Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

PHYSICAL SECURITY-(SPED), Physical Security Certification (PSC), DCSA SPeD:100%Q&A, Exams of Advanced Education

Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Identify (3) Answer is : Identify assets Identify threats Identify vulnerabilities Which policy should you consult to find the physical security requirements of protecting classified information? Answer is : DoDM 5200.01, Volumes 1-4 DoD Information Security Program Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command? Answer is : DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB) Which of the following individuals should be included in a Threat Working Group? Answer is : Chemical, biological, radiological, nuclear and high yield explosive representative, Information operations representative, Operations security officer, Law enforcement, Counterintelligence, Antiterrorism Officer

Typology: Exams

2022/2023

Available from 06/25/2023

Dr.Assessments
Dr.Assessments šŸ‡ŗšŸ‡ø

4.5

(2)

94 documents

1 / 32

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Page 1 of 32
PHYSICAL SECURITY-- (SPED), Physical Security
Certification (PSC), DCSA SPeD: Physical Security
Certification (PSC) Exam Q&A.
Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event
happening, what steps in the risk management process must you take first? Identify (3)
Answer is :
Identify assets
Identify threats
Identify vulnerabilities
Which policy should you consult to find the physical security requirements of protecting
classified information?
Answer is :
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Which policy authorizes commanders to issue regulations for the protection or security of
property and places under their command?
Answer is :
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical
Security Review Board (PSRB)
Which of the following individuals should be included in a Threat Working Group?
Answer is :
Chemical, biological, radiological, nuclear and high yield explosive representative, Information
operations representative, Operations security officer, Law enforcement, Counterintelligence,
Antiterrorism Officer
Which of these can be made of solid steel to make them more attack resistant?
Answer is :
Doors
Which of these house ventilation systems that should be secured with steel bars?
Answer is :
Roofs
Which of these should be covered with a protective film to make them less dangerous in an
attack?
Answer is :
Windows
Which of the following locks are approved to secure classified information or material?
Answer is :
Kaba Mas X-10, S&G 8077/AD
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20

Partial preview of the text

Download PHYSICAL SECURITY-(SPED), Physical Security Certification (PSC), DCSA SPeD:100%Q&A and more Exams Advanced Education in PDF only on Docsity!

PHYSICAL SECURITY-- (SPED), Physical Security

Certification (PSC), DCSA SPeD: Physical Security

Certification (PSC) Exam Q&A.

Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Identify (3) Answer is : Identify assets Identify threats Identify vulnerabilities Which policy should you consult to find the physical security requirements of protecting classified information? Answer is : DoDM 5200.01, Volumes 1- 4 DoD Information Security Program Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command? Answer is : DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB) Which of the following individuals should be included in a Threat Working Group? Answer is : Chemical, biological, radiological, nuclear and high yield explosive representative, Information operations representative, Operations security officer, Law enforcement, Counterintelligence, Antiterrorism Officer Which of these can be made of solid steel to make them more attack resistant? Answer is : Doors Which of these house ventilation systems that should be secured with steel bars? Answer is : Roofs Which of these should be covered with a protective film to make them less dangerous in an attack? Answer is : Windows Which of the following locks are approved to secure classified information or material? Answer is : Kaba Mas X-10, S&G 8077/AD

At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS). Answer is : Physical Security Plans Assets fall into 5 categories, name all 5 of them. Answer is :

  1. People
  2. Information
  3. Equipment
  4. Facilities and
  5. Activities and Operations Who provides construction and security requirements for SCIFs? Answer is : Director of National Intelligence (DNI) Who provides accreditation for SCIFs? Answer is : Defense Intelligence Agency (DIA) They are used by the intelligence community to store classified information. Answer is : SCIFs are used by the intelligence community to store classified information called Sensitive Compartmented Information (SCI). Warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle. T/F Answer is : True The use of master key systems is acceptable in the storage of AA&E. Answer is : False. The use of master key systems is not authorized in AA&E storage facilities. The first line of defense in any physical security system is usually some form of? Answer is : perimeter protection system What kind of fencing is used when a stationary perimeter requires protection? Answer is : Permanent What kind of fencing can be used as a temporary perimeter to establish psychological barriers and to channel pedestrian and vehicle movement.

