Question 1
Question
The primary purpose of physical security is prevention and protection.
Question 2
Question
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Answer
-
Antiterrorism Executive Committee
-
Mission Assurance Senior Steering Group
-
Threat Working Group
-
Antiterrorism Working Group
Question 3
Question
Select ALL the correct responses. Which of the following are facility access control procedures?
Question 4
Question
Which of the following physical security countermeasures serve as a security system response force?
Question 5
Question
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Answer
-
Install solid steel doors
-
Mount cameras on the roof
-
Limit the number of entrances and exits to what is necessary
Question 6
Question
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Question 7
Question
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
Answer
-
risk management process
-
threat assessment process
-
operation assessment process
-
vulnerability assessment process
Question 8
Question
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Question 9
Question
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Answer
-
Standard Operating Procedures and Post Orders
-
Standard Operating Procedures and the Physical Security Plan
-
Post Orders and the Physical Security Plan
Question 10
Question
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Question 11
Question
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
Question 12
Question
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Question 13
Question
Which of the following is the purpose of an interior intrusion detection system (IDS)?
Answer
-
To provide a complete solution to a facility security posture.
-
To terminate any intrusion into a facility.
-
To deter, detect, and document intrusion in the environment.
Question 14
Question
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Question 15
Question
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Answer
-
Significant
-
Low
-
High
-
Moderate
Question 16
Question
The primary purpose of physical security is ____________ and protection.
Answer
-
attacking intruders
-
prevention
-
security-in-depth
Question 17
Question
Which of the following best defines security-in-depth?
Answer
-
The use of fencing around the perimeter of a structure
-
The use of barriers around the perimeter of a structure
-
The layering of physical security measures through the application of active and passive complementary security controls
Question 18
Question
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Answer
-
Continuous lighting
-
Standby lighting
-
Movable lighting
-
Emergency
Question 19
Question
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Question 20
Question
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Answer
-
Standard Operating Procedures and Post Orders
-
Standard Operating Procedures and the Physical Security Plan
-
Post Orders and the Physical Security Plan
Question 21
Question
Select ALL the correct responses. Security Forces may be comprised of which of the following?
Question 22
Question
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Answer
-
Antiterrorism
-
Physical Security Plan
-
Threat Level Indicators
-
Force Protection
Question 23
Question
When required, the two-person concept may be part of a facility access control method.
Question 24
Question
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Question 25
Question
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Question 26
Question
__________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
Answer
-
DoDM 5200.01
-
DoDI 5200.08
-
DoD 5200.08-R
Question 27
Question
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
Question 28
Question
The two primary purposes of physical security are protection and _______________?
Answer
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Question 29
Question
A guard checking IDs at the gate of an installation is a good example of what type of security?
Answer
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Question 30
Question
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Answer
-
Security-in-depth
-
Prevention
-
Point security
-
Area security
Question 31
Question
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first?
Select all that apply.
Question 32
Question
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
Answer
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Question 33
Question
Which policy should you consult to find the physical security requirements of protecting classified information?
Answer
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Question 34
Question
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Answer
-
DoD 5200.08-R, Physical Security Program
-
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
-
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Question 35
Question
Who is charged with management, implementation, and direction of all physical security programs?
Question 36
Question
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Question 37
Question
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Question 38
Question
Which of the following individuals should be included in a Threat Working Group?
Select all that apply.
Answer
-
Antiterrorism Officer
-
Counterintelligence (CI) representative
-
Law enforcement representative
-
Operations security officer
-
Information operations representative
-
Chemical, biological, radiological, nuclear and high yield explosive representative
Question 39
Question
Which of these can be made of solid steel to make them more attack resistant?
Answer
-
Walls
-
Doors
-
Windows
-
Roofs
Question 40
Question
Which of these house ventilation systems that should be secured with steel bars?
Answer
-
Walls
-
Doors
-
Windows
-
Roofs
Question 41
Question
Which of these should be covered with a protective film to make them less dangerous in an attack?
Answer
-
Walls
-
Doors
-
Windows
-
Roofs
Question 42
Question
Which of the following locks are approved to secure classified information or material?
Select all that apply.
Answer
-
Kaba Mas X-10
-
S&G 8077/AD
-
S&G 833 C
Question 43
Question
Standby lighting is used when regular lighting is not available.
