PSC 2

Beschreibung

Security Quiz am PSC 2, erstellt von Arthur Casto am 12/11/2018.
Arthur Casto
Quiz von Arthur Casto, aktualisiert more than 1 year ago
Arthur Casto
Erstellt von Arthur Casto vor mehr als 5 Jahre
6857
0

Zusammenfassung der Ressource

Frage 1

Frage
In a tactical environment, Physical Security Plans should be based on METT-TC, which stands for mission, _______________, terrain and weather, troops, time available, and civilian considerations.
Antworten
  • Exercises
  • Equipment
  • Enemy

Frage 2

Frage
Providing information on the capabilities and intentions of our adversaries is the responsibility of the ____________.
Antworten
  • Physical Security Officer
  • Commander or Director
  • Antiterrorism Officer
  • Operational Security Officer
  • Counterintelligence Agent

Frage 3

Frage
Force Protection Conditions (FPCONs) are graduated categories of measures or actions commanders take to protect personnel and assets from attack.
Antworten
  • True
  • False

Frage 4

Frage
________________ establish duties, roles and responsibilities at individual assignments, checkpoints, gates and guard posts.
Antworten
  • Physical Security Plans (PSP)
  • Memorandums of Understanding (MOU)
  • Post Orders

Frage 5

Frage
_________________, the inspector should review any local security directives, the Physical Security Plan, its Standard Operating Procedures, and any previous inspection reports, exceptions, and waivers.
Antworten
  • When preparing the inspection report
  • During the inspection
  • In preparation for an inspection

Frage 6

Frage
A ______________ defines emergency delegations of authority and orders of succession to ensure DoD Component Mission Essential Functions (MEFs) continue under all circumstances.
Antworten
  • Physical Security Plan (PSP)
  • Continuity of Operations Plan (COOP)
  • Memorandum of Agreement (MOA)

Frage 7

Frage
Threat levels assist senior leaders to determine the appropriate ________ level.
Antworten
  • Classification designation
  • FPCON
  • SOP
  • GSA security specification

Frage 8

Frage
Two antiterrorism tools the DoD uses to safeguard DoD assets are __________________ and _______________.
Antworten
  • Force Protection Conditions (FPCONs) and Terrorist Threat Levels
  • Threat Working Group and Post Orders
  • Countermeasures and Standard Operating Procedures

Frage 9

Frage
__________________ issue Force Protection Conditions (FPCONs).
Antworten
  • COCOMs and Installation Commanders/Facility Directors
  • The DHS and COCOMs
  • The DIA and COCOMs

Frage 10

Frage
It’s better for an inspector not to announce the inspection in order to create a surprise effect and see how everything really operates.
Antworten
  • True
  • False

Frage 11

Frage
Which system detects a change in the environment and transmits an alarm?
Antworten
  • CCTV
  • Access Controls Systems
  • IDS

Frage 12

Frage
___________________ are often overlooked in physical security planning and implementation.
Antworten
  • Lights
  • Barriers
  • Man-passable openings

Frage 13

Frage
Lighting deters unauthorized entry by providing a psychological deterrence to intruders.
Antworten
  • True
  • False

Frage 14

Frage
______________________ are formal agreements that provide security assistance between DoD activities and from local law enforcement agencies as well as mutual aid from local fire and medical services.
Antworten
  • Standard Operating Procedures (SOP)
  • Physical Security Plans (PSP)
  • Memorandums of Understanding and Agreement (MOU/MOA)

Frage 15

Frage
When assessing an asset, you must determine the nature and the value of that asset and the degree of impact if the asset is damaged or lost.
Antworten
  • True
  • False

Frage 16

Frage
FPCON _________ applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific target is imminent.
Antworten
  • Normal
  • Alpha
  • Bravo
  • Charlie
  • Delta

Frage 17

Frage
There is a one for one correlation between Terrorist Threat Levels and force Protection Conditions.
Antworten
  • True
  • False

Frage 18

Frage
The _____________________ develops and refines terrorism threat assessments and coordinates and disseminates threat warnings, reports, and summaries.
Antworten
  • Defense Critical Infrastructure Protection (DCIP) Working Group
  • Antiterrorism Working Group (ATWG)
  • Threat Working Group (TWG)

Frage 19

Frage
Examples of oversight tools include day-to-day observations, surveys, staff assist visits, ______________, and the operational environment.
Antworten
  • Policy manuals
  • Inspections
  • Executive Orders