B. Physical security aims to safeguard assets against espionage, sabotage, terrorism, damage, and criminal activity. Answer is : B Which of the following is true of access control measures? Answer is : Access control is integral and interoperable part of DoD installation physical security programs. The installation commander/facility director is responsible for defining access control measures consistent with DoD policy. Which of the following is NOT a physical security measure? Answer is : Marking classified documents. Name 3 physical security measures? Answer is : Perimeter Fences Security Guards Alarm Systems What does a physical security program aim to prevent unauthorized access to? (4) Answer is : Personnel Equipment Installations Information What are considered access control measures? (3) Answer is : Identification Cards Security Guards Locks and Keys List the nine capabilities a security system must provide to achieve Security-in-Depth? Answer is : Deter Detect Identify Track Assess Record Communicate Delay Respond

Describe the elements of a restricted area? Answer is : An area (land, sea, or air) in which there are special restrictive measures employed to prevent or minimize incursions and/or interference, or where special security measures are employed to prevent unauthorized entry. Restricted areas must be authorized by the installation/activity commander/director, properly posted, and employ physical security measures. List three policies or regulations that govern the DoD physical security program? Answer is : DoD 5200.08-Regulation Physical Security Program DoD Manual 5100.76 Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) DoD Manual 5105.21 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Physical Security, Visitor Control, and Technical Security Describe the purpose of the 5200.08-R (Physical Security Program)? Answer is : The regulation implements DoD policies and provides minimum standards for the physical protection of DoD personnel, installations, operations, and related resources. Define Security-in-Depth? Answer is : A determination by the senior agency official that a facility's security program consists of layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility. List examples of Security-in-Depth? (5) Answer is : Perimeter fence Employee/visitor access control Intrusion detection system Random guard patrols Closed circuit video monitoring List examples of physical security threats? (8) Answer is : Foreign intelligence services Foreign military and paramilitary forces Terrorists Saboteurs Criminals Protest groups Disaffected persons

Location and vulnerability Operational readiness Value Classification Replacement costs Who must approve all Intrusion Detection Equipment (IDE) installed on Open Storage Areas? Answer is : DoD Components approve Underwriters Laboratories' listed equipment. What reference governs the Certification and Accreditation (C&A) for storage of DoD collateral Classified Information Systems? Answer is : DODM 5200.01, DoD Information Security Program, Volume 3, Protection of Classified Information. To whom should incidents involving stolen, lost, or recovered Arms, Ammunition, and Explosives (AA&E), which cause significant news coverage or have the potential to cause such coverage, be reported? Answer is : The Office of the Under Secretary of Defense for Intelligence. Who is responsible for issuing instructions governing the security of weapons systems within their inventory? Answer is : Each DoD Component head. What are the four considerations/risk factors used for determining the security risk category (SRC) of sensitive conventional AA&E? Answer is : Utility Casualty or damage risk Adaptability risk Portability risk What is the purpose of intrusion detection systems? Answer is : To detect unauthorized penetration into a secured area. Describe the four types of lighting systems used for security lighting? Answer is : Continuous lighting: A series of fixed lights arranged to continuously illuminate a given area. Standby lighting: Luminaires are either automatically or manually turned on at times when suspicious activity is detected by security personnel or an intrusion detection system. A standby

system creates the impression of activity and may offer a deterrent value while also conserving energy. Emergency lighting: Emergency lighting is used during a power failure or when regular lighting is not available for any reason. This type of lighting depends on alternative power sources such as batteries or generators. Moveable lighting: Manually-operated searchlights that may be lighted during hours of darkness or as needed, and is normally used to supplement continuous or standby lighting. What is the reference that provides minimum construction requirements for fencing? Answer is : UFC 4- 022 - 03, Security Fences and Gates List the types of buildings that are exempt from certain DoD antiterrorism site design standards? (14) Answer is : Low occupancy buildings Low occupancy family housing Fisher houses Town centers Enhanced use leases Transitional structures and spaces Temporary and re-locatable buildings Construction administration structures Recruiting stations in leased spaces Stand-alone gas stations and car care centers Military protective construction (designed to NATO or equivalent standards) Stand-alone franchised fast food operations Stand-alone shoppettes, minimarts, and similarly-sized commissaries Small stand-alone commercial, bank, and pharmacy facilities Name 9 types of authorized locking devices used within the Department of Defense? Answer is : Cylindrical locksets Dead-bolt locksets Drop-bolt locks Padlocks Mechanical push-button combination locks Mechanical combination locks Electro-mechanical combination locks Warded locks Pin tumbler locks Which types of locks are associated with Federal Specification FF-L- 2740 and are approved for storage of all types of classified materials, regardless of classification? Answer is :

