Physical Security Certification Study Set | Sociology Terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/514

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

515 Terms

1
New cards

Some key operated lacks are built into the door or container. They are also known as ?

Mortise Lock

2
New cards

The _________ is responsible for supporting the physical security mission by managing, implementing and directing and installation or facilities, physical security program.

Counterintelligence Agent

Anti-terrorism officer

physical security officer

operational security, officer

commander, or Director

Physical security officer

3
New cards

Lighting weapons, close circuit, TV, fences, locking mechanisms are all examples of what category of counter measures. The options are procedural, facilities, training, and equipment.

Equipment

4
New cards

An asset value should be assigned based on the perspective of : asset manager, Chief of security, program manager, or asset owner

Asset owner

5
New cards

You are the one who decides what constitutes and acceptable level of risk for an organizations asset is this true or false?

False

6
New cards

Which of the following questions are used to identify an adversaries intent/ SELECT ALL THAT APPLY What are the vulnerabilities to the wrist management system? What are the adversaries goals? What level of risk are the adversaries likely to accept and are the adversaries willing to risk getting caught.

What are the adversaries? What level of risk are the adversaries likely to accept and are the adversaries willing to risk getting caught?

7
New cards

After you completed all other steps, what chart would you use to summarize and record your information in order to get the total cost of all counter measures? The options are intent assessment chart, collection capability assessment chart, threat assessment summary chart, or countermeasure analyst chart

Counter measure analyst chart

8
New cards

To assist in analyzing threat data adversaries are typically group into all EXCEPT which of the following categories: organizations, companies, governments or individuals

Companies

9
New cards

After completing the vulnerability assessment in the risk management process, the next step is the ____________ assessment. : Counter measures, cost/benefit, risk or asset.

Risk

10
New cards

After completing a threat assessment step of the risk management process, what step should be completed next? asset assessment, countermeasure determination, cost/benefits analysis, or vulnerability assessment

Vulnerability assessment

11
New cards

Which of the following is NOT a good interview question for determining adversaries history?

Does the adversary have the weapons or tools for exploiting attack on an asset?

Has the adversary attack or exploited assets and personnel before?

Has the adversary been suspected of attacking or exploiting assets?

Might some foreseeable event cause the adversary to attempt an attack in the future.

Has the adversary been suspected of attacking or exploiting exploiting assests

12
New cards

Which of the following is one of five categories of assets.

facilities

counter measures

vulnerabilities

Facilities

13
New cards

The risk management process uses FOUR linguistic values: critical high,

medium and significant: true or false

False

14
New cards

Poor perimeter lighting and unsecured doors are example of a/an __________ vulnerability.

Facility

operational

human

information.

Facility

15
New cards

Awareness programs, two rules and passwords are examples of what category of countermeasure? manpower

equipment

planning

procedural

Procedural

16
New cards

Time to implement and oversee the countermeasure, the time to prepare for its implementation, and the time required to follow up and evaluation have no impact when determine the cost of countermeasure:

true or false

False

17
New cards

Identify and characterizes specific vulnerabilities that still exist, given their current countermeasure is a step necessary for ?

risk rating

risk assessment

regression analysis

threat rating

Regression analysis

18
New cards

The process in which the cost and benefits of each alternative countermeasure are compared and the most appropriate alternative is selective is called:

cost benefits analysis

impact cost analysis

threat cost analysis

countermeasure benefits analysis

Cost benefits analysis

19
New cards

The degree of difficulty required to exploit a single vulnerability defines what vulnerability criteria? Quality

undesirable event

effectiveness

Quantity

Quality

20
New cards

The number of complementary vulnerabilities that can be exploited defines what vulnerability criteria?

quantity

effectiveness

quality

undesirable event

Quantity

21
New cards

Your research shows that your specific threat category indicates little or no evidence of capability or intent with no history of actual or planned threats against assets. The linguistic rating you assign to this asset category is:

negligible

low

medium

none

Low

22
New cards

When determining an adversary's history, It is a good idea to ask if the adversary has been suspected of attacking or exploiting assets: true or false

True

23
New cards

Determining if an adversary has the requisite technology and skills to help determine an adversaries: intent

capability,

history

vulnerability

Capability

24
New cards

One way to describe asset value is:

What is the impact of an undesirable event

What is the potential for an event to take place?

What is the level of weakness at the site?

What is the capability of specific threat?

What is the impact of an undesirable event?

25
New cards

Identifying the ineffective counter measures is the first step in the Regressive analyst process.:

true or false

False

26
New cards

A threat is any indication, circumstance, or event while an adversary is in an individual, group, organization, or government.

true or false

True

27
New cards

when following the risk management process, what is the next thing you should do after identifying significant assets?

Measure impacts

create a risk assessment worksheet

identify potential undesirable events

Identify potential undesirable events

28
New cards

Which one of the following questions can help guide interviewing SME about potential undesirable events?

What Critical valuable equipment is located at this site? Why is it critical valuable?

What undesirable events regarding a particular asset concerned the asset owner?

What critical mission activities take place at the site?

Who are the facility personnel, tenants, customers and visitors? What relationship do they have to the critical mission, activities or operations?

What undesirable events regarding a particular assets concern the asset owner

29
New cards

Poor trade craft practices are an example of a/an _______________ vulnerability.:

equipment

information

operational

facility

Operational

30
New cards

Which of the following is NOT a responsibility of the information system operator (ISO)?

Coordinate the physical security measures for information systems.

Ensure that security considerations are properly and legal incorporated.

Develop contingency plans for information systems.

Ensure that security considerations are properly and legal incorporated.

31
New cards

Which of the following statements are true about the Department of Defense's Physical security program?

It establishes the standards, criteria and guidelines for determining whether individuals requiring access to classified information are loyal trustworthy and responsible.

It uses active and passive measures to detect, deter, delay and/or deny unauthorized access to personnel, installations, equipment, facilities, activities and operation.

It defines the requirement for safeguarding classified information in the possession of government contractors, licenses or grantees in the most efficient and cost effective manner possible.

It uses active and passive measures to detect, deter, delay and/or deny unauthorized access to personnel, installations, equipment, facilities, activities and operation.

32
New cards

A ___________ is an indication , circumstance or event with the potential to cause loss or damage of an asset or capability.

Threat

Risk

Vulnerability

Compromise

Threat

33
New cards

Interior intrusion detection systems include proximity detectors, interior barrier protectors, volumetric detectors, and _____________.

Interior Barrier switches

Volumetric controls

Operable opening switches

Thermal detectors

Operable opening switches

34
New cards

The ______________ is responsible for supporting the physical security mission by managing, implementing and directing and installation or facilities, physical security program.

Counter, intelligence agent

Anti-terrorism officer

Physical security officer

Operational security officer

Command or Director

Physical security officer

35
New cards

Critical looks at the importance of a part to the whole.

True or false

True

36
New cards

FPCON __________ warrants a routine security posture.

Normal

alpha

Bravo

Charlie

Delta

Normal

37
New cards

The two types of intrusion detection system are ___________ and ___________.

secret and non-secret

Exterior and interior

physical and virtual

active and passive

Exterior and interior

38
New cards

An effective Counter response to security threats requires ____________.

A well-defined line of command

Comprehensive planning

Alternative power sources

Additional budget allocations

Comprehensive planning

39
New cards

Lighting plays an important role as part of physical security and counter measures to protect national security and other DOD assets.

True or false

True

40
New cards

Emergency lighting, requires ___________ and is used when regular lighting is not available.

Manual switch over

Escalated authority

Alternative power sources

Additional staff resources

Alternative power sources

41
New cards

Government and contract security forces share the same mission to protect national security and other DOD assets.

True or false

True

42
New cards

Interior barrier protectors can be deployed using a ___________.

Audio volume controls

Infrared beam and tripwire

Manual relays

Automatic electronic field and alarm

Infrared beam and wire

43
New cards

Military working dogs, help security force members enforce laws and regulations by helping to identify illegal drugs, detect explosives, or ______________.

Detect contraband equipment

Prevent physical entry

Prevent theft

Search for individuals

Prevent physical entry

44
New cards

____________ can be used for perimeter security.

Guard stands

Signage

Barbwire fencing

Lights

Barbwire fencing

45
New cards

Security-in-depth is determination that the facility's security program consist of a combination of layered and complementary security controls.

True or false

True

46
New cards

Compliance inspections are an effective means to ensure __________ are being met.

Technology reviews

Security feedback reports

Regulatory requirements

Cost-effective measures

Regulatory requirements

47
New cards

Point security is a physical security principle that caused the use of physical security measures to protect a (an) _____________.

Asset specific, vulnerability level

Specific asset or resource

Specific point of an area requiring protection

Asset with specific criticality level

Specific assets or resource

48
New cards

When keys are not controlled, and something goes missing the corrective measure can be very costly and time-consuming.

True or false

True

49
New cards

Access controls systems can either be ___________ or _____________ systems.

Passive or active

Manual or remote controlled

Manual or automated electronic

Encrypted or non-encrypted

Manual or automated electronic

50
New cards

Weapons or sensitive items, such as funds, jewels or precious metals can be stored in the same security container as classified information.

True or false

False

51
New cards

Physical security officers are responsible for planning, forming coordinating, integrating, all physical security matters in their installations.

True or false

False

52
New cards

The ____________ approves security containers used to store classified information.

Assigned DOD agency

General services administration

Director of national intelligence

US environmental protection agency

General services administration

53
New cards

Properly designed facilities provide physical and ___________ deterrence to intruders.

Geographic

Criminal

Psychological

Layered

Psychological

54
New cards

A _____________ is an adversary who uses violence or the threat of violence to instill fear with the intent to coerce or intimidate governments.

Accomplice

Terrorist

Insider

Criminal

Terrorist

55
New cards

It is everyone's responsibility within the secure facility to make sure that classified information does not fall into the hands of someone someone who could use or cause damage to national security.

True or false

True

56
New cards

Security-in-depth is a concept that employees ___________ security measures.

Layered

Covert

Encrypted

Sequential

Layered

57
New cards

Which of the following physical security coordinating activities is responsible for conducting criticality, vulnerability, and risk assessments.

The Working group

Anti-terrorism executive committee

Anti-terrorism working group

Anti-terrorism working group

58
New cards

There are three major departments of defense policies, documents that govern the departments physical security program, which one of these policy documents, or addresses, the physical security aspects of protecting classified information.

DODM 5200.01, volumes 1-4

59
New cards

Interior intrusion detection systems includes proximity, detectors, interior, barrier, protectors, volumetric, detectors, and blank.

Interior barrier switches

Volumetric controls

Operable opening switches

Thermal detectors

Operable opening switches

60
New cards

Blank are components used to protect the perimeter of a facility or an installation.

Key cards

Barrier devices

Lock

Guard staff

Barrier devices

61
New cards

What security force functions may be combined

Static observation post and access control

Dispatch control centers and security systems and monitors

Dispatch control centers in roving patrols

Roving patrols and static observation post

Dispatch control centers and security system monitors

62
New cards

Temporary walls and rigid barriers that establish barriers along approaches within the installation boundary to force vehicles to make a right slow turns before approaching gates or building. Entrances are considered active barriers,

true or false.

False

63
New cards

Surface lighting is used to display a silhouette of any person, passing between the light source and the building to show the contrast of a person inside the building

True or false

True

64
New cards

If a raccoon set off a fence sensor, What kind of alarm occurs

Nuisance alarm

Intruder alarm

Maintenance alarm

False alarm

Nuisance alarm

65
New cards

If nuisance are continuing problem in an alarm zone, a __________ may provide the ability to assess alarms before dispatching security forces

Premise control unit

Screening equipment system

Close circuit television CCTV system

Pest detection system

Close circuit television system

66
New cards

What determines an indicates specific procedures that assigned escort personnel must follow?

Homeland Security Presidential Directive - 12

National industrial security program operating manual

Local directives

Local directives

67
New cards

Glare projection lighting is used to make it more difficult to see outside of facility from the inside

True or false

False

68
New cards

Using handheld mag wand as back up for additional screening with fixed screening equipment is not an effective use of screening equipment

True or false

False

69
New cards

What type of intrusion detection system IDS monitoring provides local centralized monitoring

Central station monitoring

Proprietary monitoring

Local monitoring

None of the above

Proprietary monitoring

70
New cards

What is the purpose of screening equipment?

To identify potentially dangerous and unauthorized items

To validate manufacturer required calibration

To identify potentially dangerous and unauthorized personnel

To prevent the unauthorized removal of classified information

To identify potentially dangerous and unauthorized items

71
New cards

What are the operational phases of an intrusion protection system?

Detection, reporting, dispatch, and response/assessment

Alarm initiation, response, termination assessment/cancellation

Diversion response for dispatch response assessment/cancellation

Alarm silencing, dispatch response termination

Detection, reporting, dispatch response/assessment

72
New cards

What type of access control system requires the user to enter a multi digital number into a push button or keypad cipher device in order to gain access

Program

Biometric

Automated

Combination

Manual

Manual

73
New cards

What are the types of screening equipment most frequently used by the department of defense?

Intrusive and obtrusive

Fixed and portable

Portable, enclosed circuit television

Detection and reporting

Fixed and portable

74
New cards

Security forces composed of military personnel and government employees. All had the same mission to protect DOD assets but security forces composed of Contractor personnel, have narrow missions.

True or false

False

75
New cards

Close circuit television is an especially valuable asset, because it can be used effectively without established and procedures, and providing training and the choose

True or false

False

76
New cards

Identify component of intrusion detection system, IDS.