Question 44
Question
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Question 45
Question
Movable lighting is used when supplemental lighting is needed such as at construction sites.
Question 46
Question
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Question 47
Question
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Question 48
Question
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Question 49
Question
Commanders may only implement measures according to the FPCON level in force at the time.
Question 50
Question
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Question 51
Question
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Question 52
Question
Which of the following is an example of a locking device?
Question 53
Question
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
Question 54
Question
The use of a master key system is not acceptable in ____________.
Answer
-
barracks
-
general office areas
-
secure areas
Question 55
Question
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Question 56
Question
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Answer
-
Locking device
-
Switching device
-
Securing device
Question 57
Question
Which of the following should you do before changing a combination?
Question 58
Question
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
Question 59
Question
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Question 60
Question
Which of the following is not a locking device for a key-operated lock?
Question 61
Question
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Question 62
Question
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
Answer
-
The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
-
The door must be locked to prevent unauthorized entry and exit.
-
The door must be unlocked so that those inside can exit without having to unlock the door.
Question 63
Question
A key and lock custodian should change or rotate locks at least _____________.
Answer
-
monthly
-
annually
-
quarterly
Question 64
Question
Which of the following statements is true?
Answer
-
You may not change a combination without a commercial locksmith.
-
You may never allow a commercial locksmith to change your combination.
-
You may allow a commercial locksmith to change your combination under certain circumstances.
Question 65
Question
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
Answer
-
The combination on that security container must be changed.
-
Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
-
The security container must be replaced.
Question 66
Question
Which electromechanical lock uses battery power?
Question 67
Question
Which of the following is the purpose of a lock’s switching device?
Answer
-
To allow or deny entry into a container or area
-
To authorize the locking device to open
-
To keep the area or container secured
Question 68
Question
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Answer
-
A padlock
-
A built-in lock
Question 69
Question
The two primary types of locks used within DoD are ___________ and key locks.
Answer
-
Biometric
-
Encoded
-
Voice activated
-
Combination
Question 70
Question
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Answer
-
Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
-
Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
-
Locking solutions that provide a higher level of protection are more costly and labor-intensive.
Question 71
Question
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Question 72
Question
Pin tumblers are most commonly employed on _______ locks?
Answer
-
combination
-
tubular
-
cylinder
Question 73
Question
What is not a responsibility of the Key Custodian?
Question 74
Question
Which of the following is the switching device for a key-operated lock?
Question 75
Question
Which of the following is a disadvantage to using a master key system?
Answer
-
The cost to re-key all of the locks in the system.
-
It is harder to pick the locks.
-
It is harder to copy the locks.
Question 76
Question
The S&G 2937 lock is an example of which type of combination lock?
Question 77
Question
Many building codes require a facility’s exit doors to contain which of the following devices?
Question 78
Question
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
Answer
-
A built-in lock
-
An approved padlock
Question 79
Question
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Answer
-
Federal Specification FF-L-2740B
-
Federal Specification FF-P-110
-
Federal Specification FF-L-2937
Question 80
Question
You need to secure classified information. Which of these locks could you use?
Question 81
Question
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Answer
-
A built-in lock
-
A padlock
Question 82
Question
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
Answer
-
A built-in lock
-
A padlock
Question 83
Question
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
Question 84
Question
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control? Select all that apply.
Answer
-
Protect keys and locks at the same level as classified information they are safeguarding.
-
Maintain a key and lock register.
-
Replace keys and locks if they are lost or compromised.
-
Do not remove keys from certain premises.
-
Do not create master keys.
-
Appoint a key and lock custodian to ensure proper custody and handling of locks and keys.
Question 85
Question
Which of the following are true of master key systems? Select all that apply.
Answer
-
The great grand master key opens all of the locks in the system.
-
Replacing a lost master key is inexpensive.
-
They are convenient for managers.
-
They are not authorized for DoD use in barracks.
-
Because of their inherent security risks, their use is discouraged.
Question 86
Question
Switching device: authorizes the operating mechanism to open the lock
Answer
-
Cylinder
-
Combination
-
Latch
Question 87
Question
Operating mechanism: interacts with the switching device to allow or deny entry
Answer
-
Cylinder
-
Combination
-
Latch
Question 88
Question
Locking device: physically secures area or container
Answer
-
Cylinder
-
Combination
-
Latch
Question 89
Question
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced and which would you use?
