Physical Security Flashcards

1
Q

The two primary purposes of physical security are protection and?

A

prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A guard checking IDs at the gate of an installation is a good example of what type of security?

A

Point Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The layering of PS countermeasures such as fencing, guards, cameras, lighting and locks?>

A

Security in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first?

A

identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?

A

DoD 5200.08-R, Physical Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which policy should you consult to find the physical security requirements of protecting classified information?

A

DoDM 5200.01, volume 1-4 DoD Information Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?

A

DoDI 5200.08, Security of DoD Installation and Resources and the DoD Physical Security Review Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who is charged with management, implementation, and direction of all physical security programs?

A

Physical Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is responsible for providing valuable information on the capabilities, intentions and threats of adversaries?

A

CI Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?

A

OPSEC officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following individuals should be included in a Threat Working Group

A

ATO, CI, LE, OPSEC, Information, CBRNE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these can be made of solid steel to make them more attack resistant

A

Doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these house ventilation systems that should be secured with steel bars?

A

Roofs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these should be covered with a protective film to make them less dangerous in an attack?

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the follow locks are approved to secure classified information or material

A

Kaba Mas X-10, S&G 8077/AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: Standby lighting is used when regular lighting is not available

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True/False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True/False: Movable lighting is used when supplemental lighting is needed such as at construction sites

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

At a minimum what should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and IDS

A

Physical Security Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What establishes duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts?

A

Post Orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What provides supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures?

A

SOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True/False: Commanders may only implement measures according to the FPCON level in force at the time

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True/False: Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True/False: Commanders educate their personnel on the insider threat to DoD elements and personnel

