PSC 1

Description

Quiz on PSC 1, created by Shivering Cactus on 28/12/2021.
Shivering Cactus
Quiz by Shivering Cactus, updated more than 1 year ago More Less
Arthur Casto
Created by Arthur Casto about 6 years ago
Shivering Cactus
Copied by Shivering Cactus almost 3 years ago
2
0

Resource summary

Question 1

Question
The primary purpose of physical security is prevention and protection.
Answer
  • True
  • False

Question 2

Question
The _________________________ provides oversight in mission assurance efforts on issues that cut across all DoD protection programs and functions as an Office of Secretary of Defense (OSD) and Joint Staff-level management and decision support forum.
Answer
  • Antiterrorism Executive Committee
  • Mission Assurance Senior Steering Group
  • Threat Working Group
  • Antiterrorism Working Group

Question 3

Question
Select ALL the correct responses. Which of the following are facility access control procedures?
Answer
  • Entry and exit inspections
  • Electronic gate
  • Identification systems

Question 4

Question
Which of the following physical security countermeasures serve as a security system response force?
Answer
  • Security forces
  • Antiterrorism Working Group
  • Counterintelligence
  • OPSEC Personnel

Question 5

Question
Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant?
Answer
  • Install solid steel doors
  • Mount cameras on the roof
  • Limit the number of entrances and exits to what is necessary

Question 6

Question
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Answer
  • True
  • False

Question 7

Question
In order to plan and implement effective physical security measures, you must use the __________________ to determine where and how to allocate your security resources.
Answer
  • risk management process
  • threat assessment process
  • operation assessment process
  • vulnerability assessment process

Question 8

Question
______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level.
Answer
  • Antiterrorism countermeasures
  • Physical security layer strategies
  • Threat levels

Question 9

Question
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Answer
  • Standard Operating Procedures and Post Orders
  • Standard Operating Procedures and the Physical Security Plan
  • Post Orders and the Physical Security Plan

Question 10

Question
Security systems such as intrusion detection systems (IDS) and closed circuit television (CCTV) systems are countermeasures.
Answer
  • True
  • False

Question 11

Question
Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?
Answer
  • OPSEC Officer
  • CI Support
  • Antiterrorism Officer
  • Installation Commander/Facility Director

Question 12

Question
Inspections can ensure compliance with the physical security plan, verify policy compliance, and promote cost effective security.
Answer
  • True
  • False

Question 13

Question
Which of the following is the purpose of an interior intrusion detection system (IDS)?
Answer
  • To provide a complete solution to a facility security posture.
  • To terminate any intrusion into a facility.
  • To deter, detect, and document intrusion in the environment.

Question 14

Question
_____________ have reinforced concrete on all walls, ceilings, and floors and hardened steel doors.
Answer
  • Secure rooms
  • Vaults

Question 15

Question
Which threat level signifies terrorists are present but there are no indications of anti-U.S. activity and the Operating Environment favors the Host Nation or the U.S.?
Answer
  • Significant
  • Low
  • High
  • Moderate

Question 16

Question
The primary purpose of physical security is ____________ and protection.
Answer
  • attacking intruders
  • prevention
  • security-in-depth

Question 17

Question
Which of the following best defines security-in-depth?
Answer
  • The use of fencing around the perimeter of a structure
  • The use of barriers around the perimeter of a structure
  • The layering of physical security measures through the application of active and passive complementary security controls

Question 18

Question
_______________________ is the most common protective lighting system, consisting of a series of fixed lights arranged to flood an area with overlapping cones of light.
Answer
  • Continuous lighting
  • Standby lighting
  • Movable lighting
  • Emergency

Question 19

Question
Which of the following is conducted by a senior official to ensure regulatory requirements are being met and include assist visits, command inspections, and Inspector General (IG) inspections?
Answer
  • Self-Inspection
  • Internal Control Inspection
  • Compliance Inspection

Question 20

Question
Which of the following establishes duties and responsibilities that assist in maintaining operational order during both normal and stressful situations?
Answer
  • Standard Operating Procedures and Post Orders
  • Standard Operating Procedures and the Physical Security Plan
  • Post Orders and the Physical Security Plan

Question 21

Question
Select ALL the correct responses. Security Forces may be comprised of which of the following?
Answer
  • Military working dogs
  • Mission Assurance Senior Steering Group
  • DoD civilian personnel
  • Military and contract personnel

