CT1 Flashcards

1
Q

What is the primary role of security at Comanche Peak?

A
  • To prevent the theft of special nuclear materials and prevent radiological sabotage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to protect safeguards information?

A
  • Because it contains proprietary information about safe operation and security of the plant.
  • Because is contains “sensitive” information about safe operation and security of the plant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify proper markings of safeguards information.

A
  • Red border around the page
  • Stamped safeguards - top and bottom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are assigned to post 12 and an individual requests to remove safeguards material from the post. What steps must be taken prior to removal?

A
  • Verify the individual has authorization to access and remove the safeguards.
  • (Notify SSS/Verify the individual is on the safeguards room list)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What steps do you perform if you find unattended safeguards?

A
  • Secure the information
  • Notify CAS/SAS or SSS
  • SSS (first notification)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where can safeguards be stored?

A
  • Authorized storage locations (CAS/SAS, Post 12, SGI Room)
  • In an approved SGI cabinet room with approved lock
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify the role of an armed responder.

A
  • Performing duties that are required by security instructions and procedures.
  • To respond to threats against the facility as described in the CSP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify the role of a CAS/SAS operator.

A
  • Responsible for monitoring/operating the security system.
  • Maintaining radio communications and performing emergency notifications as necessary.
  • Ensuring effective compensatory measures are in place for failed equipment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the role of the RFL.

A
  • Responsible for directing the response team members in implementing the protective strategy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify the role of the SSS.

A
  • Responsible for ensuring all requirements within the CSP are continually met.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are assigned to a security post. Verbalize what you would “pass on” to your relief.

A
  • Verify oncoming officer has all required equipment.
  • Post specific information.
  • Possible compensatory duties.
  • Possible safety hazards.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you verify security key inventory when assigned to Final Access Control?

A
  • Verify keys in cabinet are accurate with keys assigned to that post.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When does the entire shift account for all security equipment?

A
  • At the beginning of shift.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What accounts for the arms room inventory?

A
  • CSO (arms room attendant)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is the equipment in the gun safes accounted for?

A
  • SSS, RCA, and Turbine patrols verify tamper seals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who accounts for contingency equipment?

A
  • Officer assigned to the post.
17
Q

When assuming post what items are you checking?

A
  • Inspect post for deficiencies and cleanliness.
  • Inspect post assigned firearms and ammunition.
  • Inspect post equipment. (Body armor, gas mask)
  • Inspect and verify that carry straps are attached to ammo pouches in BRE‘s and in Post 12.
  • Verify clear line of sight by checking through gun ports.
18
Q

What two ways are keys recorded when issued?

A
  • Manual (key log)
  • Electronic (CAS/SAS computer entry)
19
Q

An event occurs that could be loggable or reportable. What actions did you take?

A
  • Notify CAS/SAS or SSS
  • Document (statement SFR/IR)
20
Q

An individual with access to security keys and/or access to SGI combinations is terminated unfavorably. Verbalize the actions that are taken.

A
  • CAS/SAS Terminates an individual in the security system via notification.
  • SOS directs Test Personnel to change/rotate key cores and SGI Combinations within the required timeframe.
21
Q

Verbalize:
During a site emergency: Explain the required duties for the following positions:

Security officers

Mobile Patrols

If you are assigned as the EOF officer, what are your duties?

A
  • Assist with evacuations, Observe and report.
  • Perform Sweeps
  • Report to NOSF / EOF to control access.