Frage 20

Frage
_____________________ are based on information about terrorist groups such as their operational capability, intentions, activity, and the operational environment.
Antworten
  • Continuity of Operations Plans (COOPs)
  • Counterterrorism measures
  • DoD Terrorist Threat Levels
  • Force Protection Conditions (FPCONs)

Frage 21

Frage
Although the DoD issues DoD-wide guidance for physical security planning and implementation, you should always consult ______________ for specific guidance.
Antworten
  • Your component’s policies
  • Congressional legislation
  • Executive Orders

Frage 22

Frage
As a physical security specialist, you may assume different physical security roles or serve on different working groups, such as the ATWG, TWG, and DCIP.
Antworten
  • True
  • False

Frage 23

Frage
_______________ can result from day-to-day observations or more formal oversight.
Antworten
  • Inspection reports
  • Incident reports
  • Surveys

Frage 24

Frage
Antiterrorism physical security measures incorporate detection, deterrence, denial and ____________.
Antworten
  • Documentation
  • Evaluation
  • Determination
  • Notification

Frage 25

Frage
Which of the following statements are true of physical security planning and implementation? Select all that apply.
Antworten
  • The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets.
  • Protection of DoD assets must be performed at any cost; therefore, a cost vs. benefit analysis is not necessary.
  • Use of oversight tools is an important part of physical security implementation.
  • Facility design must be considered in physical security planning.

Frage 26

Frage
Which of the following would best be described as a DoD asset?
Antworten
  • Terrorist
  • Fence
  • Open, unattended installation gate
  • Arms and ammunition
  • Loss of life

Frage 27

Frage
Which of the following would best be described as a threat?
Antworten
  • Terrorist
  • Fence
  • Open, unattended installation gate
  • Arms and ammunition
  • Loss of life

Frage 28

Frage
Which of the following would best be described as a vulnerability?
Antworten
  • Terrorist
  • Fence
  • Open, unattended installation gate
  • Arms and ammunition
  • Loss of life

Frage 29

Frage
Which of the following would best be described as a risk?
Antworten
  • Terrorist
  • Fence
  • Open, unattended installation gate
  • Arms and ammunition
  • Loss of life

Frage 30

Frage
Which of the following would best be described as a countermeasure?
Antworten
  • Terrorist
  • Fence
  • Open, unattended installation gate
  • Arms and ammunition
  • Loss of life

Frage 31

Frage
The ________ is responsible for the installation’s antiterrorism program.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 32

Frage
________ is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 33

Frage
The ________ analyzes threats to assets and their vulnerabilities.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 34

Frage
________ must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 35

Frage
The ________ is charged with the management, implementation, and direction of all physical security programs.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 36

Frage
The ________ is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility.
Antworten
  • Law Enforcement
  • Antiterrorism Officer
  • OPSEC Officer
  • CI Support
  • Physical Security Officer
  • DCIP Officer
  • Installation Commander/Facility Director

Frage 37

Frage
Flashlights are a reliable form of continuous lighting.
Antworten
  • True
  • False

Frage 38

Frage
Emergency lighting depends upon the power supply of the utility company.
Antworten
  • True
  • False

Frage 39

Frage
Standby lighting is the type of lighting used when the primary power source fails.
Antworten
  • True
  • False

Frage 40

Frage
Certain types of lighting can incapacitate an intruder.
Antworten
  • True
  • False

Frage 41

Frage
Controlled lighting is used to illuminate the perimeter of a facility.
Antworten
  • True
  • False

Frage 42

Frage
_________ is often used as a temporary barrier when rolled out on the ground.
Antworten
  • Barbed wire
  • Concertina wire
  • Chain-link fencing
  • Metal ornamental high-security fencing

Frage 43

Frage
_________ can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fencing.
Antworten
  • Barbed wire
  • Concertina wire
  • Chain-link fencing
  • Metal ornamental high-security fencing

Frage 44

Frage
_________ is more difficult for intruders to scale.
Antworten
  • Barbed wire
  • Concertina wire
  • Chain-link fencing
  • Metal ornamental high-security fencing

Frage 45

Frage
_________ is a common type of perimeter fencing for DoD facilities.
Antworten
  • Barbed wire
  • Concertina wire
  • Chain-link fencing
  • Metal ornamental high-security fencing

Frage 46

Frage
Securing man-passable openings is one of the most overlooked physical security protective measures.
Antworten
  • True
  • False

Frage 47

Frage
Intrusion Detection Systems (IDS) prevent unauthorized entry.
Antworten
  • True
  • False

Frage 48

Frage
Cost and risk must always be considered when planning which physical security measures to use in a facility or installation.
Antworten
  • True
  • False