Question 22

Question
Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?
Answer
  • Antiterrorism
  • Physical Security Plan
  • Threat Level Indicators
  • Force Protection

Question 23

Question
When required, the two-person concept may be part of a facility access control method.
Answer
  • True
  • False

Question 24

Question
Commanders should comply with and integrate DoD physical security and installation access control policies into their Force Protection Conditions (FPCON) plans.
Answer
  • True
  • False

Question 25

Question
Select ALL the correct responses. Which of the following are types of inspections that can ensure compliance with the physical security plan?
Answer
  • Internal Control Inspection
  • Self-inspection
  • Compliance inspection

Question 26

Question
__________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
Answer
  • DoDM 5200.01
  • DoDI 5200.08
  • DoD 5200.08-R

Question 27

Question
GSA-approved security containers can be used to store classified information, weapons, and sensitive items.
Answer
  • True
  • False

Question 28

Question
The two primary purposes of physical security are protection and _______________?
Answer
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Question 29

Question
A guard checking IDs at the gate of an installation is a good example of what type of security?
Answer
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Question 30

Question
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Answer
  • Security-in-depth
  • Prevention
  • Point security
  • Area security

Question 31

Question
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Select all that apply.
Answer
  • Identify assets
  • Identify threats
  • Determine countermeasure options
  • Identify vulnerabilities
  • Make risk management decisions

Question 32

Question
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
Answer
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Question 33

Question
Which policy should you consult to find the physical security requirements of protecting classified information?
Answer
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Question 34

Question
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
Answer
  • DoD 5200.08-R, Physical Security Program
  • DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
  • DoDM 5200.01, Volumes 1-4 DoD Information Security Program

Question 35

Question
Who is charged with management, implementation, and direction of all physical security programs?
Answer
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Question 36

Question
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
Answer
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Question 37

Question
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
Answer
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer

Question 38

Question
Which of the following individuals should be included in a Threat Working Group? Select all that apply.
Answer
  • Antiterrorism Officer
  • Counterintelligence (CI) representative
  • Law enforcement representative
  • Operations security officer
  • Information operations representative
  • Chemical, biological, radiological, nuclear and high yield explosive representative

Question 39

Question
Which of these can be made of solid steel to make them more attack resistant?
Answer
  • Walls
  • Doors
  • Windows
  • Roofs

Question 40

Question
Which of these house ventilation systems that should be secured with steel bars?
Answer
  • Walls
  • Doors
  • Windows
  • Roofs

Question 41

Question
Which of these should be covered with a protective film to make them less dangerous in an attack?
Answer
  • Walls
  • Doors
  • Windows
  • Roofs

Question 42

Question
Which of the following locks are approved to secure classified information or material? Select all that apply.
Answer
  • Kaba Mas X-10
  • S&G 8077/AD
  • S&G 833 C

Question 43

Question
Standby lighting is used when regular lighting is not available.
Answer
  • True
  • False

Question 44

Question
Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
Answer
  • True
  • False

Question 45

Question
Movable lighting is used when supplemental lighting is needed such as at construction sites.
Answer
  • True
  • False

Question 46

Question
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Answer
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Question 47

Question
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Answer
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Question 48

Question
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Answer
  • Standard Operating Procedures
  • Physical Security Plans
  • Post Orders

Question 49

Question
Commanders may only implement measures according to the FPCON level in force at the time.
Answer
  • True
  • False

Question 50

Question
Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
Answer
  • True
  • False

Question 51

Question
Commanders educate their personnel on the insider threat to DoD elements and personnel.
Answer
  • True
  • False

Question 52

Question
Which of the following is an example of a locking device?
Answer
  • Bolt
  • Cylinder
  • Key

Question 53

Question
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
Answer
  • fire alarms on doors
  • keeping intruders out
  • emergency exit from a locked door

Question 54

Question
The use of a master key system is not acceptable in ____________.
Answer
  • barracks
  • general office areas
  • secure areas

Question 55

Question
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Answer
  • Count the number of dial rotations in between each number in the combination.
  • Turn the dial and stop it when you see the correct number displayed on the LCD.