Question 90
Question
What type of lock is S&G 2740?
Answer
-
Mechanical combination lock
-
Electromechanical combination lock
-
High security operated padlock
Question 91
Question
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Answer
-
Back up to the number
-
Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
-
Restart the process all over again
Question 92
Question
You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first?
Answer
-
Change the combination
-
Open the lock
-
Calibrate the lock
Question 93
Question
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply.
Answer
-
Do not write a combination down.
-
Do not change a lock’s combination on a Friday or the day before you go on leave.
-
Change a lock’s combination if the container is discovered unlocked and unattended.
-
Maintain records of who knows lock combinations.
-
Safeguard the combination at appropriate classification level.
Question 94
Question
The S&G 8077/AD combination padlocks are used to secure Secret and Confidential information such as approved bulk and temporary storage indoors.
Question 95
Question
What operates most key-operated locks?
Answer
-
Wheel packs
-
Cylinders
-
Triggers
Question 96
Question
How often should a key and lock custodian audit keys?
Question 97
Question
The S&G 8077/AD combination padlocks must comply with which regulations/specifications?
Question 98
Question
When is it acceptable to change a combination?
Question 99
Question
Which lock is approved under the Federal Specification FF-P-110?
Answer
-
S&G 2740
-
S&G 2740B
-
S&G 2937
-
S&G 8077
Question 100
Question
Which dial rotation do the X-09 and X-10 electromechanical built-in combination locks have in common?
Answer
-
left-right-left
-
right only
-
left only
Question 101
Question
What is the locking device for a combination lock?
Answer
-
Wheel Pack
-
Combination
-
Bolt
Question 102
Question
If you write a combination down, which of the following must you do?
Question 103
Question
What lock system is considered for Life Safety?
Answer
-
LMK 7000
-
S&G 941
-
S&G 2900 PDL
-
X09
Question 104
Question
As a best practice, when a combination is changed, how many times should the new combination by tried before closing the door or drawer?
Question 105
Question
What factor affects decisions made about which users may access a lock, time restrictions on locking/unlocking a lock, and automatic versus manual relocking of a lock?
Question 106
Question
Which of the following locking solutions may be used to secure classified information or material?
Question 107
Question
For which of the following areas does the DoD use master key systems?
Question 108
Question
The type of locking device required is determined by the environment and _________.
Answer
-
Facility classification
-
Authorized personnel
-
Asset type
-
Installation commander
Question 109
Question
Which level of security do key-operated built-in locks provide?
Question 110
Question
Which type of cylinder is most commonly used on inward-opening or front doors?
Question 111
Question
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
Question 112
Question
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Answer
-
Manual
-
Combination
-
Biometric
-
Physical
-
Mechanical
-
Automated
Question 113
Question
Controlled lighting is used when it is necessary to limit the brightness of the light.
Question 114
Question
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Answer
-
Glare projection
-
Emergency projection
-
Downside illumination
-
Standby illumination
Question 115
Question
Response forces ___________________________________ .
Answer
-
respond to alarms and incidents
-
dispatch response forces and mobile patrols
-
guard a high-priority resource
-
can cover large areas in a timely manner
Question 116
Question
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Answer
-
Forbid
-
Prevent
-
Document
-
Thwart
Question 117
Question
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
Question 118
Question
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Question 119
Question
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
Answer
-
Combination
-
Automated
-
Manual
-
Mechanical
-
Physical
Question 120
Question
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
Answer
-
control
-
area security
-
enclaving
-
separation
Question 121
Question
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Question 122
Question
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
Question 123
Question
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
Question 124
Question
When is a security force response required?
Answer
-
When an Intrusion Detection System (IDS) sensor is triggered.
-
When an Intrusion Detection System (IDS) is not reporting an alarm.
-
When an Intrusion Detection System (IDS) protects a highly critical asset.
-
When an Intrusion Detection System (IDS) alarm notification is received.
