Physical Security Flashcards

1
Q

What are the two primary purposes of a physical security program?

A

Prevention and Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ATWG?

A

Antiterrorism Working Group
Responsible for assessing requirements for physical security;
recommending and developing policy;
preparing planning documents, and;
conducting criticality, vulnerability, and risk assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the ATEC?

A

Antiterrorism Executive Committee
Develops and refines antiterrorism program guidance, policy, and standards.
Acts upon recommendations of the Antiterrorism Working Group and Threat Working Group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the ISO?

A

Information System Owner
Responsible for the security of information systems.
Develops contingency plans for the protection of the information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the TWG and who is in it?

A
Threat Working Group.
This group is comprised of an:
1) Antiterrorism Officer
2) CI representative
3) Law enforcement representative
4) OPSEC officer
5) Information operations representative
6) Chemical, biological, radiological, nuclear, and high yield explosive representative.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 of the 6 key individuals associated with a physical security program.

A

1) Installation Commander/Facility Director
2) Antiterrorism Officer
3) CI Support Personnel
4) Law Enforcement Officials
5) Operations Security (OPSEC) Officer
6) Physical Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Site Design important in creating a physical security program?

A

Properly designed facilities provide a physical and psychological deterrence to intruders. Poor facility design can also make a facility a possible target for intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List 3 ways you would station Security Forces.

A

1) Access control points
2) Static observation posts
3) Roving patrols
4) Response forces
5) Security systems monitors
6) Dispatch and control centers
7) Escorts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of an IDS?

A

To deter, detect, document, and deny or delay intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 2 Physical Security Systems.

A
IDS
ACS
Closed Circuit TV
Screening Equipment
2-Way Radios
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would you determine which type of access control system to install?

A

Based on risk management: defining the criticality, vulnerability, and the threat to DoD assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a Physical Security Program, what is a CAC an example of?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you know about your keys?

A

At a minimum, lock and key control procedures should include a key register to list keys, document their issuance, return, and/or disposition.
Another control measure would be to have a list of personnel who are authorized access to keys and key records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the levels FPCONs?

A

FPCON NORMAL applies when a general global threat of possible terrorist activity exists and warrants a routine security posture.
FPCON ALPHA applies when there is an increased general threat of possible terrorist activity against personnel or facilities; the nature and extent of which are unpredictable.
FPCON BRAVO indicates an increased or more predictable threat of terrorist activity exists.
FPCON CHARLIE applies when an incident occurs or intelligence is received indicating some form of terrorist action or terrorist targeting against U.S. personnel or DoD assets is likely.
FPCON DELTA applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is imminent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a security inspection?

A

Verify policy compliance, promote cost effective security, serve as an opportunity for security education, establish and/or enhance good working relationships, identify existing or potential program weaknesses, and promote quality performance of security functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 2 types of inspection?

A

1) Compliance

2) Self-Inspection

17
Q

Supplemental protection is not required for Secret information that is stored by defense contractors in a closed area.

A

False.

18
Q

If Top Secret information is stored in a vault or secure room, the alarm response time must be within ______ minutes if the area is covered by security-in-depth.

A

15

19
Q

What labels should you find on a GSA approved container?

A

GSA-approved label, test certification label, cabinet identification label, number label, and warning label.

20
Q

Who is defines the security requirements for a SCIF? Who accredits them?

A

Security requirements for SCIFs are established by the Director of National Intelligence (DNI). However, the Defense Intelligence Agency (DIA) is responsible for their accreditation.

21
Q

What’s the difference between SRC I and SRC IV

A

SRC I is the highest risk category. SCR IV is the lowest.

22
Q

What does DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives, state about AA&E?

A

It must be categorized, consolidated and demilitarized/disposed of.

23
Q

How long must an AA&E storage facility be resistant to forced entry

A

10 minutes.

24
Q

Approved exceptions to construction standard policy must be reviewed every ___ years?

A

3

25
Q

This lighting method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.

A

Surface Lighting

26
Q

What are the 3 components of a Lock?

A

The locking device (the bolt), the switching device (keys or combos), and the operating mechanism (the cylinder).

27
Q

Who analyzes threats to assets and their vulnerabilities?

A

OPSEC officer

28
Q

Who is responsible for the safety of people and property under their command?

A

Installation Commander/ Facility Director

29
Q

Who is charged with the management, implementation, and direction of all physical security programs?

A

Physical Security Officer

30
Q

Who is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility?

A

The Defense Critical Infrastructure Program (DCIP) Officer

31
Q

What tools does DoD use against terrorist attack?

A

DoD Terrorist Threat Levels and Force Protection Conditions (FPCONs)

32
Q

Relate Terrorist Threat Levels and Force Protection Conditions (FPCONs).

A

Threat level assessments, which are based on Terrorist Threat Levels, are provided to senior leaders to assist them in determining the appropriate local FPCONs.

33
Q

What is Security in Depth? What’s an Enclave?

A

Layered, and complimentary. In some cases, security-in-depth can be obtained by designating islands of extreme or high security within a sea of moderate security. This is known as enclaving.

34
Q

Rapidly flowing rivers are considered active barriers.

A

False.

35
Q

What should you consider when selecting and IDS?

A

Asset criticality, environment, location, perceived threat.

36
Q

What are the operational phases of an IDS?

A

The operational phases of an IDS are detection, reporting, dispatch, and response and assessment.

37
Q

What are the three types of IDS monitoring?

A

They are local, proprietary, and central station monitoring.