transfers may be used to monitor authorized/unauthorized openings, personnel access, combination verification, and combination changes. The DoD Antiterrorism Standards are applicable to which types of buildings? (12) Answer is : New construction Existing buildings Major investments Change of occupancy level Window replacement Roadway improvement projects Building additions Leased buildings Partial occupancy National Guard buildings Visitor centers and museums Expeditionary structures What are the four basic functional elements that must operate in an integrated and timely manner to achieve an overall effective security system that defeats design threats? Answer is : Intrusion detection and access control sensors and/or guards Threat assessment from guards and/or CCTV Appropriately designed and located barriers Responding guards What are some of the considerations for selecting and implementing a particular intrusion detection system? (4) Answer is : Completeness of coverage False and nuisance response rates Probability of detection Zone at which the alarm occurred List two reasons for which physical security programs should be tailored to local conditions? Answer is : In overseas areas, COCOMS may deviate from DoD policy where required by treaties, agreements, and arrangements with foreign governments and allied forces. Threats, vulnerabilities, and critical assets may vary. Before loss of Arms, Ammunition, and Explosives (AA&E) can be attributed to any inventory or accountability discrepancy, one must first determine the loss was not a result of what three factors? Answer is :

Theft Abandonment Misappropriation Define the term "risk" within the context of risks, threats, and vulnerabilities? Answer is : A measure of consequence of peril, hazard, or loss, which is incurred from a capable aggressor or the environment. When planning and/or responding to an emergency, with whom should coordination occur? Answer is : Local, state, federal, and/or host country officials and organizations. What are the three goals of the DoD Installation Emergency Management Program? Answer is : Prepare DoD installations for emergencies Respond appropriately to protect personnel and save lives Recover and restore operations after an emergency What is the role of the National Response Framework (NRF) for installation emergency management? Answer is : Establishes clear objectives for a concerted national effort to prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other domestic emergencies. The NRF provides the structure and mechanism for a consistent, nationwide approach for federal, state, and local governments to effectively and efficiently work together to manage domestic incidents, regardless of cause, size, or complexity. Define preparedness in the context of emergency management? Answer is : Preparedness is the range of deliberate, critical tasks and activities necessary to build, sustain, and improve the operational capability to prevent, protect against, respond to, and recover from domestic incidents. Preparedness is a continuous process. Preparedness involves efforts at all levels of government and coordination among government, private sector, and non-governmental organizations to identify threats, determine vulnerabilities, and identify required resources. Within the National Incident Management System, preparedness is operationally focused on establishing guidelines, protocols, and standards for planning, training and exercises, personnel qualification and certification, equipment certification, and publication management. Why are Physical Security Measures employed? Answer is : To prevent or reduce the potential for sabotage, theft, trespassing, terrorism, espionage, or other criminal activity. How do Security Measures ensure security?

Answer is : False Which protective barrier would most likely be utilized for its decorative appeal? Answer is : Concrete planter can serve as a protective barrier by preventing vehicle access. To be effective, clear zones should be free of which of the following? Answer is : Must be free of visual obstructions such as bushes. What is Glare Projection? Answer is : This method is intended to make the inside of a protected area difficult to see from outside the protected area. What is Controlled Lighting? Answer is : This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports. What is Surface Lighting? Answer is : This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building. When planning protective site lighting, you should ensure that controls and switches are installed inside the protected area and locked or guarded or inside a central station such as an alarm monitoring station? T/F Answer is : True Flashlights are a reliable form of continuous lighting? T/F Answer is : False Emergency lighting depends upon the power supply of the utility company? T/F Answer is : False Standby lighting is the type of lighting used when the primary power source fails? T/F Answer is : False Government security forces may be either military or civilian? T/F

Answer is : True Contract security forces may be either military or civilian? T/F Answer is : True Military working dogs can seek, detect, defend their handlers, and guard suspects? T/F Answer is : True Which statement best describes the mission of security forces? Answer is : The mission of all government security forces, civilian or military, contract forces, and military working dogs is to protect DoD assets. What responds to a physical stimulus? Answer is : Sensor/detector Receives change of state and transmits alarm? Answer is : Premise Control Unit (PCU) Central point for collecting alarm status? Answer is : Monitoring station What assures communications between the alarmed area and the monitoring station? Answer is : Transmission Line Security CCTV camera may capture activity missed by security force personnel? T/F Answer is : True CCTV can act as an intrusion detection system (IDS) when combined with video motion detection? T/F Answer is : True An advantage of CCTV is that environmental factors do not affect its performance? T/F Answer is : False Which of the following are access control systems? (4)

The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets. Use of oversight tools is an important part of physical security implementation. Facility design must be considered in physical security planning. Physical security countermeasures must always be planned for when designing a facility. Which of the following would best be described as a countermeasure? Answer is : Fence Who is responsible for the installation's antiterrorism program? Answer is : Antiterrorism Officer Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries? Answer is : CI Support Who analyzes threats to assets and their vulnerabilities? Answer is : OPSEC Officer Who must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation? Answer is : Law Enforcement Who is charged with the management, implementation, and direction of all physical security programs? Answer is : Physical Security Officer/Provost Marshal Who is responsible for the safety of people and property under their command? Answer is : Installation Commander/Facility Director Who is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility? Answer is : DCIP Officer Fencing has which of the following features for DoD compliance? Answer is : The steel mesh wire on a chain link fence should not be greater than 2 inches in diameter to be in compliance with DoD specifications.

Which consideration do you think was more important when selecting this type of fence for this installation-cost or appearance? Answer is : Cost Lighting which is continuously lit during hours of darkness? Answer is : Continuous Lighting Lighting illuminated manually or automatically when suspicious activity is detected or suspected by the security force, alarm system, or motion detector? Answer is : Stand-by Lighting Back-up lighting used during power failures or other emergencies when normal systems are inoperative? Answer is : Emergency Lighting What is the primary purpose of continuous lighting? Answer is : To deter intruders What type of barrier is a concrete Jersey barrier? Answer is : Passive What is the primary purpose of a concrete Jersey barrier? Answer is : To help prevent unauthorized vehicle entry. What type of barrier is an automated barrier? Answer is : Active What is the primary purpose of an Active barrier? Answer is : To stop vehicles for guard authorization A camera on the guard house is part of what type of physical security measure? Answer is : Closed Circuit Television (CCTV) What is the primary purpose of the CCTV physical security measure? Answer is :

Answer is : True Intrusion Detection Systems (IDS) prevent unauthorized entry? T/F Answer is : False Cost and risk must always be considered when planning which physical security measures to use in a facility or installation? T/F Answer is : True Access control systems help to prevent unauthorized entry? T/F Answer is : True CCTV can deter loss, theft, or misuse of government property and resources? T/F Answer is : True Operational/administrative procedures for normal and emergency situations? Answer is : (SOP) Standard Operating Procedures Comprehensive protective measures for an installation, facility, or activity? Answer is : (PSP) Physical Security Plan Roles and responsibilities for individual work areas such as checkpoints and guard gates? Answer is : Post Orders Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency? Answer is : (COOP) Continuity of Operations Plan Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity? Answer is : MOU/MOA Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs? T/F Answer is : True

Both the DIA and COCOMs issue FPCONs? T/F Answer is : False True or False: Installation commanders and facility directors issue DoD Terrorist Threat Levels? Answer is : False Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions? T/F Answer is : True FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels? T/F Answer is : True A system that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets? Answer is : Force Protection Conditions The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents? Answer is : DoD AT Program Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests? Answer is : Terrorist Threat Levels Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information? Answer is : Force Protection Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program? Answer is : Management/Self-Inspections Formal reviews conducted by senior officials in the chain-of-command? Answer is : Compliance Inspections