Question 125
Question
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Answer
-
Pedestrian
-
Fixed
-
Intrusive
-
Portable
Question 126
Question
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Question 127
Question
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Answer
-
Response/Assessment
-
Detection
-
Dispatch
-
Reporting
Question 128
Question
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Question 129
Question
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
Answer
-
Combination
-
Physical
-
Manual
-
Automated
-
Biometric
Question 130
Question
How are military working dogs employed by security force members?
Answer
-
Assist in drug testing
-
Assist in law enforcement
-
Assist in detecting explosives
-
Assist in confrontation management
-
Assist in pest control
Question 131
Question
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Answer
-
Standby lighting
-
Surface lighting
-
Emergency lighting
-
Continuous lighting
Question 132
Question
What are signs, barriers, and fences used for in perimeter protection systems?
Answer
-
Deterring unlawful or unauthorized entry
-
Establishing legal boundaries
-
Preventing all types of penetration
-
Integrating protection assets
-
Preventing observation from outside
Question 133
Question
A waterway is an example of what kind of barrier?
Answer
-
Clear zone
-
Perimeter
-
Natural
-
Active
Question 134
Question
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
Question 135
Question
When are static observation posts used?
Answer
-
When continuous surveillance is required.
-
To cover large areas in a timely manner.
-
To monitor alarms and respond to emergencies.
-
To monitor entry to a facility or secure area.
Question 136
Question
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
Question 137
Question
What does an Intrusion Detection System (IDS) detect?
Answer
-
Only unauthorized intrusions
-
A change in the state of an indoor detection device by a change in outdoor environmental devices
-
A change in state of detection devices that may require further investigation
-
Prevention of an unauthorized intrusion
Question 138
Question
Integrating layers of security to protect DoD assets is
Answer
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Question 139
Question
Guarding a specific asset or resource is
Answer
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Question 140
Question
Protecting an entire area such as an installation or facility is called
Answer
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Question 141
Question
Designating islands of high security within a sea of moderate security is called
Answer
-
Point Security
-
Enclaving
-
Area Security
-
Security-in-depth
Question 142
Question
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground.
Question 143
Question
Barbed wire is also known as razor wire.
Question 144
Question
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
Question 145
Question
Rapidly flowing rivers are considered active barriers.
Question 146
Question
Which of the following protective barriers would most likely be utilized for its decorative appeal? Select the best answer.
Answer
-
Trench
-
Berm
-
Concrete planter
-
Jersey barrier
Question 147
Question
To be effective, clear zones should be free of which of the following? Select the best answer.
Answer
-
Trimmed grass
-
Bushes
-
Dirt
-
Fencing
Question 148
Question
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Answer
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Question 149
Question
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Answer
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Question 150
Question
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Answer
-
Glare Projection
-
Controlled Lighting
-
Surface Lighting
Question 151
Question
When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station.
Question 152
Question
Flashlights are a reliable form of continuous lighting.
Question 153
Question
Emergency lighting depends upon the power supply of the utility company.
Question 154
Question
Standby lighting is the type of lighting used when the primary power source fails.
Question 155
Question
Standby lighting is the type of lighting used when the primary power source fails.
Question 156
Question
Contract security forces may be either military or civilian.
Question 157
Question
Military working dogs can seek, detect, defend their handlers, and guard suspects.
Question 158
Question
Which statement best describes the mission of security forces? Select the best answer.
Answer
-
To secure Department of Defense buildings inside and out
-
To monitor facility access in the interest of national security
-
To protect Department of Defense assets
-
To protect key Department of Defense officials
Question 159
Question
_________ responds to a physical stimulus
Question 160
Question
______________ receives change of state and transmits alarm.
Question 161
Question
_____________ is the central point for collecting alarm status.
Question 162
Question
__________ assures communications between the alarmed area and the monitoring station
Question 163
Question
A CCTV camera may capture activity missed by security force personnel.
Question 164
Question
A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection.
Question 165
Question
An advantage of CCTV is that environmental factors do not affect its performance.
Question 166
Question
A CCTV is only as good as the people who operate it.
Question 167
Question
Which of the following are access control systems? Select all that apply.
Answer
-
Closed circuit television
-
Card-swipe system
-
Joint Personnel Adjudication System (JPAS)
-
Badge exchange program
-
Personal recognition
-
Iris scanning
-
Intrusion detection system
Question 168
Question
Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area.
Question 169
Question
The schedules for entry and exit inspections should be posted in view of all DoD personnel.