Document intrusion

Unauthorized entry

Outdoor usage

Transmission line

Transmission line

77
New cards

Enclaving refers to designating ___________of extreme or high security within a __________ of a moderate security

Point... Plain

Island... Sea

Element block

Mountains... Valley

island.......sea

78
New cards

What type of access control system uses verification of an acceptable form of identification, such as common access, card or CAC card.

Combination

Automated

Mechanical

Physical

Manual

Biometric

Manual

79
New cards

A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligible, but who does not have a verified need to know for information protected within the controlled area would require ________________?

An "escort required" visitor badge and escort

An "escort required" visitor badge only

ACAC and an escort

A visitor badge

An "escort required" visitor badge and an escort

80
New cards

If an electrical surge caused by a thunderstorm activates a censor, what kind of alarm occurs?

Nuisance alarm

Maintenance alarm

False alarm

Intruder alarm

False alarm

81
New cards

What type of access control system is a card swipe with or without personal identification number or pin

Physical

Combination

Biometric

Automated

Manual

Automated

82
New cards

What are the characteristics of passive barrier systems

Require manual operation by security for

Have substantial, bulk or mass

Have moving parts

Are permanently installed or require heavy equipment to move

Have substantial bulk, or mass are permanently installed or required heavy equipment to move

83
New cards

The goal of _____________ security is to adequately supervise and protect the communications between the alarmed area, and the monitoring stations to prevent modification and substitution of the transmitted signal

Premise control unit

Monitoring station, equipment, and personal

Transmission line

Sensor and detector

Transmission line

84
New cards

What type of intrusion detection system monitoring is required by law on-site personnel, security of satisfactory

Local monitoring

Central Station monitoring

Proprietary monitoring

None of the above

Local monitoring

85
New cards

What intrusion detection system operational phase is activated when the center responds to stimuli?

Report

Response/assessment

Dispatch

Detection

Detection

86
New cards

How are military working dogs employed by security force members?

Assist in detecting explosives

Assist in law-enforcement

Assist in drug testing

Assist confrontation manage

Assist pest control

Assist detecting

Assistant, law-enforcement, enforce

Assistant confrontation management

87
New cards

To protect consolidated resources, such as installation facility, you would employ__________ security to provide the best protection

Central

Area

Over arching

Point

Area

88
New cards

The perimeter barrier of an installation or facility may include features of the surrounding landscape

True or false

True, true

89
New cards

The types of the site lighting with DOD are_______________

Movable

Emergency

Continuous

Standby

All the above

All the above

90
New cards

____________ are integral components used to protect the perimeter of a facility or an installation.

Key cards

Barrier devices

Locks

Guard staff

Barrier devices

91
New cards

Threat level assess senior leaders to determine the appropriate blank level

FPCON

SOP

Classification designation

GSA security specification

FPCON

92
New cards

Blank issue, force protection conditions (FPCON)

DHS and COCOMS

COCOMS and installation commanders/facility directors

The DIA and COCOMS

COCOMS installation, commanders/facility directors

93
New cards

Anti-terrorism measures used by the DOD to communicate levels of threat and specific areas, and what security measures are used to be in response to those threats are called ________________.

THREATCON and terrorist threat levels

FPCONS AND THREATCON

Terrorist threat levels and FPCONS

Terrorist threat level and FPCONS

94
New cards

________________ establish duties rules and responsibilities at individual assignments, checkpoint gates, and guard post.

Post orders

Physical security plans

Memorandum of understanding

Post orders

95
New cards

_________________ are conducted by peers or by senior agency personnel in the chain of command.

Staff assisted visits

Compliance inspections

Self inspections

Surveys

Staff assisted visits

96
New cards

Which of the following physical security coordinating activities is made up of multiple individuals such as the anti-terrorism officer, counterintelligence representative, operations security officer, and law-enforcement representatives?

Anti-terrorism working group

Threat working group

Anti-terrorism executive committee

Threat networking group

97
New cards

_______________ are formal reviews conducted by senior vessels to verify policies are being followed, identify weaknesses, promote, cost-effectiveness, and quality performance, and serve as a opportunity for security education.

Self inspections

Compliance inspections

Staff assisted visits

Surveys

98
New cards

The Inspectors role is the only identify weaknesses and security violations, and should not extend to suggestion corrective action

True or false

False

99
New cards

Anti-terrorism, physical security measures incorporate detection, deterrence, denial, and ______________

Delay

Evaluation

Determination

Notification

100
New cards

Conducting a survey is a useful way to determine the physical security posture of an installation or facility

True or false

True