Frage 49

Frage
Access control systems help to prevent unauthorized entry.
Antworten
  • True
  • False

Frage 50

Frage
CCTV can deter loss, theft, or misuse of government property and resources.
Antworten
  • True
  • False

Frage 51

Frage
Operational/administrative procedures for normal and emergency situations
Antworten
  • COOP
  • MOU/MOA
  • Post Orders
  • SOP
  • PSP

Frage 52

Frage
Comprehensive protective measures for an installation, facility, or activity
Antworten
  • COOP
  • MOU/MOA
  • Post Orders
  • SOP
  • PSP

Frage 53

Frage
Roles and responsibilities for individual work areas such as checkpoints and guard gates
Antworten
  • COOP
  • MOU/MOA
  • Post Orders
  • SOP
  • PSP

Frage 54

Frage
Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency
Antworten
  • COOP
  • MOU/MOA
  • Post Orders
  • SOP
  • PSP

Frage 55

Frage
Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity
Antworten
  • COOP
  • MOU/MOA
  • Post Orders
  • SOP
  • PSP

Frage 56

Frage
Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs.
Antworten
  • True
  • False

Frage 57

Frage
Both the DIA and COCOMs issue FPCONs.
Antworten
  • True
  • False

Frage 58

Frage
Installation commanders and facility directors issue DoD Terrorist Threat Levels.
Antworten
  • True
  • False

Frage 59

Frage
Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions.
Antworten
  • True
  • False

Frage 60

Frage
FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels.
Antworten
  • True
  • False

Frage 61

Frage
System that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets
Antworten
  • Terrorist Threat Levels
  • Force Protection
  • DoD AT Program
  • Force Protection Conditions

Frage 62

Frage
The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents
Antworten
  • Terrorist Threat Levels
  • Force Protection
  • DoD AT Program
  • Force Protection Conditions

Frage 63

Frage
Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests
Antworten
  • Terrorist Threat Levels
  • Force Protection
  • DoD AT Program
  • Force Protection Conditions

Frage 64

Frage
Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information
Antworten
  • Terrorist Threat Levels
  • Force Protection
  • DoD AT Program
  • Force Protection Conditions

Frage 65

Frage
Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program
Antworten
  • Surveys
  • Staff assist visits
  • Compliance inspections
  • Day-to-day observations
  • Management/self-inspections

Frage 66

Frage
Formal reviews conducted by senior officials in the chain-of-command
Antworten
  • Surveys
  • Staff assist visits
  • Compliance inspections
  • Day-to-day observations
  • Management/self-inspections

Frage 67

Frage
Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection
Antworten
  • Surveys
  • Staff assist visits
  • Compliance inspections
  • Day-to-day observations
  • Management/self-inspections

Frage 68

Frage
Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility
Antworten
  • Surveys
  • Staff assist visits
  • Compliance inspections
  • Day-to-day observations
  • Management/self-inspections

Frage 69

Frage
Most common and informal oversight tool; immediate action taken to correct deficiencies
Antworten
  • Surveys
  • Staff assist visits
  • Compliance inspections
  • Day-to-day observations
  • Management/self-inspections

Frage 70

Frage
You must use the ________________ process to acquire and analyze the information necessary for protecting assets and allocating security resources against the threats
Antworten
  • physical security implementation
  • oversight and inspection
  • risk management

Frage 71

Frage
The first line of defense in any facility is usually some form of perimeter protection.
Antworten
  • True
  • False

Frage 72

Frage
The purpose of oversight of physical security programs is to ensure the security program complies with DoD and other policies, is cost-effective, and protects DoD assets.
Antworten
  • True
  • False

Frage 73

Frage
Authorized personnel may augment their FPCON by adding measures from higher FPCON standards as they deem necessary.
Antworten
  • True
  • False

Frage 74

Frage
A __________ threat level signifies anti-U.S. terrorists are operationally active and the operating environment favors the terrorists.
Antworten
  • High
  • Significant
  • Low
  • Moderate

Frage 75

Frage
During an inspection, the inspector should use a checklist, talk with people, examine and test products, advise personnel about policy and changes to policy, and __________________________________.
Antworten
  • send violators to the senior manager’s office for reprimand
  • issue security violation citations on the spot
  • take good notes

Frage 76

Frage
The use of glare lighting can incapacitate intruders.
Antworten
  • True
  • False

Frage 77

Frage
Physical security planning includes facility design, creation of written plans such as a Physical Security Plan (PSP), and antiterrorism planning.
Antworten
  • True
  • False