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why is exterior security lighting necessary on DoD installations and facilities?
to illuminate sensitive areas or structures to discourage or deter intruders, to facilitate the detection of unauthorized persons entering or attempting malicious acts within the area
26
Which component in a light fixture changes the direction and controls the distribution of light rays?
lens
27
Which component in a light fixture is used with an electric discharge light source to obtain the necessary circuit conditions of voltage, current, and waveform for starting and operating?
Ballast
28
What is the technical term for a light fixture?
luminaire
29
Which type of lighting should you use to keep security forces in relative darkness?
continuous lighting: glare projections
30
Which type of lighting should you use at a construction site on a DoD installation or facility?
portable lighting
31
Which type of lighting is triggered manually or automatically when suspicious activity is detected or suspected by the security force or alarm systems?
Standby lighting
32
Which policy document should you consult for specific lighting requirements for areas containing DoD sensitive conventional AA&E
DoDM 5100.76
33
Your installation is adjacent to a housing complex. Which of the following would you most likely take into consideration when planning security lighting on the perimeter of your installation to avoid negatively impacting the adjacent housing complex?
Light trespass, occurs when light from one area spills over into an adjoining area
34
Which of these factors allows security personnel to identify colors accurately?
Color Rendition
35
Which of these considerations do you think would be most important in ensuring security forces can clearly see the identification of visitors at checkpoints in the evening hours?
Vertical illuminance
36
What factors should you consider when designing exterior lighting systems?
design for simplicity and economy in system maintenance, provide protection for lighting fixtures, local weather conditions, wiring and grounding requirements, alternate power supply
37
Which type of light fixture should be used to light an airplane apron?
floodlight or projector, full cut-off
38
Which type of light fixture should be used to light large areas such as railroad yards and large parking lots?
high-mast lighting
39
Which type of lamps can be used in exterior locations and are more energy efficient than HID lamps?
solid state lighting or LED
40
What kind of lamps are metal halide and mercury vapor lamps?
high-intensity discharge
41
Which lamp has an average rated life of over 100K hours which is by far the highest?
induction
42
Why types of lighting are used in building entrances and exits?
building-mounted, LED lamps, Fluorescent lamps, cutoff light fixtures
43
What type of pole-mounted lighting is appropriate for a housing area?
LED lamps, fluorescent lamps, metal halide lamps
44
Use glare project lighting to keep patrol units unlit
isolated
45
Use controlled lighting to keep patrol routes in relative darkness?
semi-isolated
46
Use controlled lighting. The width of the light strip depends on the clear zones inside and outside the fence
non-isolated
47
Which combination best reflects the lighting that should be used for pedestrian walkways
pole-mounted light fixtures with LED, induction, or fluorescent lamps
48
Which combination best reflects the lighting that should be used for roads, streets, and driveways
pole-mounted light fixtures with LED, induction, or metal halide lamps
49
Which combination best reflects the lighting that should be used for open storage spaces?
pole-mounted light fixtures with LED, induction, or metal halide lamps
50
Which combination best reflects the lighting that should be used on docks, piers and marinas?
pole-mounted, high mast, fully shielded light fixtures with LED or metal halide lamps
51
Which combination best reflects the lighting that should be used for restricted areas?
building-mounted with LED, induction, metal halide, or compact fluorescent lamps
52
Which combination best reflects lighting that should be used for AA&E storage areas?
canopy-mounted, fully shielded or area fixtures with LED, induction or metal halide lamps
53
What types of lighting are required for aircraft aprons?
pole-mounted, adjustable apron light fixtures with internal and external louvers
54
What are different types of access control points requiring unique lighting requirements?
vehicle and pedestrian approach zones, vehicle access zones, gatehouses, under vehicle inspections, semi-active and inactive entrances
55
True/False: the risk management process must be used to plan which physical security measures should be utilized to protect DoD assets
True
56
True/False: oversight tools are important in ensuring that physical security is being implemented appropriately
True
57
True/False: cost vs. benefit must always be considered when planning the protection of DoD assets
False
58
True/False: physical security countermeasures must always be planned for when designing a facility
True
59
True/False: AA&E can be described as a DoD Assets?
True
60
What could be described as a threat>?
terrorist
61
True/False: an open unattended installation gate is considered a vulnerability
True
62
True/False: a fence is considered a countermeasure
True
63
True/False: the loss of life is considered a risk
true
64
Who is responsible for the installations AT program?
ATO
65
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries
CI support
66
Who analyzes the threats to assets and their vulnerabilities?
OPSEC
67
Who must be included in the intelligence gathering process so that they can be a part of coordinating emergency responses and criminal incidents on a federal installation?
LE
68
Who is charged with the management, implementation, and direction of all physical security programs
PSO
69
Who is responsible for the safety of people and property under their command
installation commander/facility directors
70
Who is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility
DCIP officers
71
True/False: flashlights are a reliable form of continuous lighting
False
72
True/False: emergency lighting depends on the power supply of the utility company
False
73
What is often used as a temporary barrier when rolled out on the ground
Concertina wire
74
What can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fence
Barbed wire
75
What is more difficult for intruders to scale
metal ornamental high-security fencing
76
What is a common type of perimeter fencing for DoD facilities
Chain-link fencing
77
True/False: securing man-passable openings is one of the most overlooked physical security protective measures
true
78
True/False: IDS prevent unauthorized entry
False
79
True/False: Cost and risk must always be considered when planning which phyiscal security measures to use in a facility or installation
true
80
True/False: access control systems help to prevent unauthorized entry
true
81
True/False: CCTV can deter loss, theft, or misuse of government property and resources
True
82
Operational/administrative procedures for normal and emergency situations
SOP
83
Comprehensive protective measures for an installation, facility, or activity
PSP
84
Roles and responsibilities for individual work areas such as checkpoints and guard gates
Post orders
85
Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency
COOP
86
Provisions for one entity, such as DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity
MOU/MOA
87
True/False: Combatant Commanders issue both DoD Terrorist threat levels and FPCONS
True
88
True/False: Both the DIA and COCOMs issue FPCON
False
89
True/False: Installation commanders and facility directors issue DoD Terrorist threat levels
False
90