Question 170
Question
All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry.
Question 171
Question
Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility.
Question 172
Answer
-
Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Question 173
Question
Vapor trace detector
Answer
-
\Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Question 174
Answer
-
Fixed equipment that detects metal objects
-
Detects traces of explosive material
-
Portable equipment that detects metal objects
-
Detects prohibited items
Question 175
Question
What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access?
Answer
-
Automated
-
Biometric
-
Programmed
-
Manual
-
Combination
Question 176
Question
What are some important considerations in planning for your monitoring station?
Select all that apply.
Question 177
Question
What kind of screening equipment is effective for screening the things people bring in to facilities?
Question 178
Question
What are the characteristics of passive barrier systems?
Select one or more:
Answer
-
Have substantial bulk or mass
-
Are permanently installed or require heavy equipment to move
-
Require manual operation by security forces
-
Have moving parts
Question 179
Question
Government security forces are made up of military personnel, civilian employees or contractor personnel.
Question 180
Question
When an individual resource requires individual protection, you would employ ____________ security.
Answer
-
point
-
direct
-
moderate
-
area
Question 181
Question
The Joint Personnel Adjudication System (JPAS) is an access control system because it is used to verify the level of access eligibility for specific individuals.
Question 182
Question
What method of security lighting uses lights slightly inside a security perimeter and directed outward?
Answer
-
Controlled lighting
-
Emergency projection
-
Downside illumination
-
Glare projection
Question 183
Question
Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions.
Question 184
Question
An Intrusion Detection System (IDS) is composed of a combination of components integrated to operate in a specific manner to detect a change in the environment by a change of state of detection device.
Question 185
Question
What is an appropriate response when fixed screening equipment sets of an alarm?
Answer
-
Refer to local law enforcement
-
Using portable screening equipment
-
Experimental technology
-
Hand screening
-
Monitor closed circuit television (CCTV)
-
Manual search
Question 186
Question
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters.
Question 187
Question
Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes?
Answer
-
Controlled
-
Surface
-
Emergency
-
Glare projection
Question 188
Question
An Intrusion Detection System (IDS) used with a closed circuit television (CCTV) system is likely to result in distractions to the operator and a reduction in security efficiency.
Question 189
Question
What are the operational phases of an Intrusion Detection system?
Answer
-
Detection, Reporting, Dispatch, and Response/Assessment
-
Alarm Initiation, Response, Termination, Assessment/Cancellation
-
Alarm Silencing, Dispatch, Response, Termination
-
Diversion, Response Force Dispatch, Response, Assessment/Cancellation
Question 190
Question
If a raccoon sets off a fence sensor, what kind of alarm occurs?
Answer
-
Nuisance alarm
-
False alarm
-
Intruder alarm
-
Maintenance alarm
Question 191
Question
______________ fencing is used to protect a stationary perimeter.
Answer
-
Portable
-
Permanent
-
Electric
-
Adaptable
Question 192
Question
What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli?
Answer
-
Reporting
-
Dispatch
-
Detection
-
Response/Assessment
Question 193
Question
Identify the best practices for security inspections. (Entry/Exit)
Select all that apply.
Answer
-
Conduct security inspections randomly or during periods of increased alertness
-
No notice should be provided to individuals that they may be subject to inspections
-
Security inspections should prevent or deter the introduction of unauthorized or prohibited material into an installation or facility
-
Only senior officials and security personnel should know security inspection schedules
Question 194
Question
What comprises an Intrusion Detection System (IDS) “alarmed area.”
Answer
-
Sensors and alarm zones
-
The PCU and the monitoring station
-
The PCU and the sensors it serves
-
A dedicated panel or central processor unit
Question 195
Question
Selection of a manual or automated access control system is based on _______________ .
Answer
-
availability of funding
-
risk management
-
threat assessment
-
availability of assets
Question 196
Question
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Answer
-
Vulnerabilities
-
Risks
-
Threats
Question 197
Question
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Question 198
Question
Rivers, cliffs, and dense growth are examples of which type of barrier?
Answer
-
Active barrier
-
Natural barrier
-
Passive barrier
Question 199
Question
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
Question 200
Question
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Answer
-
Compliance inspections
-
Self-inspections
-
Surveys
-
Staff assist visits