Frage 78

Frage
Barriers are generally used to deter and delay unauthorized entry, define boundaries, and _______________.
Antworten
  • Channel vehicular and pedestrian traffic
  • Detect intruders
  • Incapacitate intruders

Frage 79

Frage
____________________________________ develop and maintain physical security plans.
Antworten
  • Physical Security Officers
  • Defense Critical Infrastructure Protection (DCIP) Program Officers
  • Operations Security (OPSEC) Officers

Frage 80

Frage
Low threat levels designate that a terrorist group is in the vicinity and is _________.
Antworten
  • Threatening
  • Non-threatening
  • Active
  • Targeted

Frage 81

Frage
__________________________ are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA.
Antworten
  • Force Protection Conditions
  • DoD Terrorist Threat Levels
  • Counterterrorism measures

Frage 82

Frage
A Bomb Threat Plan, a Natural Disaster Plan, and a Communications Plan are all examples of ____________________ that must be included with a Physical Security Plan.
Antworten
  • Memorandums of Understanding (MOU)
  • annexes
  • Standard Operating Procedures (SOP)

Frage 83

Frage
____________________________________ provide information on the capabilities, intentions, and threats of adversaries.
Antworten
  • Physical Security Officers
  • Counterintelligence (CI) support personnel
  • Antiterrorism Officers (ATO)

Frage 84

Frage
Which of the following physical security coordinating activities is made up of multiple individuals such as the Antiterrorism Officer, a Counterintelligence representative, Operations Security officer, and Law Enforcement representative?
Antworten
  • Threat Working Group
  • Antiterrorism Executive Committee
  • Antiterrorism Working Group

Frage 85

Frage
FPCON ________ applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against U.S. personnel of DoD assets is likely.
Antworten
  • Bravo
  • Normal
  • Alpha
  • Charlie
  • Delta

Frage 86

Frage
SCIFs, AA&E storage facilities, and nuclear storage facilities are examples of restricted areas.
Antworten
  • True
  • False

Frage 87

Frage
While both Class V and Class VI GSA-approved containers offer protection against covert and surreptitious entry, only Class V containers offer protection against forced entry.
Antworten
  • True
  • False

Frage 88

Frage
What is the purpose of the warning label on GSA-approved containers manufactured beginning April 2007?
Antworten
  • Warns against storing classified information with sensitive materials such as money and weapons
  • Warns against storing unclassified information in the container
  • Warns against unapproved modification of the container

Frage 89

Frage
In AA&E storage facilities, why must drainage structures be secured if they cross the fence line and meet certain size requirements?
Antworten
  • To prevent rats from infesting the facility
  • To prevent anyone from crawling into the area
  • To prevent water from backing up into the facility

Frage 90

Frage
Unauthorized entrance into restricted areas is subject to prosecution.
Antworten
  • True
  • False

Frage 91

Frage
Which is NOT approved for the open storage of classified information?
Antworten
  • Storage closet
  • Secure room
  • Vault

Frage 92

Frage
Which DoD-mandated practice reduces protection, storage, and inventory costs?
Antworten
  • Consolidate AA&E storage facilities
  • Categorize and store AA&E by security risk categories
  • Demilitarize/dispose of obsolete and unserviceable AA&E

Frage 93

Frage
Which of the following statements is true about locks and keys for security containers?
Antworten
  • Keys may be stored in your desk drawer as long as it locks.
  • Key-operated locks may not be used on storage containers securing classified material.
  • Locks and keys should be afforded the same level of protection as the material or information being secured.

Frage 94

Frage
Certain non-GSA-approved security containers are never approved for storage of classified information in the DoD.
Antworten
  • True
  • False

Frage 95

Frage
The design goal for an AA&E storage facility is that is must meet or exceed 10 minutes of resistance to _________________ entry.
Antworten
  • covert
  • surreptitious
  • forced

Frage 96

Frage
Why should you categorize, store, and protect AA&E by security risk categories?
Antworten
  • To reduce overall protection costs
  • To save space
  • To identify obsolete AA&E

Frage 97

Frage
Storage containers and facilities protect valuable, sensitive, and classified information by ________________.
Antworten
  • consolidating no longer needed classified information
  • delaying unauthorized entry
  • preventing all unauthorized entry

Frage 98

Frage
If you need to know the manufacture date of a GSA-approved container, on which label would you find that information?
Antworten
  • Number label
  • GSA-approved label
  • Warning label
  • Test certification label
  • Container identification label

Frage 99

Frage
Which of these statements is true about storage of Confidential information?
Antworten
  • Supplemental protection is not normally required when storing Confidential information in an approved storage container.
  • Supplemental protection is always required when storing Confidential information regardless of which storage container is used.
  • Supplemental protection is usually required when storing Confidential information in a secure room.