Question 56

Question
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Answer
  • Locking device
  • Switching device
  • Securing device

Question 57

Question
Which of the following should you do before changing a combination?
Answer
  • Try the combination three times
  • Call your FSO
  • Lock drawer in open position

Question 58

Question
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
Answer
  • an electromechanical combination lock
  • a combination padlock
  • a mechanical combination lock

Question 59

Question
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Answer
  • True
  • False

Question 60

Question
Which of the following is not a locking device for a key-operated lock?
Answer
  • Bolt
  • Pin
  • Latch

Question 61

Question
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Answer
  • Rim cylinder
  • Interchangeable core cylinder
  • Mortise cylinder

Question 62

Question
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
Answer
  • The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
  • The door must be locked to prevent unauthorized entry and exit.
  • The door must be unlocked so that those inside can exit without having to unlock the door.

Question 63

Question
A key and lock custodian should change or rotate locks at least _____________.
Answer
  • monthly
  • annually
  • quarterly

Question 64

Question
Which of the following statements is true?
Answer
  • You may not change a combination without a commercial locksmith.
  • You may never allow a commercial locksmith to change your combination.
  • You may allow a commercial locksmith to change your combination under certain circumstances.

Question 65

Question
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
Answer
  • The combination on that security container must be changed.
  • Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
  • The security container must be replaced.

Question 66

Question
Which electromechanical lock uses battery power?
Answer
  • S&G 2740B
  • X-10
  • X-08

Question 67

Question
Which of the following is the purpose of a lock’s switching device?
Answer
  • To allow or deny entry into a container or area
  • To authorize the locking device to open
  • To keep the area or container secured

Question 68

Question
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Answer
  • A padlock
  • A built-in lock

Question 69

Question
The two primary types of locks used within DoD are ___________ and key locks.
Answer
  • Biometric
  • Encoded
  • Voice activated
  • Combination

Question 70

Question
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Answer
  • Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
  • Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
  • Locking solutions that provide a higher level of protection are more costly and labor-intensive.

Question 71

Question
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Answer
  • True
  • False

Question 72

Question
Pin tumblers are most commonly employed on _______ locks?
Answer
  • combination
  • tubular
  • cylinder

Question 73

Question
What is not a responsibility of the Key Custodian?
Answer
  • Audit Keys monthly
  • Change or rotate locks quarterly
  • Audit Locks monthly
  • Keep key control register

Question 74

Question
Which of the following is the switching device for a key-operated lock?
Answer
  • bolt
  • cylinder
  • key

Question 75

Question
Which of the following is a disadvantage to using a master key system?
Answer
  • The cost to re-key all of the locks in the system.
  • It is harder to pick the locks.
  • It is harder to copy the locks.

Question 76

Question
The S&G 2937 lock is an example of which type of combination lock?
Answer
  • mechanical built-in
  • padlock
  • electromechanical built-in

Question 77

Question
Many building codes require a facility’s exit doors to contain which of the following devices?
Answer
  • An access card
  • Emergency egress hardware
  • A padlock

Question 78

Question
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
Answer
  • A built-in lock
  • An approved padlock

Question 79

Question
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Answer
  • Federal Specification FF-L-2740B
  • Federal Specification FF-P-110
  • Federal Specification FF-L-2937

Question 80

Question
You need to secure classified information. Which of these locks could you use?
Answer
  • X-10 electromechanical lock
  • S&G 2740B
  • S&G 2937 Mechanical Lock
  • S&G 8077 padlock
  • All of these locks

Question 81

Question
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Answer
  • A built-in lock
  • A padlock

Question 82

Question
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
Answer
  • A built-in lock
  • A padlock

Question 83

Question
The area you are securing contains conventional arms, ammunition, and explosives (AA&E). Which type of key-operated lock should you use?
Answer
  • A medium security padlock
  • A deadbolt lock

Question 84

Question
You have chosen locking systems for several areas in your facility. Which of the following guidelines should you now follow when considering key control? Select all that apply.
Answer
  • Protect keys and locks at the same level as classified information they are safeguarding.
  • Maintain a key and lock register.
  • Replace keys and locks if they are lost or compromised.
  • Do not remove keys from certain premises.
  • Do not create master keys.
  • Appoint a key and lock custodian to ensure proper custody and handling of locks and keys.

Question 85

Question
Which of the following are true of master key systems? Select all that apply.
Answer
  • The great grand master key opens all of the locks in the system.
  • Replacing a lost master key is inexpensive.
  • They are convenient for managers.
  • They are not authorized for DoD use in barracks.
  • Because of their inherent security risks, their use is discouraged.

