitor to determine security force response to an alarm demonstrate?

Selecciona una de las siguientes respuestas posibles:

  • Access Control

  • Alarm Assessment

  • Surveillance

Explicación

Pregunta 180 de 200

1

What capability does viewing individuals on a CCTV camera to grant or deny access to a facility demonstrate?

Selecciona una de las siguientes respuestas posibles:

  • Access Control

  • Alarm Assessment

  • Surveillance

Explicación

Pregunta 181 de 200

1

You have received a request to add a CCTV system to a building on your installation.
Which questions should you ask?
Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • Will the CCTV system be used inside or outside?

  • Will the CCTV system be used in a very well-lit area, in low lighting, or in the dark?

  • Are there any visual obstacles that might block the system from capturing clear images?

  • Will the system require a person to man the monitor at all times?

Explicación

Pregunta 182 de 200

1

A wireless network is more secure than a hardwired network.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 183 de 200

1

A wireless network is more secure than a hardwired network.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 184 de 200

1

A DTM allows an automated access control system to communicate with a control center.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 185 de 200

1

Wireline DTM, which is good for most ESS data transmission needs, has a high bandwidth.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 186 de 200

1

Which of the following are considerations when planning for a DTM link?
Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • What is the bandwidth of each ESS subsystem being connected?

  • What level of security will be required?

  • Is there an uninterruptible power supply?

  • Can you use existing networks or will you need to create a new pathway?

Explicación

Pregunta 187 de 200

1

Police connection and central station monitoring generally require an increase in staffing at the facility being monitored.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 188 de 200

1

Proprietary station monitoring is the method used most by DoD installations.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 189 de 200

1

Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 190 de 200

1

Local alarm monitoring works best without another type of monitoring used in conjunction with it.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 191 de 200

1

A facility owns and operates the dispatch center and security forces.

Selecciona una de las siguientes respuestas posibles:

  • Proprietary Station

  • Local Alarm

  • Central Station

  • Police Connection

Explicación

Pregunta 192 de 200

1

The local police agency monitors a facility’s alarms.

Selecciona una de las siguientes respuestas posibles:

  • Proprietary Station

  • Local Alarm

  • Central Station

  • Police Connection

Explicación

Pregunta 193 de 200

1

Owned by a commercial firm and not usually located on the facility being monitored.

Selecciona una de las siguientes respuestas posibles:

  • Proprietary Station

  • Local Alarm

  • Central Station

  • Police Connection

Explicación

Pregunta 194 de 200

1

Requires roving security forces.

Selecciona una de las siguientes respuestas posibles:

  • Proprietary Station

  • Local Alarm

  • Central Station

  • Police Connection

Explicación

Pregunta 195 de 200

1

Which of the following require(s) a mechanical/automated access control system or visual recognition as the access control method? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • SCIF

  • Top Secret/Secret collateral open storage area

  • Arms room

  • Magazine

Explicación

Pregunta 196 de 200

1

Which of the following may contain a CCTV within the protected area? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • SCIF

  • Top Secret/Secret collateral open storage area

  • Arms room

  • Magazine

Explicación

Pregunta 197 de 200

1

Which of the following must have vibration sensors on its walls to detect boundary penetration attempts? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • SCIF

  • Top Secret/Secret collateral open storage area

  • Arms room

  • Magazine

Explicación

Pregunta 198 de 200

1

Which of the following require(s) any system-associated cabling that extends beyond protected area perimeter to be installed in rigid conduit? Select all that apply.

Selecciona una o más de las siguientes respuestas posibles:

  • SCIF

  • Top Secret/Secret collateral open storage area

  • Arms room

  • Magazine

Explicación

Pregunta 199 de 200

1

Which method of ESS monitoring is used for remote facilities and high-value assets not located on a DoD facility or installation?

Selecciona una de las siguientes respuestas posibles:

  • Proprietary station

  • Central station

  • Police connection

Explicación

Pregunta 200 de 200

1

If an individual must enter their fingerprint to gain access to a controlled area, what type of device are they using?

Selecciona una de las siguientes respuestas posibles:

  • Coded device

  • Biometric device

  • Credential device

Explicación