Frage 100

Frage
Storage containers and facilities are not only important to our national security, but also to the safety of the general public.
Antworten
  • True
  • False

Frage 101

Frage
For AA&E SRC III & IV, if no IDS is present Security Force checks during non-duty hours is required.
Antworten
  • True
  • False

Frage 102

Frage
Storage containers or facilities will always provide enough protection for certain types of information or material on their own.
Antworten
  • True
  • False

Frage 103

Frage
To store classified information, you may only use Class V or Class VI GSA-approved containers as the other classes of containers may no longer be used.
Antworten
  • True
  • False

Frage 104

Frage
What is considered an additional measure for AA&E storage?
Antworten
  • IDS
  • Communications
  • CCTV
  • Security Forces

Frage 105

Frage
There are certain times when you must change the combination on locks securing classified information. Which of the following is not a time when you must change the combination?
Antworten
  • When the container is taken out of service
  • When the container or lock has been subject to possible compromise
  • When anyone with knowledge of the combination no longer requires access
  • Prior to going on extended leave

Frage 106

Frage
Which group uses the same set of storage requirements based on security risk categories?
Antworten
  • Arms and ammunition
  • Arms and explosives
  • Ammunition and explosives

Frage 107

Frage
What items can a Nuclear Storage Facility store?
Antworten
  • Critical Nuclear Weapons
  • SAP documents
  • AA&E SRC I&II
  • SCIF information

Frage 108

Frage
Which of the following items may be stored with classified information?
Antworten
  • Nothing
  • Weapons
  • Precious metals
  • Money

Frage 109

Frage
Perimeter lighting in AA&E storage facilities is _________________________.
Antworten
  • Determined by DoD Components
  • A good best practice
  • Required

Frage 110

Frage
Which of these statements is true about storage of Secret information?
Antworten
  • Supplemental protection is not required when storing Secret information in a vault.
  • Supplemental protection is always required when storing Secret information.
  • Supplemental protection is never required when storing Secret information in a secure room.

Frage 111

Frage
What do the classes of GSA-approved containers represent?
Antworten
  • Which ones are approved for the storage of classified information
  • The types of sensitive material for which each container is approved
  • Varying degrees of protection against different types of unauthorized entry

Frage 112

Frage
Who uses SCIFs?
Antworten
  • The intelligence community
  • Only those who have a Top Secret clearance
  • Anyone who stores classified information

Frage 113

Frage
If you needed to find information on physical security standards for SCIFs, which reference would you consult?
Antworten
  • ICD 705
  • The NISPOM
  • DoDM 5200.01, Volumes 1-4

Frage 114

Frage
For storage of classified you may use which GSA-approved containers?
Antworten
  • Only containers with black labels
  • Containers with any GSA-approved label
  • Only containers with red labels

Frage 115

Frage
Which of the following statements are true of storage containers and facilities? Select all that apply.
Antworten
  • Storage containers and facilities protect valuable and/or sensitive assets by delaying unauthorized entry.
  • They are categorized by how well they delay different types of unauthorized entry.
  • They are important to our national security and to the safety of the general public.
  • They are required only for the storage of classified information.

Frage 116

Frage
Which of the following would be factors you would need to consider when selecting storage containers and facilities? Select all that apply.
Antworten
  • Whether the TOP SECRET material being stored is a set of documents or a weapon system
  • If the material is being stored in a war zone or not
  • Whether a document is CONFIDENTIAL or TOP SECRET
  • Whether the items being stored are conventional AA&E or nuclear weapons

Frage 117

Frage
In the DoD, classified information may be stored in a non-GSA approved container.
Antworten
  • True
  • False

Frage 118

Frage
COMSEC material is stored in GSA-approved containers.
Antworten
  • True
  • False

Frage 119

Frage
Class V and Class VI are the only models of GSA-approved storage containers that are currently being manufactured for the storage of classified information.
Antworten
  • True
  • False

Frage 120

Frage
Class V and Class VI models of GSA-approved storage containers both provide protection against surreptitious, covert, and forced entry.
Antworten
  • True
  • False

Frage 121

Frage
Which of the following labels must be clearly displayed on the face of the container in order for it to be used to store classified information?
Antworten
  • Test certification label
  • Number label
  • Cabinet identification label
  • GSA-approved label
  • Warning label

