AM General Questions Flashcards
what form is good for one year active and one year inactive for every alarm account?
AF IMT 2530, Alarm System Test Records
Where are work order requests annotated
on AFTO Form 781A
What document is used to track nuisance and false alarm rates per alarm point
AF IMT 340, Alarm Sensor Data
authenticate with system users during alarm activation using their unit’s…?
alarm facility authentication letter
in the event of multiple alarm activations, how do you determine which facility has higher priority
refer to the alarm response priority listing/ advantor priority listing
what are AM changeover procedures
-conduct joint inventory of all items on the changeover checklist
-review pass on book and alarm monitor workbook and receive a complete briefing from off-going personnel
-ensure off-going alarm monitor is logged off and ensure on coming logs in to all ASN workstations
-discrepancies that can’t be corrected must be logged in the SF blotter and reported to on duty flight chief prior to completion of change over
what nine programs is Advantor comprised of
- iMonitor
- iGraphics
- iNavigator
- iBadge
- iReports
- Access Viewer
- Admin Functions
- ID Layout
- Messages
what are certified AM’s responsible for
knowledge/familiarization and application of iMonitor, iGraphics, and messages in order to acknowledge/ assess alarms, determine location of alarm/alarm point, and pass it on specific alarm information to oncoming AM
what is the process of identifying and reporting unauthorized entry/movement within a protected facility
intrusion detection system (IDS)
what is the process of managing cardholder movement through various portals within a protected facility
access control system (ACS)
what is an operator
any person provided a system login ID and password for ASN software
what is a system admin
person responsible for overseeing the ASN environment
what is a user
any person authorized to arm and disarm at the keypad or provided access through protected doors. also applicable to individuals allowed to login to the Video Management System (VMS)
what is alarm point
any monitored device (ex: passive infrared, tamper, duress, balance magnetic switch)
what is passive infrared (PIR)
an electronic device that measures infrared light radiating from objects in its field of view
what is a duress button
a button that, when activated, sends a signal to ASN indicating someone is in distress
what is a 24 hour alarm point
an alarm point active 24 hours a day regardless if the intrusion detection system (IDS) is armed or disarmed (e: tamper, duress)
what is a panel
the electronic board used in IDS and/or ACS
what is a partition
a software grouping of alarm points that arm and disarm collectively
what is a access code
a code, verified at the panel, that is the first part of the arm/disarm sequence. it is common to all individuals having authorization to arm/disarm a secure area
what is an arm/disarm number
the second part of the arm/disarm sequence, verified at the database (server)
what is a keypad
user interface for arming/disarming panels and partitions locally. also used for displaying current status and identifying problems
what is a workstation (WS)
a networked computer that runs ASN software
what is a buried line sensor (BLS)
set of sensor electromagnetic cables buried in the ground around the perimeter of a site