True/False: Terrorist threat levels are based on information about terrorist groups such as their operational capability and their intentions
True
91
True/False: FPCONS are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat levels
True
92
System that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. Assets
FPCON
93
The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents
DoD AT Programs
94
Intelligence threat assessments of he level of terrorist threat faced by U.S. personnel and interests
Terrorist threat levels
95
Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information
Force Protection
96
Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security programs
management/self-inspections
97
Formal reviews conducted by senior officials in the chain of command
Compliance inspections
98
Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection
staff assistance visits
99
Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility
survey
100
Most common and informal oversight tool; immediate action taken to correct deficiencies
day to day observations
101
True/False: An ESS is a component of an overall physical protection system
True
102
True/False: An ESS must be comprised of atleast two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS
False
103
True/False: An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur
True
104
You are tasked with planning an ESS for a DoD facility What regulatory guidance documents should be your primary reference?
UFC, 4-021-02 ESS
105
True/False: assets, threats and vulnerabilities are all part of the risk calculation
True
106
True/False: threats against an asset are determined when you conduct a site survey
False: they are determined through a threat assessment
107
True/False: You must consider operational and maintenance costs of an ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset
True
108
What can an AACS do to protect assets in a facility
allow authorized personnel to enter a controlled area after verifying credentials, assist in preventing unauthorized personnel from entering a controlled area, communicate with CCTV for assessment purposes, Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts.
109
A high-security facility requires an AACS that makes it extremely difficult to duplicate the user's form of verification for access. Which type of AACS is most appropriate for that facility?
Biometric
110
You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?
Coded
111
Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area
Credential
112
Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area
anti-passback
113
Which AACS feature would implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied
two person rule
114
Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same porta when the authorized person's credential grants access?
antitailgating
115
Which AACS features would you implement to facilitate egress from a controlled area
REX device
116
What are true of master key systems?
the great grand master key opens all the locks, they are convenient for managers, their use is discouraged
117
switching device; authorizes the operating mechanism to open the lock
combination
118
operating mechanism; interacts with the switching device to allow or deny entry
cylinder
119
Locking device; physically secures area or container
latch
120
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
built in lock
121
You are making a decision about the locking system to be used in an area that stores bulk Confidential or Secret material. Which type of key-operated lock should you use?
padlock
122
The area you are securing contains conventional AA&E . Which type of key-operated lock should you use?
medium security padlock
123
What specification should you reference when reviewing the requirements that electromechanical locks meet?
Federal Specification FF-L-2740
124
You need to secure classified information, what locks do you use?
X-09, S&G 2937, S&G 8077
125
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are current being produced and used?
S&G 2740B and Kaba Mass X-10
126
True/False: Storage containers and facilities protect valuable and/or sensitive assets by delaying unauthorized entry
True
127
True/False: Storage containers are categorized by how well they delay different types of unauthorized entry
True
128
True/False: Storage containers are important to our national security and to the safety of the general public
True
129
True/False: they are required only for the storage of classified information
False
130
What are things you need to consider when selecting storage containers?
whether the TS material being stored is a set of documents or a weapons systems, if the material is being stored in a war zone or not, whether a document is confidential or top secret, and whether the items being stored are conventional AA&E or nuclear weapons
131
True/False: In the DoD classified information may be stored in a non GSA approved dcontainer
True
132
True/False: COMSEC material is stored in GSA approved containers
True
133
True/False: Class V and VI are the only models of FSA approved storage containers that are being manufactured for the storage of classified information
True
134
True/False: Class V and VI models of GSA approved storage containers both provide protection against surreptitious, covert, and forced entry
False
135
What label must be displayed clearly on the face of the container in order for it to be used to store classified information
GSA approved label
136
What label is displayed on the face of the container and contains the serial number of the container
Number label
137
For containers manufactured beginning April 2007, which label is attached to the top inside of the control drawer and states that any modification of the containers that is not in accordance with FS 809 will invalidate the GSA approval of the container
Warning label
138
True/False: TS information can only be stored in GSA approved security container, secure room, or vault
true
139
True/False: vaults are more secure than secure rooms
true
140
True/False: Vault doors are made of hardened steel and must retain their original gray color
true
141
True/False: vaults are more secure than modular vaults
false
142
True/False: secure rooms and vaults may both be authorized for the open storage of classified information
True
143
True/False: safeguard keys, locks, and combinations at the same level of the classified information being stored
true
144
True/False: change combination when anyone with knowledge of the combination no longer requires access and when the container or lock has been subject to possible comprimise
True
145
True/False: store classified information with sensitive items or weapons
false
146
Ture/False: keep records of security containers, vaults, and secure rooms used for the storage of classified material as well as the openings and closing of these containers
true
147
Who provides construction and security requirements for SCIF
Director of National intelligence
148
Who provides accreditation for SCIFs
Defense Intelligence Agency
149
True/False: SCIF are used by the intelligence community to store classified information
True
150
True/False: SCIF are used by the DoD to store AA&E
False
151
True/False: SCIF are used to store sensitive compartmented information
true
152
True/False: SCIF are used to store nuclear weapons
False
153
True/False: warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle
True
154
True/False: The use of master key systems is acceptable in the storage of AA&E
False
155
True/False: The use of deadly force is authorized against anyone who enters a nuclear storage facility without proper authorization
True
156
True/False: securing drainage structures must be considered if they cross the fence line of an AA&E storage area
True
157
True/False: the continual barrier concept is commonly employed in nuclear storage facilities
true