Frage 122

Frage
Which of the following labels is displayed on the face of the container and contains the serial number of the container?
Antworten
  • Test certification label
  • Number label
  • Cabinet identification label
  • GSA-approved label
  • Warning label

Frage 123

Frage
For containers manufactured beginning April 2007, which label is attached to the top inside of the control drawer and states that any modification of the container that is not in accordance with Federal Standard 809 will invalidate the GSA approval of the container?
Antworten
  • Test certification label
  • Number label
  • Cabinet identification label
  • GSA-approved label
  • Warning label

Frage 124

Frage
Top Secret information can only be stored in a GSA-approved security container, secure room, or vault.
Antworten
  • True
  • False

Frage 125

Frage
Vaults are more secure than secure rooms.
Antworten
  • True
  • False

Frage 126

Frage
Vault doors are made of hardened steel and must retain their original gray color.
Antworten
  • True
  • False

Frage 127

Frage
Vaults are more secure than modular vaults.
Antworten
  • True
  • False

Frage 128

Frage
Secure rooms and vaults may both be authorized for the open storage of classified information.
Antworten
  • True
  • False

Frage 129

Frage
Which of the following are required practices when using storage containers? Select all that apply.
Antworten
  • Safeguard keys, locks, and combinations at the same level of the classified information being stored.
  • Change combinations when anyone with knowledge of the combination no longer requires access and when the container or lock has been subject to possible compromise.
  • Store classified information with sensitive items or weapons.
  • Keep records of security containers, vaults, and secure rooms used for the storage

Frage 130

Frage
Who provides construction and security requirements for SCIFs?
Antworten
  • Director of National Intelligence (DNI)
  • Central Intelligence Agency (CIA)
  • Defense Intelligence Agency (DIA)
  • General Services Administration (GSA)
  • Department of Defense (DoD)

Frage 131

Frage
Who provides accreditation for SCIFs?
Antworten
  • Director of National Intelligence (DNI)
  • Central Intelligence Agency (CIA)
  • Defense Intelligence Agency (DIA)
  • General Services Administration (GSA)
  • Department of Defense (DoD)

Frage 132

Frage
Which of the following statements are true of SCIFs? Select all that apply.
Antworten
  • They are used by the intelligence community to store classified information.
  • They are used by the DoD to store AA&E.
  • They are used to store sensitive compartmented information.
  • They are used to store nuclear weapons.

Frage 133

Frage
Warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle.
Antworten
  • True
  • False

Frage 134

Frage
The use of master key systems is acceptable in the storage of AA&E.
Antworten
  • True
  • False

Frage 135

Frage
The use of deadly force is authorized against anyone who enters a nuclear storage facility without proper authorization.
Antworten
  • True
  • False

Frage 136

Frage
Securing drainage structures must be considered if they cross the fence line of an AA&E storage area.
Antworten
  • True
  • False

Frage 137

Frage
Securing drainage structures must be considered if they cross the fence line of an AA&E storage area.
Antworten
  • True
  • False

Frage 138

Frage
Emergency lighting and security lighting for the entire perimeter of nuclear weapon storage facilities are ____________________.
Antworten
  • determined by DoD Components
  • required
  • utilized when necessary

Frage 139

Frage
Fences are always required for storage of _____________________ .
Antworten
  • SRC I and II ammunition and explosives
  • Storage of arms, ammunition, and explosives
  • All SRC of ammunition and explosives

Frage 140

Frage
If you arrived at work one day and noticed that someone had pried open the drawer of the locked filing cabinet in your office, you would know that ___________ entry had occurred.
Antworten
  • forced
  • surreptitious
  • covert

Frage 141

Frage
You don’t have to procure new security storage equipment from the GSA Federal Supply Schedule. You can get an exception from USD (P).
Antworten
  • True
  • False

Frage 142

Frage
One general principle is the more sensitive the material to be stored, or the greater the threat to it, the stricter your storage and protection methods must be.
Antworten
  • True
  • False

Frage 143

Frage
AA&E storage facilities must have a primary and back-up means of communications for emergency purposes.
Antworten
  • True
  • False

Frage 144

Frage
You can find construction standards for secure rooms at cleared contractor facilities by reviewing ____________.
Antworten
  • ICS 705
  • the NISPOM
  • DoDM 5200.01, Volumes 1-4, Information Security Program

Frage 145

Frage
Restricted area signs posted around the perimeter of nuclear weapon storage facilities states that if anyone attempts to enter the area without permission of the Installation Commander _____________________.
Antworten
  • they can be subject to the Uniform Code of Military Justice
  • use of deadly force is authorized
  • they can be subject to radiation

