Misc. Flash Cards
How often do alarm custodians test their facility IDS?
Quarterly
The ____________ is the suite of software applications that work together to program, manage & monitor alarms on Edwards AFB
Advantor Suite for Networks (ASN)
Verifying by social security number is authorized, however, should only be used as a last means of authenticating under extenuating circumstances with prior approval from who?
ESS NCO
All alarms will be immediately visually assessed via advantor _______
VMS
Who can identify the cause of nuisance alarms, such as wildlife, vegetation, blowing objects, or environmental factors?
Security Forces
Explain authentication procedures
Authenticate personnel using the alarm letter
Locate the correct alarm letter for requested account/facility, confirm personnel is listed as an authorized user
Ensure to log name, rank, account, and call back number prior to authenticating
Locate primary authentication matrix
Discrepancies that cannot be corrected must be ________
Logged in the SF Blotter and reported to on-duty flight sergeant prior to completion of changeover
Explain the process of changeover
Logging in, upon assuming post, certified AM will log onto iMonitor with assigned username/password
Click on user menu
Click change operator
Log in using username/password
Logged in operator assumes responsibility for any activity occured on ASN during log in timeframe
Ensure logging out upon post relief/changeover
What’s the reason to acknowledge alarms?
Silence the alert beeping occurring during the alarm
Who provides IVA with an Exterior Alarm Response
ISRT
Who provides IVA for Interior Alarm Response?
ESRT
What is iMonitor?
iMonitor is the ASN monitoring application used to monitor alarms and system activity
What is iGraphics?
Displays alarm and Radar information on a Base Map
What are the accounts that only allow grid codes?
6008 & 6009
What notification do you get when a key on the keyboard is held down too long?
Key held down notification