Lesson 1
You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?
Select the best answer.
1) DODM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives
2) UFC, 4-021-02, Electronic Security Systems
3) ICS 705-1, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities
4) DoD Manual on ESS Planning
2.)UFC, 4-021-02, Electronic Security Systems
Lesson 1
An ESS is a component of an overall physical protection system.
True
Or
False
True
An ESS is a component of the physical security equipment component of an overall physical protection system.
Lesson 1
An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS.
True
Or
False
False
An ESS is comprised of one or more subsystems. Therefore, a stand-alone automated access control system would constitute an ESS.
Lesson 1
An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.
True
Or
False
True
An effective ESS should operate on the Detect, Delay, Respond principle, which ensures that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.
Lesson 1
Assets, threats, and vulnerabilities are all part of the risk calculation.
True
Or
False
True
Assets, threats, and vulnerabilities are all part of the risk calculation.
Countermeasures are determined and developed to reduce risk.
Lesson 1
Threats against an asset are determined when you conduct a site survey.
True
Or
False
False
Threats against an asset are determined through a threat assessment. Vulnerabilities can be determined during a site survey.
Lesson 1
You must consider operational and maintenance costs of an
ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.
True
Or
False
True
Operational and maintenance costs of an ESS must also be considered when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.
Lesson 2
What can an AACS do to protect assets in a facility? Select all that apply
A) Allow authorized personnel to enter a controlled area after verifying credentials
B) Assist in preventing unauthorized personnel from entering a controlled area
C) Communicate with CCTV for assessment purposes
D) Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts
E) All of the above
All of the above
Lesson 2
A high-security facility requires an AACS that makes it extremely difficult to duplicate the user’s form of verification for access. Which type of AACS is most appropriate for that facility?
A.) Coded
B.) Credential
C.) Biometric
C.) Biometric
Lesson 2
You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?
A.) Coded
B.) Credential
C.) Biometric
A.) Coded
Lesson 2
Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?
A.) Coded
B.) Credential
C.) Biometric
B.) Crednetial
Lesson 2
Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?
A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating
B) Anti Pass-back
Lesson 2
Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?
A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating
A) Two Person Rule
Lesson 2
Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person’s credential grants access?
A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating
D) Anti Tailgating
Lesson 2
Which AACS feature would you implement to facilitate egress from a controlled area?
A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating
C) REX Device
Lesson 3
Which of the following should you conduct to test the placement of IDS sensors?
A) Acceptance test
B) Nuisance alarm
C) PCU test
A) Acceptance test
You should conduct an acceptance test to test the placement of IDS sensors to ensure they are in the proper place and that there are no dead zones.
Lesson 3
Which of the following can be caused by an animal activating an IDS sensor?
A) Acceptance test
B) Nuisance alarm
C) PCU test
B) Nuisance alarm
When an animal activates an IDS, it can trigger a nuisance alarm. Similarly, certain weather events can trigger an environmental alarm on an IDS.
Lesson 3
Which of the following is part of an acceptance test?
A) Acceptance test
B) Nuisance alarm
C) PCU test
C) PCU test
In an acceptance test, you should test the functioning of the PCU and all switches, sensors, and alarms.
Lesson 3
Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?
A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor
B) Buried line sensor
The fiber optic cable sensor is a buried line sensor that is effective in detecting digging and tunneling.
Lesson 3
Which exterior IDS sensor is NOT vulnerable to bridging?
A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor
A) Open terrain sensor
Buried line and fence-associated sensors are both vulnerable to bridging. Open terrain sensorsare not.
Lesson 3
Which exterior IDS sensor is usually the least expensive?
A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor
C) Fence associated sensor
Fence-associated sensors are generally the least expensive types of exterior sensors.
Lesson 3
Which exterior IDS sensor is also known as a line-of-sight sensor?
A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor
A) Open terrain sensor
Open terrain sensors are also called line-of-sight sensors.
Lesson 3
Which type of sensor would be most effective in protecting a permanently secured window?
A) Balanced magnetic switch (BMS)/ High security switch (HSS)
B) Glass break sensor
C) Passive infrared sensor
D) Dual technology sensor
B) Glass break sensor
A glass break sensor would be the most effective sensor for a permanently secured window because the intruder would most likely have to physically break the window to enter.
Lesson 3
Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?
A) Balanced magnetic switch (BMS)/ High security switch (HSS)
B) Glass break sensor
C) Passive infrared sensor
D) Dual technology sensor
C) Passive infrared sensor
Passive infrared sensors detect heat signatures of intruders. They are the most common interior volumetric sensor.