Frage 146

Frage
GSA-approved containers require recertification if the GSA-approved label is missing.
Antworten
  • True
  • False

Frage 147

Frage
GSA-approved containers require recertification if the GSA-approved label is missing.
Antworten
  • True
  • False

Frage 148

Frage
For storage of SRC I and II AA&E, exterior building lighting is _________________________.
Antworten
  • Determined by DoD Components
  • Required
  • A good best practice

Frage 149

Frage
When two or more units store their AA&E in one facility, both units are responsible for the security of that facility.
Antworten
  • True
  • False

Frage 150

Frage
When purchasing new security storage equipment, you must use the GSA Federal Supply Schedule, except when an exception is made by the DoD component head with notification to the USD(I).
Antworten
  • True
  • False

Frage 151

Frage
If the GSA-approved label comes off the front of your filing cabinet, you can still use it to store classified information as long as you have the label reattached in a timely manner.
Antworten
  • True
  • False

Frage 152

Frage
Vaults ____________________modular vaults.
Antworten
  • are more secure than
  • provide the same level of security as
  • are less secure than

Frage 153

Frage
An ESS is a component of an overall physical protection system.
Antworten
  • True
  • False

Frage 154

Frage
An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS.
Antworten
  • True
  • False

Frage 155

Frage
An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.
Antworten
  • True
  • False

Frage 156

Frage
You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?
Antworten
  • DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives
  • UFC, 4-021-02, Electronic Security Systems
  • ICS 705-1, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities
  • DoD Manual on ESS Planning

Frage 157

Frage
Assets, threats, and vulnerabilities are all part of the risk calculation.
Antworten
  • True
  • False

Frage 158

Frage
Threats against an asset are determined when you conduct a site survey.
Antworten
  • True
  • False

Frage 159

Frage
You must consider operational and maintenance costs of an ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.
Antworten
  • True
  • False

Frage 160

Frage
What can an AACS do to protect assets in a facility? Select all that apply.
Antworten
  • Allow authorized personnel to enter a controlled area after verifying credentials
  • Assist in preventing unauthorized personnel from entering a controlled area
  • Communicate with CCTV for assessment purposes
  • Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts

Frage 161

Frage
A high-security facility requires an AACS that makes it extremely difficult to duplicate the user’s form of verification for access. Which type of AACS is most appropriate for that facility?
Antworten
  • Coded
  • Credential
  • Biometric

Frage 162

Frage
You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?
Antworten
  • Coded
  • Credential
  • Biometric

Frage 163

Frage
Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?
Antworten
  • Coded
  • Credential
  • Biometric

Frage 164

Frage
Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?
Antworten
  • Two person rule
  • Antipassback
  • REX device
  • Antitailgating

Frage 165

Frage
Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?
Antworten
  • Two person rule
  • Antipassback
  • REX device
  • Antitailgating

Frage 166

Frage
Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person’s credential grants access?
Antworten
  • Two person rule
  • Antipassback
  • REX device
  • Antitailgating

Frage 167

Frage
Which AACS feature would you implement to facilitate egress from a controlled area?
Antworten
  • Two person rule
  • Antipassback
  • REX device
  • Antitailgating

Frage 168

Frage
Which of the following should you conduct to test the placement of IDS sensors?
Antworten
  • Acceptance test
  • Nuisance alarm
  • PCU test

Frage 169

Frage
Which of the following can be caused by an animal activating an IDS sensor?
Antworten
  • Acceptance test
  • Nuisance alarm
  • PCU test

Frage 170

Frage
Which of the following is part of an acceptance test?
Antworten
  • Acceptance test
  • Nuisance alarm
  • PCU test

Frage 171

Frage
Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?
Antworten
  • Open terrain sensor
  • Buried line sensor
  • Fence-associated sensor

Frage 172

Frage
Which exterior IDS sensor is NOT vulnerable to bridging?
Antworten
  • Open terrain sensor
  • Buried line sensor
  • Fence-associated sensor

Frage 173

Frage
Which exterior IDS sensor is usually the least expensive?
Antworten
  • Open terrain sensor
  • Buried line sensor
  • Fence-associated sensor

Frage 174

Frage
Which exterior IDS sensor is also known as a line-of-sight sensor?
Antworten
  • Open terrain sensor
  • Buried line sensor
  • Fence-associated sensor

Frage 175

Frage
Which type of sensor would be most effective in protecting a permanently secured window?
Antworten
  • Balanced magnetic switch (BMS) / High security switch (HSS)
  • Glass break sensor
  • Passive infrared sensor
  • Dual-technology sensor

