






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Physical Security Measures Exam Question And Answers 2024
Typology: Exams
1 / 12
This page cannot be seen from the preview
Don't miss anything!
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system. - correct answers ✅Automated What comprises an "alarmed area?" - correct answers ✅The Premise Control Unit (PCU) and the sensors it serves True or False. Glare projection lighting is used to make it more difficult to see outside a facility from the inside. - correct answers ✅False What are the operational phases of an Intrusion Detection system? - correct answers ✅Detection, Reporting, Dispatch, and Response/Assessment What are signs, barriers, and fences used for in perimeter protection systems? - correct answers ✅Establishing legal boundaries Preventing observation from outside Deterring unlawful or unauthorized entry Conveyor belt style x-ray machines are classified as what type of screening equipment? - correct answers ✅Fixed
True or False. A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use. - correct answers ✅False The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________
. - correct answers ✅Monitoring Station Identify the best practices for security inspections. - correct answers ✅Conduct security inspections randomly or during periods of increased alertness Only senior officials and security personnel should know security inspection schedules True or False. Typically, the security force is deployed to support either perimeter or enclave security. - correct answers ✅False _____________ employs various layers of complementary security controls because different assets require differing levels of protection. - correct answers ✅Security-in-depth
What kind of screening equipment is effective for screening the things people bring in to facilities? - correct answers ✅Conveyor belt style x-ray machines Personal recognition is an example of what type of access control system? - correct answers ✅ What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring? - correct answers ✅Proprietary monitoring A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________. - correct answers ✅an "escort required" visitor badge and escort To protect consolidated resources, such as an installation or facility, you would employ ____________ security to provide the best protection. - correct answers ✅area Which method of lighting has the disadvantage that it often illuminates or silhouettes security personnel as they patrol their routes? - correct answers ✅
True or False. Security forces composed of military personnel and government employees all have the same mission, to protect DoD assets, but security forces composed of contractor personnel have narrower missions. - correct answers ✅False True or False. A closed circuit television (CCTV) video surveillance system is only used for monitoring areas that are not alarmed. - correct answers ✅False ______________ fencing is used to protect a stationary perimeter. - correct answers ✅permanent What are the characteristics of passive barrier systems? - correct answers ✅Have substantial bulk or mass Are permanently installed or require heavy equipment to move What Intrusion Detection System (IDS) operational phase is activated when a sensor responds to stimuli? - correct answers ✅Detection What are some important considerations in planning for your monitoring station? - correct answers ✅Staffing
A closed circuit television CCTV system can be a key asset in the event of a disaster because it can document valuable resources that were destroyed and can serve as a deterrent to looters. - correct answers ✅False The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously. - correct answers ✅closed circuit television (CCTV) The protection of DoD assets is achieved through the application of active and ___________ complementary physical security measures. - correct answers ✅Passive What is the purpose of screening equipment? - correct answers ✅To identify potentially dangerous and unauthorized items. What type of access control system requires the user to enter a multi-digit number into a push button or keypad cipher device in order to gain access? - correct answers ✅ What allows security forces unimpeded observation of the barrier area? - correct answers ✅Clear Zones
Selection of a manual or automated access control system is based on _______________. - correct answers ✅ What are the types of screening equipment most frequently used by the Department of Defense (DoD)? - correct answers ✅Fixed and Portable True or False. A visitor who does not have an approved DoD credential arrives at a facility to perform a facility repair that has been requested. The visitor may be provided access in accordance with facility procedures. Select one: - correct answers ✅True If a visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility arrives at a facility, the host may grant access if what is verified? - correct answers ✅Visitor's need-to-know True or False. Use of automated access control procedures requires that the individual requiring access has already been vetted and received an appropriate DoD credential. - correct answers ✅True If nuisance alarms are a continuing problem in an alarm zone, a ___________________________ may provide the
Enclaving refers to designating _________ of extreme or high security within a _________of moderate security. - correct answers ✅islands...sea How are military working dogs employed by security force members? - correct answers ✅Assist in law enforcement Assist in confrontation management Assist in detecting explosives A waterway is an example of what kind of barrier? - correct answers ✅Natural Identify a component of Intrusion Detection Systems (IDS)? - correct answers ✅ The purpose of an access control system is to _____________________________________. - correct answers ✅Allow authorized entry and prevent unauthorized entry to a controlled area. True or False. Temporary walls and rigid barriers that establish barriers along approaches within the installation boundary to force vehicles to make tight, slow turns
before approaching gates or building entrances are considered active barriers. - correct answers ✅False If an electrical surge caused by a thunderstorm activates a sensor, what kind of alarm occurs? - correct answers ✅False Alarm Response forces ___________________________________. - correct answers ✅respond to alarms and incidents What is an appropriate response when fixed screening equipment sets off an alarm? - correct answers ✅Hand screening Manual search Using portable screening equipment What type of access control system is a card swipe, with or without a personal identification number, or PIN? - correct answers ✅Automated The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion. - correct answers ✅Document