Question 86

Question
Switching device: authorizes the operating mechanism to open the lock
Answer
  • Cylinder
  • Combination
  • Latch

Question 87

Question
Operating mechanism: interacts with the switching device to allow or deny entry
Answer
  • Cylinder
  • Combination
  • Latch

Question 88

Question
Locking device: physically secures area or container
Answer
  • Cylinder
  • Combination
  • Latch

Question 89

Question
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced and which would you use?
Answer
  • S&G 2740B and Kaba Mas X-10
  • S&G 8088 and Kaba Mas X-09
  • Kaba Mas X-07 and X-08

Question 90

Question
What type of lock is S&G 2740?
Answer
  • Mechanical combination lock
  • Electromechanical combination lock
  • High security operated padlock

Question 91

Question
If you overshoot your combination when dialing the S&G 2740 lock, what should you do?
Answer
  • Back up to the number
  • Continue rotating the dial in the same direction for an extra turn, then stop precisely on the desired number
  • Restart the process all over again

Question 92

Question
You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first?
Answer
  • Change the combination
  • Open the lock
  • Calibrate the lock

Question 93

Question
You are responsible for creating, protecting, and changing combinations in your facility. Which of the following guidelines should you follow? Select all that apply.
Answer
  • Do not write a combination down.
  • Do not change a lock’s combination on a Friday or the day before you go on leave.
  • Change a lock’s combination if the container is discovered unlocked and unattended.
  • Maintain records of who knows lock combinations.
  • Safeguard the combination at appropriate classification level.

Question 94

Question
The S&G 8077/AD combination padlocks are used to secure Secret and Confidential information such as approved bulk and temporary storage indoors.
Answer
  • True
  • False

Question 95

Question
What operates most key-operated locks?
Answer
  • Wheel packs
  • Cylinders
  • Triggers

Question 96

Question
How often should a key and lock custodian audit keys?
Answer
  • Monthly
  • At each change of custody
  • Annually

Question 97

Question
The S&G 8077/AD combination padlocks must comply with which regulations/specifications?
Answer
  • Federal Specification FF-P-110
  • Federal Specification FF-L-2937

Question 98

Question
When is it acceptable to change a combination?
Answer
  • Up to three days before going on leave
  • When a lock is taken out of service
  • On Fridays

Question 99

Question
Which lock is approved under the Federal Specification FF-P-110?
Answer
  • S&G 2740
  • S&G 2740B
  • S&G 2937
  • S&G 8077

Question 100

Question
Which dial rotation do the X-09 and X-10 electromechanical built-in combination locks have in common?
Answer
  • left-right-left
  • right only
  • left only

Question 101

Question
What is the locking device for a combination lock?
Answer
  • Wheel Pack
  • Combination
  • Bolt

Question 102

Question
If you write a combination down, which of the following must you do?
Answer
  • Keep it locked in your desk drawer
  • Destroy it the same day
  • Protect it in the same manner as the highest level of classified information the combination protects.

Question 103

Question
What lock system is considered for Life Safety?
Answer
  • LMK 7000
  • S&G 941
  • S&G 2900 PDL
  • X09

Question 104

Question
As a best practice, when a combination is changed, how many times should the new combination by tried before closing the door or drawer?
Answer
  • 1
  • 2
  • 3

Question 105

Question
What factor affects decisions made about which users may access a lock, time restrictions on locking/unlocking a lock, and automatic versus manual relocking of a lock?
Answer
  • The level of security needed
  • The cost of a lock
  • Life safety

Question 106

Question
Which of the following locking solutions may be used to secure classified information or material?
Answer
  • Deadbolt locks
  • Approved key-operated padlocks
  • Cylindrical locks

Question 107

Question
For which of the following areas does the DoD use master key systems?
Answer
  • General office areas and barracks type settings
  • Ammunition depots
  • Storage of classified information

Question 108

Question
The type of locking device required is determined by the environment and _________.
Answer
  • Facility classification
  • Authorized personnel
  • Asset type
  • Installation commander

Question 109

Question
Which level of security do key-operated built-in locks provide?
Answer
  • high
  • low
  • medium

Question 110

Question
Which type of cylinder is most commonly used on inward-opening or front doors?
Answer
  • Rim cylinder
  • Mortise cylinder
  • Interchangeable core cylinder