Frage 176

Frage
Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?
Antworten
  • Balanced magnetic switch (BMS) / High security switch (HSS)
  • Glass break sensor
  • Passive infrared sensor
  • Dual-technology sensor

Frage 177

Frage
Which sensor is used on doors, roof hatches, and windows?
Antworten
  • Balanced magnetic switch (BMS) / High security switch (HSS)
  • Glass break sensor
  • Passive infrared sensor
  • Dual-technology sensor

Frage 178

Frage
What capability does monitoring a military exchange demonstrate?
Antworten
  • Access Control
  • Alarm Assessment
  • Surveillance

Frage 179

Frage
What capability does viewing a CCTV monitor to determine security force response to an alarm demonstrate?
Antworten
  • Access Control
  • Alarm Assessment
  • Surveillance

Frage 180

Frage
What capability does viewing individuals on a CCTV camera to grant or deny access to a facility demonstrate?
Antworten
  • Access Control
  • Alarm Assessment
  • Surveillance

Frage 181

Frage
You have received a request to add a CCTV system to a building on your installation. Which questions should you ask? Select all that apply.
Antworten
  • Will the CCTV system be used inside or outside?
  • Will the CCTV system be used in a very well-lit area, in low lighting, or in the dark?
  • Are there any visual obstacles that might block the system from capturing clear images?
  • Will the system require a person to man the monitor at all times?

Frage 182

Frage
A wireless network is more secure than a hardwired network.
Antworten
  • True
  • False

Frage 183

Frage
A wireless network is more secure than a hardwired network.
Antworten
  • True
  • False

Frage 184

Frage
A DTM allows an automated access control system to communicate with a control center.
Antworten
  • True
  • False

Frage 185

Frage
Wireline DTM, which is good for most ESS data transmission needs, has a high bandwidth.
Antworten
  • True
  • False

Frage 186

Frage
Which of the following are considerations when planning for a DTM link? Select all that apply.
Antworten
  • What is the bandwidth of each ESS subsystem being connected?
  • What level of security will be required?
  • Is there an uninterruptible power supply?
  • Can you use existing networks or will you need to create a new pathway?

Frage 187

Frage
Police connection and central station monitoring generally require an increase in staffing at the facility being monitored.
Antworten
  • True
  • False

Frage 188

Frage
Proprietary station monitoring is the method used most by DoD installations.
Antworten
  • True
  • False

Frage 189

Frage
Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines.
Antworten
  • True
  • False

Frage 190

Frage
Local alarm monitoring works best without another type of monitoring used in conjunction with it.
Antworten
  • True
  • False

Frage 191

Frage
A facility owns and operates the dispatch center and security forces.
Antworten
  • Proprietary Station
  • Local Alarm
  • Central Station
  • Police Connection

Frage 192

Frage
The local police agency monitors a facility’s alarms.
Antworten
  • Proprietary Station
  • Local Alarm
  • Central Station
  • Police Connection

Frage 193

Frage
Owned by a commercial firm and not usually located on the facility being monitored.
Antworten
  • Proprietary Station
  • Local Alarm
  • Central Station
  • Police Connection

Frage 194

Frage
Requires roving security forces.
Antworten
  • Proprietary Station
  • Local Alarm
  • Central Station
  • Police Connection

Frage 195

Frage
Which of the following require(s) a mechanical/automated access control system or visual recognition as the access control method? Select all that apply.
Antworten
  • SCIF
  • Top Secret/Secret collateral open storage area
  • Arms room
  • Magazine

Frage 196

Frage
Which of the following may contain a CCTV within the protected area? Select all that apply.
Antworten
  • SCIF
  • Top Secret/Secret collateral open storage area
  • Arms room
  • Magazine

Frage 197

Frage
Which of the following must have vibration sensors on its walls to detect boundary penetration attempts? Select all that apply.
Antworten
  • SCIF
  • Top Secret/Secret collateral open storage area
  • Arms room
  • Magazine

Frage 198

Frage
Which of the following require(s) any system-associated cabling that extends beyond protected area perimeter to be installed in rigid conduit? Select all that apply.
Antworten
  • SCIF
  • Top Secret/Secret collateral open storage area
  • Arms room
  • Magazine

Frage 199

Frage
Which method of ESS monitoring is used for remote facilities and high-value assets not located on a DoD facility or installation?
Antworten
  • Proprietary station
  • Central station
  • Police connection

Frage 200

Frage
If an individual must enter their fingerprint to gain access to a controlled area, what type of device are they using?
Antworten
  • Coded device
  • Biometric device
  • Credential device
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls