1/514
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Some key operated lacks are built into the door or container. They are also known as ?
Mortise Lock
The _________ is responsible for supporting the physical security mission by managing, implementing and directing and installation or facilities, physical security program.
Counterintelligence Agent
Anti-terrorism officer
physical security officer
operational security, officer
commander, or Director
Physical security officer
Lighting weapons, close circuit, TV, fences, locking mechanisms are all examples of what category of counter measures. The options are procedural, facilities, training, and equipment.
Equipment
An asset value should be assigned based on the perspective of : asset manager, Chief of security, program manager, or asset owner
Asset owner
You are the one who decides what constitutes and acceptable level of risk for an organizations asset is this true or false?
False
Which of the following questions are used to identify an adversaries intent/ SELECT ALL THAT APPLY What are the vulnerabilities to the wrist management system? What are the adversaries goals? What level of risk are the adversaries likely to accept and are the adversaries willing to risk getting caught.
What are the adversaries? What level of risk are the adversaries likely to accept and are the adversaries willing to risk getting caught?
After you completed all other steps, what chart would you use to summarize and record your information in order to get the total cost of all counter measures? The options are intent assessment chart, collection capability assessment chart, threat assessment summary chart, or countermeasure analyst chart
Counter measure analyst chart
To assist in analyzing threat data adversaries are typically group into all EXCEPT which of the following categories: organizations, companies, governments or individuals
Companies
After completing the vulnerability assessment in the risk management process, the next step is the ____________ assessment. : Counter measures, cost/benefit, risk or asset.
Risk
After completing a threat assessment step of the risk management process, what step should be completed next? asset assessment, countermeasure determination, cost/benefits analysis, or vulnerability assessment
Vulnerability assessment
Which of the following is NOT a good interview question for determining adversaries history?
Does the adversary have the weapons or tools for exploiting attack on an asset?
Has the adversary attack or exploited assets and personnel before?
Has the adversary been suspected of attacking or exploiting assets?
Might some foreseeable event cause the adversary to attempt an attack in the future.
Has the adversary been suspected of attacking or exploiting exploiting assests
Which of the following is one of five categories of assets.
facilities
counter measures
vulnerabilities
Facilities
The risk management process uses FOUR linguistic values: critical high,
medium and significant: true or false
False
Poor perimeter lighting and unsecured doors are example of a/an __________ vulnerability.
Facility
operational
human
information.
Facility
Awareness programs, two rules and passwords are examples of what category of countermeasure? manpower
equipment
planning
procedural
Procedural
Time to implement and oversee the countermeasure, the time to prepare for its implementation, and the time required to follow up and evaluation have no impact when determine the cost of countermeasure:
true or false
False
Identify and characterizes specific vulnerabilities that still exist, given their current countermeasure is a step necessary for ?
risk rating
risk assessment
regression analysis
threat rating
Regression analysis
The process in which the cost and benefits of each alternative countermeasure are compared and the most appropriate alternative is selective is called:
cost benefits analysis
impact cost analysis
threat cost analysis
countermeasure benefits analysis
Cost benefits analysis
The degree of difficulty required to exploit a single vulnerability defines what vulnerability criteria? Quality
undesirable event
effectiveness
Quantity
Quality
The number of complementary vulnerabilities that can be exploited defines what vulnerability criteria?
quantity
effectiveness
quality
undesirable event
Quantity
Your research shows that your specific threat category indicates little or no evidence of capability or intent with no history of actual or planned threats against assets. The linguistic rating you assign to this asset category is:
negligible
low
medium
none
Low
When determining an adversary's history, It is a good idea to ask if the adversary has been suspected of attacking or exploiting assets: true or false
True
Determining if an adversary has the requisite technology and skills to help determine an adversaries: intent
capability,
history
vulnerability
Capability
One way to describe asset value is:
What is the impact of an undesirable event
What is the potential for an event to take place?
What is the level of weakness at the site?
What is the capability of specific threat?
What is the impact of an undesirable event?
Identifying the ineffective counter measures is the first step in the Regressive analyst process.:
true or false
False
A threat is any indication, circumstance, or event while an adversary is in an individual, group, organization, or government.
true or false
True
when following the risk management process, what is the next thing you should do after identifying significant assets?