Question 111

Question
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
Answer
  • True
  • False

Question 112

Question
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Answer
  • Manual
  • Combination
  • Biometric
  • Physical
  • Mechanical
  • Automated

Question 113

Question
Controlled lighting is used when it is necessary to limit the brightness of the light.
Answer
  • True
  • False

Question 114

Question
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Answer
  • Glare projection
  • Emergency projection
  • Downside illumination
  • Standby illumination

Question 115

Question
Response forces ___________________________________ .
Answer
  • respond to alarms and incidents
  • dispatch response forces and mobile patrols
  • guard a high-priority resource
  • can cover large areas in a timely manner

Question 116

Question
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Answer
  • Forbid
  • Prevent
  • Document
  • Thwart

Question 117

Question
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
Answer
  • screening equipment
  • visual monitoring and deterrence
  • access control systems
  • closed circuit television (CCTV)

Question 118

Question
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Answer
  • Transmission line hub
  • Security technology and equipment installation
  • monitoring station

Question 119

Question
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
Answer
  • Combination
  • Automated
  • Manual
  • Mechanical
  • Physical

Question 120

Question
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
Answer
  • control
  • area security
  • enclaving
  • separation

Question 121

Question
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Answer
  • Proprietary monitoring
  • Central station monitoring
  • Local monitoring
  • None of the above

Question 122

Question
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
Answer
  • a visitor badge
  • an "escort required" visitor badge only
  • an "escort required" visitor badge and escort
  • a CAC and escort

Question 123

Question
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
Answer
  • True
  • False

Question 124

Question
When is a security force response required?
Answer
  • When an Intrusion Detection System (IDS) sensor is triggered.
  • When an Intrusion Detection System (IDS) is not reporting an alarm.
  • When an Intrusion Detection System (IDS) protects a highly critical asset.
  • When an Intrusion Detection System (IDS) alarm notification is received.

Question 125

Question
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Answer
  • Pedestrian
  • Fixed
  • Intrusive
  • Portable

Question 126

Question
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Answer
  • Intrusive and unobtrusive
  • Fixed and portable
  • Portable and closed circuit television (CCTV)
  • Detection and reporting

Question 127

Question
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Answer
  • Response/Assessment
  • Detection
  • Dispatch
  • Reporting

Question 128

Question
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Answer
  • Central station monitoring
  • Proprietary monitoring
  • Remote monitoring
  • Local monitoring

Question 129

Question
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
Answer
  • Combination
  • Physical
  • Manual
  • Automated
  • Biometric

Question 130

Question
How are military working dogs employed by security force members?
Answer
  • Assist in drug testing
  • Assist in law enforcement
  • Assist in detecting explosives
  • Assist in confrontation management
  • Assist in pest control

Question 131

Question
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Answer
  • Standby lighting
  • Surface lighting
  • Emergency lighting
  • Continuous lighting

Question 132

Question
What are signs, barriers, and fences used for in perimeter protection systems?
Answer
  • Deterring unlawful or unauthorized entry
  • Establishing legal boundaries
  • Preventing all types of penetration
  • Integrating protection assets
  • Preventing observation from outside

Question 133

Question
A waterway is an example of what kind of barrier?
Answer
  • Clear zone
  • Perimeter
  • Natural
  • Active

Question 134

Question
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
Answer
  • True
  • False

Question 135

Question
When are static observation posts used?
Answer
  • When continuous surveillance is required.
  • To cover large areas in a timely manner.
  • To monitor alarms and respond to emergencies.
  • To monitor entry to a facility or secure area.

Question 136

Question
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
Answer
  • access control
  • closed circuit television (CCTV)
  • a visual deterrent system
  • screening equipment

Question 137

Question
What does an Intrusion Detection System (IDS) detect?
Answer
  • Only unauthorized intrusions
  • A change in the state of an indoor detection device by a change in outdoor environmental devices
  • A change in state of detection devices that may require further investigation
  • Prevention of an unauthorized intrusion

Question 138

Question
Integrating layers of security to protect DoD assets is
Answer
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Question 139

Question
Guarding a specific asset or resource is
Answer
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Question 140

Question
Protecting an entire area such as an installation or facility is called
Answer
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Question 141

Question
Designating islands of high security within a sea of moderate security is called
Answer
  • Point Security
  • Enclaving
  • Area Security
  • Security-in-depth

Question 142

Question
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground.
Answer
  • True
  • False

Question 143

Question
Barbed wire is also known as razor wire.
Answer
  • True
  • False

Question 144

Question
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
Answer
  • True
  • False

Question 145

Question
Rapidly flowing rivers are considered active barriers.
Answer
  • True
  • False

Question 146

Question
Which of the following protective barriers would most likely be utilized for its decorative appeal? Select the best answer.
Answer
  • Trench
  • Berm
  • Concrete planter
  • Jersey barrier

Question 147

Question
To be effective, clear zones should be free of which of the following? Select the best answer.
Answer
  • Trimmed grass
  • Bushes
  • Dirt
  • Fencing

Question 148

Question
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Answer
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Question 149

Question
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Answer
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Question 150

Question
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Answer
  • Glare Projection
  • Controlled Lighting
  • Surface Lighting

Question 151

Question
When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station.
Answer
  • True
  • False

Question 152

Question
Flashlights are a reliable form of continuous lighting.
Answer
  • True
  • False

Question 153

Question
Emergency lighting depends upon the power supply of the utility company.
Answer
  • True
  • False

Question 154

Question
Standby lighting is the type of lighting used when the primary power source fails.
Answer
  • True
  • False

Question 155

Question
Standby lighting is the type of lighting used when the primary power source fails.
Answer
  • True
  • False

Question 156

Question
Contract security forces may be either military or civilian.
Answer
  • True
  • False

Question 157

Question
Military working dogs can seek, detect, defend their handlers, and guard suspects.
Answer
  • True
  • False

Question 158

Question
Which statement best describes the mission of security forces? Select the best answer.
Answer
  • To secure Department of Defense buildings inside and out
  • To monitor facility access in the interest of national security
  • To protect Department of Defense assets
  • To protect key Department of Defense officials

Question 159

Question
_________ responds to a physical stimulus
Answer
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Question 160

Question
______________ receives change of state and transmits alarm.
Answer
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Question 161

Question
_____________ is the central point for collecting alarm status.
Answer
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Question 162

Question
__________ assures communications between the alarmed area and the monitoring station
Answer
  • Sensor/detector
  • Transmission line security
  • Premise Control Unit (PCU)
  • Monitoring station

Question 163

Question
A CCTV camera may capture activity missed by security force personnel.
Answer
  • True
  • False

Question 164

Question
A CCTV can act as an intrusion detection system (IDS) when combined with video motion detection.
Answer
  • True
  • False

Question 165

Question
An advantage of CCTV is that environmental factors do not affect its performance.
Answer
  • True
  • False

Question 166

Question
A CCTV is only as good as the people who operate it.
Answer
  • True
  • False

Question 167

Question
Which of the following are access control systems? Select all that apply.
Answer
  • Closed circuit television
  • Card-swipe system
  • Joint Personnel Adjudication System (JPAS)
  • Badge exchange program
  • Personal recognition
  • Iris scanning
  • Intrusion detection system

Question 168

Question
Escorts must be able to control the visitor they are escorting throughout the duration of their visit in a controlled area.
Answer
  • True
  • False

Question 169

Question
The schedules for entry and exit inspections should be posted in view of all DoD personnel.
Answer
  • True
  • False

Question 170

Question
All visitors with the appropriate access level to enter a controlled area are permitted unescorted entry.
Answer
  • True
  • False

Question 171

Question
Entry and exit inspections help deter the introduction of unauthorized or prohibited material into an installation or facility and help prevent the unauthorized removal of DoD assets from an installation or facility.
Answer
  • True
  • False

Question 172

Question
Magnetometer
Answer
  • Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Question 173

Question
Vapor trace detector
Answer
  • \Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Question 174

Question
Wand
Answer
  • Fixed equipment that detects metal objects
  • Detects traces of explosive material
  • Portable equipment that detects metal objects
  • Detects prohibited items

Question 175

Question
What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access?
Answer
  • Automated
  • Biometric
  • Programmed
  • Manual
  • Combination

Question 176

Question
What are some important considerations in planning for your monitoring station? Select all that apply.
Answer
  • Alarm zones
  • Staffing
  • Transmission line security
  • Response levels
  • Premise Control Unit (PCU)

Question 177

Question
What kind of screening equipment is effective for screening the things people bring in to facilities?
Answer
  • Vapor trace detectors
  • Magnetometers
  • Conveyor belt style x-ray machines
  • Infrared scanners