Measure impacts
create a risk assessment worksheet
identify potential undesirable events
Identify potential undesirable events
Which one of the following questions can help guide interviewing SME about potential undesirable events?
What Critical valuable equipment is located at this site? Why is it critical valuable?
What undesirable events regarding a particular asset concerned the asset owner?
What critical mission activities take place at the site?
Who are the facility personnel, tenants, customers and visitors? What relationship do they have to the critical mission, activities or operations?
What undesirable events regarding a particular assets concern the asset owner
Poor trade craft practices are an example of a/an _______________ vulnerability.:
equipment
information
operational
facility
Operational
Which of the following is NOT a responsibility of the information system operator (ISO)?
Coordinate the physical security measures for information systems.
Ensure that security considerations are properly and legal incorporated.
Develop contingency plans for information systems.
Ensure that security considerations are properly and legal incorporated.
Which of the following statements are true about the Department of Defense's Physical security program?
It establishes the standards, criteria and guidelines for determining whether individuals requiring access to classified information are loyal trustworthy and responsible.
It uses active and passive measures to detect, deter, delay and/or deny unauthorized access to personnel, installations, equipment, facilities, activities and operation.
It defines the requirement for safeguarding classified information in the possession of government contractors, licenses or grantees in the most efficient and cost effective manner possible.
It uses active and passive measures to detect, deter, delay and/or deny unauthorized access to personnel, installations, equipment, facilities, activities and operation.
A ___________ is an indication , circumstance or event with the potential to cause loss or damage of an asset or capability.
Threat
Risk
Vulnerability
Compromise
Threat
Interior intrusion detection systems include proximity detectors, interior barrier protectors, volumetric detectors, and _____________.
Interior Barrier switches
Volumetric controls
Operable opening switches
Thermal detectors
Operable opening switches
The ______________ is responsible for supporting the physical security mission by managing, implementing and directing and installation or facilities, physical security program.
Counter, intelligence agent
Anti-terrorism officer
Physical security officer
Operational security officer
Command or Director
Physical security officer
Critical looks at the importance of a part to the whole.
True or false
True
FPCON __________ warrants a routine security posture.
Normal
alpha
Bravo
Charlie
Delta
Normal
The two types of intrusion detection system are ___________ and ___________.
secret and non-secret
Exterior and interior
physical and virtual
active and passive
Exterior and interior
An effective Counter response to security threats requires ____________.
A well-defined line of command
Comprehensive planning
Alternative power sources
Additional budget allocations
Comprehensive planning
Lighting plays an important role as part of physical security and counter measures to protect national security and other DOD assets.
True or false
True
Emergency lighting, requires ___________ and is used when regular lighting is not available.
Manual switch over
Escalated authority
Alternative power sources
Additional staff resources
Alternative power sources
Government and contract security forces share the same mission to protect national security and other DOD assets.
True or false
True
Interior barrier protectors can be deployed using a ___________.
Audio volume controls
Infrared beam and tripwire
Manual relays
Automatic electronic field and alarm
Infrared beam and wire
Military working dogs, help security force members enforce laws and regulations by helping to identify illegal drugs, detect explosives, or ______________.
Detect contraband equipment
Prevent physical entry
Prevent theft
Search for individuals
Prevent physical entry
____________ can be used for perimeter security.
Guard stands
Signage
Barbwire fencing
Lights
Barbwire fencing
Security-in-depth is determination that the facility's security program consist of a combination of layered and complementary security controls.
True or false
True
Compliance inspections are an effective means to ensure __________ are being met.
Technology reviews
Security feedback reports
Regulatory requirements
Cost-effective measures
Regulatory requirements
Point security is a physical security principle that caused the use of physical security measures to protect a (an) _____________.
Asset specific, vulnerability level
Specific asset or resource
Specific point of an area requiring protection
Asset with specific criticality level
Specific assets or resource
When keys are not controlled, and something goes missing the corrective measure can be very costly and time-consuming.
True or false
True
Access controls systems can either be ___________ or _____________ systems.
Passive or active
Manual or remote controlled
Manual or automated electronic
Encrypted or non-encrypted
Manual or automated electronic
Weapons or sensitive items, such as funds, jewels or precious metals can be stored in the same security container as classified information.
True or false
False
Physical security officers are responsible for planning, forming coordinating, integrating, all physical security matters in their installations.
True or false
False
The ____________ approves security containers used to store classified information.
Assigned DOD agency
General services administration
Director of national intelligence
US environmental protection agency
General services administration
Properly designed facilities provide physical and ___________ deterrence to intruders.
Geographic
Criminal
Psychological
Layered
Psychological
A _____________ is an adversary who uses violence or the threat of violence to instill fear with the intent to coerce or intimidate governments.
Accomplice
Terrorist
Insider
Criminal
Terrorist
It is everyone's responsibility within the secure facility to make sure that classified information does not fall into the hands of someone someone who could use or cause damage to national security.
True or false
True
Security-in-depth is a concept that employees ___________ security measures.
Layered
Covert
Encrypted
Sequential
Layered
Which of the following physical security coordinating activities is responsible for conducting criticality, vulnerability, and risk assessments.
The Working group
Anti-terrorism executive committee
Anti-terrorism working group
Anti-terrorism working group
There are three major departments of defense policies, documents that govern the departments physical security program, which one of these policy documents, or addresses, the physical security aspects of protecting classified information.
DODM 5200.01, volumes 1-4
Interior intrusion detection systems includes proximity, detectors, interior, barrier, protectors, volumetric, detectors, and blank.
Interior barrier switches
Volumetric controls
Operable opening switches
Thermal detectors
Operable opening switches
Blank are components used to protect the perimeter of a facility or an installation.
Key cards
Barrier devices
Lock
Guard staff
Barrier devices
What security force functions may be combined
Static observation post and access control
Dispatch control centers and security systems and monitors
Dispatch control centers in roving patrols
Roving patrols and static observation post
Dispatch control centers and security system monitors
Temporary walls and rigid barriers that establish barriers along approaches within the installation boundary to force vehicles to make a right slow turns before approaching gates or building. Entrances are considered active barriers,
true or false.
False
Surface lighting is used to display a silhouette of any person, passing between the light source and the building to show the contrast of a person inside the building
True or false
True
If a raccoon set off a fence sensor, What kind of alarm occurs
Nuisance alarm
Intruder alarm
Maintenance alarm
False alarm
Nuisance alarm
If nuisance are continuing problem in an alarm zone, a __________ may provide the ability to assess alarms before dispatching security forces
Premise control unit
Screening equipment system
Close circuit television CCTV system
Pest detection system
Close circuit television system
What determines an indicates specific procedures that assigned escort personnel must follow?
Homeland Security Presidential Directive - 12
National industrial security program operating manual
Local directives
Local directives
Glare projection lighting is used to make it more difficult to see outside of facility from the inside
True or false
False
Using handheld mag wand as back up for additional screening with fixed screening equipment is not an effective use of screening equipment
True or false
False
What type of intrusion detection system IDS monitoring provides local centralized monitoring
Central station monitoring
Proprietary monitoring
Local monitoring
None of the above
Proprietary monitoring
What is the purpose of screening equipment?
To identify potentially dangerous and unauthorized items
To validate manufacturer required calibration
To identify potentially dangerous and unauthorized personnel
To prevent the unauthorized removal of classified information
To identify potentially dangerous and unauthorized items
What are the operational phases of an intrusion protection system?
Detection, reporting, dispatch, and response/assessment
Alarm initiation, response, termination assessment/cancellation
Diversion response for dispatch response assessment/cancellation
Alarm silencing, dispatch response termination
Detection, reporting, dispatch response/assessment
What type of access control system requires the user to enter a multi digital number into a push button or keypad cipher device in order to gain access
Program
Biometric
Automated
Combination
Manual
Manual
What are the types of screening equipment most frequently used by the department of defense?
Intrusive and obtrusive
Fixed and portable
Portable, enclosed circuit television
Detection and reporting
Fixed and portable
Security forces composed of military personnel and government employees. All had the same mission to protect DOD assets but security forces composed of Contractor personnel, have narrow missions.
True or false
False
Close circuit television is an especially valuable asset, because it can be used effectively without established and procedures, and providing training and the choose
True or false
False
Identify component of intrusion detection system, IDS.
Document intrusion
Unauthorized entry
Outdoor usage
Transmission line
Transmission line
Enclaving refers to designating ___________of extreme or high security within a __________ of a moderate security
Point... Plain
Island... Sea
Element block
Mountains... Valley
island.......sea
What type of access control system uses verification of an acceptable form of identification, such as common access, card or CAC card.
Combination
Automated
Mechanical
Physical
Manual
Biometric
Manual
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligible, but who does not have a verified need to know for information protected within the controlled area would require ________________?
An "escort required" visitor badge and escort
An "escort required" visitor badge only
ACAC and an escort
A visitor badge
An "escort required" visitor badge and an escort
If an electrical surge caused by a thunderstorm activates a censor, what kind of alarm occurs?
Nuisance alarm
Maintenance alarm
False alarm
Intruder alarm
False alarm
What type of access control system is a card swipe with or without personal identification number or pin
Physical
Combination
Biometric
Automated
Manual
Automated
What are the characteristics of passive barrier systems
Require manual operation by security for
Have substantial, bulk or mass
Have moving parts
Are permanently installed or require heavy equipment to move
Have substantial bulk, or mass are permanently installed or required heavy equipment to move
The goal of _____________ security is to adequately supervise and protect the communications between the alarmed area, and the monitoring stations to prevent modification and substitution of the transmitted signal
Premise control unit
Monitoring station, equipment, and personal
Transmission line
Sensor and detector
Transmission line
What type of intrusion detection system monitoring is required by law on-site personnel, security of satisfactory
Local monitoring
Central Station monitoring
Proprietary monitoring
None of the above
Local monitoring
What intrusion detection system operational phase is activated when the center responds to stimuli?
Report
Response/assessment
Dispatch
Detection
Detection
How are military working dogs employed by security force members?
Assist in detecting explosives
Assist in law-enforcement
Assist in drug testing
Assist confrontation manage
Assist pest control
Assist detecting
Assistant, law-enforcement, enforce
Assistant confrontation management
To protect consolidated resources, such as installation facility, you would employ__________ security to provide the best protection
Central
Area
Over arching
Point
Area
The perimeter barrier of an installation or facility may include features of the surrounding landscape
True or false
True, true
The types of the site lighting with DOD are_______________
Movable
Emergency
Continuous
Standby
All the above
All the above
____________ are integral components used to protect the perimeter of a facility or an installation.
Key cards
Barrier devices
Locks
Guard staff
Barrier devices
Threat level assess senior leaders to determine the appropriate blank level
FPCON
SOP
Classification designation
GSA security specification
FPCON
Blank issue, force protection conditions (FPCON)
DHS and COCOMS
COCOMS and installation commanders/facility directors
The DIA and COCOMS
COCOMS installation, commanders/facility directors
Anti-terrorism measures used by the DOD to communicate levels of threat and specific areas, and what security measures are used to be in response to those threats are called ________________.
THREATCON and terrorist threat levels
FPCONS AND THREATCON
Terrorist threat levels and FPCONS
Terrorist threat level and FPCONS
________________ establish duties rules and responsibilities at individual assignments, checkpoint gates, and guard post.
Post orders
Physical security plans
Memorandum of understanding
Post orders
_________________ are conducted by peers or by senior agency personnel in the chain of command.
Staff assisted visits
Compliance inspections
Self inspections
Surveys
Staff assisted visits
Which of the following physical security coordinating activities is made up of multiple individuals such as the anti-terrorism officer, counterintelligence representative, operations security officer, and law-enforcement representatives?
Anti-terrorism working group
Threat working group
Anti-terrorism executive committee
Threat networking group
_______________ are formal reviews conducted by senior vessels to verify policies are being followed, identify weaknesses, promote, cost-effectiveness, and quality performance, and serve as a opportunity for security education.
Self inspections
Compliance inspections
Staff assisted visits
Surveys
The Inspectors role is the only identify weaknesses and security violations, and should not extend to suggestion corrective action
True or false
False
Anti-terrorism, physical security measures incorporate detection, deterrence, denial, and ______________
Delay
Evaluation
Determination
Notification
Conducting a survey is a useful way to determine the physical security posture of an installation or facility
True or false
True