Question 178

Question
What are the characteristics of passive barrier systems? Select one or more:
Answer
  • Have substantial bulk or mass
  • Are permanently installed or require heavy equipment to move
  • Require manual operation by security forces
  • Have moving parts

Question 179

Question
Government security forces are made up of military personnel, civilian employees or contractor personnel.
Answer
  • True
  • False

Question 180

Question
When an individual resource requires individual protection, you would employ ____________ security.
Answer
  • point
  • direct
  • moderate
  • area

Question 181

Question
The Joint Personnel Adjudication System (JPAS) is an access control system because it is used to verify the level of access eligibility for specific individuals.
Answer
  • True
  • False

Question 182

Question
What method of security lighting uses lights slightly inside a security perimeter and directed outward?
Answer
  • Controlled lighting
  • Emergency projection
  • Downside illumination
  • Glare projection

Question 183

Question
Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions.
Answer
  • True
  • False

Question 184

Question
An Intrusion Detection System (IDS) is composed of a combination of components integrated to operate in a specific manner to detect a change in the environment by a change of state of detection device.
Answer
  • True
  • False

Question 185

Question
What is an appropriate response when fixed screening equipment sets of an alarm?
Answer
  • Refer to local law enforcement
  • Using portable screening equipment
  • Experimental technology
  • Hand screening
  • Monitor closed circuit television (CCTV)
  • Manual search

Question 186

Question
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters.
Answer
  • True
  • False

Question 187

Question
Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes?
Answer
  • Controlled
  • Surface
  • Emergency
  • Glare projection

Question 188

Question
An Intrusion Detection System (IDS) used with a closed circuit television (CCTV) system is likely to result in distractions to the operator and a reduction in security efficiency.
Answer
  • True
  • False

Question 189

Question
What are the operational phases of an Intrusion Detection system?
Answer
  • Detection, Reporting, Dispatch, and Response/Assessment
  • Alarm Initiation, Response, Termination, Assessment/Cancellation
  • Alarm Silencing, Dispatch, Response, Termination
  • Diversion, Response Force Dispatch, Response, Assessment/Cancellation

Question 190

Question
If a raccoon sets off a fence sensor, what kind of alarm occurs?
Answer
  • Nuisance alarm
  • False alarm
  • Intruder alarm
  • Maintenance alarm

Question 191

Question
______________ fencing is used to protect a stationary perimeter.
Answer
  • Portable
  • Permanent
  • Electric
  • Adaptable

Question 192

Question
What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli?
Answer
  • Reporting
  • Dispatch
  • Detection
  • Response/Assessment

Question 193

Question
Identify the best practices for security inspections. (Entry/Exit) Select all that apply.
Answer
  • Conduct security inspections randomly or during periods of increased alertness
  • No notice should be provided to individuals that they may be subject to inspections
  • Security inspections should prevent or deter the introduction of unauthorized or prohibited material into an installation or facility
  • Only senior officials and security personnel should know security inspection schedules

Question 194

Question
What comprises an Intrusion Detection System (IDS) “alarmed area.”
Answer
  • Sensors and alarm zones
  • The PCU and the monitoring station
  • The PCU and the sensors it serves
  • A dedicated panel or central processor unit

Question 195

Question
Selection of a manual or automated access control system is based on _______________ .
Answer
  • availability of funding
  • risk management
  • threat assessment
  • availability of assets

Question 196

Question
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Answer
  • Vulnerabilities
  • Risks
  • Threats

Question 197

Question
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Answer
  • True
  • False

Question 198

Question
Rivers, cliffs, and dense growth are examples of which type of barrier?
Answer
  • Active barrier
  • Natural barrier
  • Passive barrier

Question 199

Question
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
Answer
  • True
  • False

Question 200

Question
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Answer
  • Compliance inspections
  • Self-inspections
  • Surveys
  • Staff assist visits
Show full summary Hide full summary

Similar

PSC 2
Arthur Casto
prison
Emile Luciano
Intro to Psc
LHuang
prison_1
Emile Luciano
WorkPlace Violence
sera smith
Cell Structure
daniel.praecox
Exchange surfaces and breathing
megan.radcliffe16
GCSE AQA Biology - Unit 3
James Jolliffe
AQA GCSE Physics Unit 2
Gabi Germain