Electronic Security Systems Flashcards

(45 cards)

1
Q

Lesson 1
You are tasked with planning an ESS for a DoD facility. What regulatory guidance document(s) should be your primary reference?
Select the best answer.

1) DODM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and Explosives

2) UFC, 4-021-02, Electronic Security Systems

3) ICS 705-1, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities

4) DoD Manual on ESS Planning

A

2.)UFC, 4-021-02, Electronic Security Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lesson 1
An ESS is a component of an overall physical protection system.

True
Or
False

A

True

An ESS is a component of the physical security equipment component of an overall physical protection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lesson 1
An ESS must be comprised of at least two or more subsystems. Therefore, a stand-alone automated access control system, for example, would not constitute an ESS.

True
Or
False

A

False

An ESS is comprised of one or more subsystems. Therefore, a stand-alone automated access control system would constitute an ESS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lesson 1
An effective ESS must ensure that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.

True
Or
False

A

True

An effective ESS should operate on the Detect, Delay, Respond principle, which ensures that the time between detection of an intrusion and response by security forces is less than the time it takes for damage or compromise of assets to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lesson 1
Assets, threats, and vulnerabilities are all part of the risk calculation.

True
Or
False

A

True

Assets, threats, and vulnerabilities are all part of the risk calculation.
Countermeasures are determined and developed to reduce risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lesson 1
Threats against an asset are determined when you conduct a site survey.

True
Or
False

A

False

Threats against an asset are determined through a threat assessment. Vulnerabilities can be determined during a site survey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lesson 1
You must consider operational and maintenance costs of an
ESS when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.

True
Or
False

A

True

Operational and maintenance costs of an ESS must also be considered when comparing the value of an asset to be protected versus the cost of the ESS to protect an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lesson 2

What can an AACS do to protect assets in a facility? Select all that apply

A) Allow authorized personnel to enter a controlled area after verifying credentials

B) Assist in preventing unauthorized personnel from entering a controlled area

C) Communicate with CCTV for assessment purposes

D) Communicate with an IDS to sound an alarm to alert security personnel of unauthorized entry attempts

E) All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lesson 2
A high-security facility requires an AACS that makes it extremely difficult to duplicate the user’s form of verification for access. Which type of AACS is most appropriate for that facility?

A.) Coded
B.) Credential
C.) Biometric

A

C.) Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lesson 2
You have been directed to purchase the least expensive type of AACS for a given facility. Which type of AACS should you choose?

A.) Coded
B.) Credential
C.) Biometric

A

A.) Coded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Lesson 2
Which type of AACS would allow you to use your CAC as the verification method for authorized entry into a controlled area?

A.) Coded
B.) Credential
C.) Biometric

A

B.) Crednetial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lesson 2
Which AACS feature would you implement to mitigate the risk of someone giving his or her credentials to another person to access a controlled area?

A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating

A

B) Anti Pass-back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lesson 2
Which AACS feature would you implement to prevent individual cardholders from entering a selected empty controlled area unaccompanied?

A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating

A

A) Two Person Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lesson 2
Which AACS feature would you implement to prevent a person from following another person closely in order to gain ingress through the same portal when the authorized person’s credential grants access?

A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating

A

D) Anti Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lesson 2
Which AACS feature would you implement to facilitate egress from a controlled area?

A) Two Person Rule
B) Anti Pass-back
C) REX Device
D) Anti Tailgating

A

C) REX Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lesson 3
Which of the following should you conduct to test the placement of IDS sensors?

A) Acceptance test
B) Nuisance alarm
C) PCU test

A

A) Acceptance test

You should conduct an acceptance test to test the placement of IDS sensors to ensure they are in the proper place and that there are no dead zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Lesson 3
Which of the following can be caused by an animal activating an IDS sensor?

A) Acceptance test
B) Nuisance alarm
C) PCU test

A

B) Nuisance alarm

When an animal activates an IDS, it can trigger a nuisance alarm. Similarly, certain weather events can trigger an environmental alarm on an IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lesson 3
Which of the following is part of an acceptance test?

A) Acceptance test
B) Nuisance alarm
C) PCU test

A

C) PCU test

In an acceptance test, you should test the functioning of the PCU and all switches, sensors, and alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Lesson 3
Which type of exterior IDS sensor is good for detecting intrusion by digging and tunneling?

A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor

A

B) Buried line sensor

The fiber optic cable sensor is a buried line sensor that is effective in detecting digging and tunneling.

20
Q

Lesson 3
Which exterior IDS sensor is NOT vulnerable to bridging?

A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor

A

A) Open terrain sensor

Buried line and fence-associated sensors are both vulnerable to bridging. Open terrain sensorsare not.

21
Q

Lesson 3
Which exterior IDS sensor is usually the least expensive?

A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor

A

C) Fence associated sensor

Fence-associated sensors are generally the least expensive types of exterior sensors.

22
Q

Lesson 3
Which exterior IDS sensor is also known as a line-of-sight sensor?

A) Open terrain sensor
B) Buried line sensor
C) Fence associated sensor

A

A) Open terrain sensor

Open terrain sensors are also called line-of-sight sensors.

23
Q

Lesson 3
Which type of sensor would be most effective in protecting a permanently secured window?

A) Balanced magnetic switch (BMS)/ High security switch (HSS)
B) Glass break sensor
C) Passive infrared sensor
D) Dual technology sensor

A

B) Glass break sensor

A glass break sensor would be the most effective sensor for a permanently secured window because the intruder would most likely have to physically break the window to enter.

24
Q

Lesson 3
Which sensor detects heat signatures of intruders and is the most common interior volumetric sensor?

A) Balanced magnetic switch (BMS)/ High security switch (HSS)
B) Glass break sensor
C) Passive infrared sensor
D) Dual technology sensor

A

C) Passive infrared sensor

Passive infrared sensors detect heat signatures of intruders. They are the most common interior volumetric sensor.

25
Lesson 3 Which sensor is used on doors, roof hatches, and windows? A) Balanced magnetic switch (BMS)/ High security switch (HSS) B) Glass break sensor C) Passive infrared sensor D) Dual technology sensor
A) Balanced magnetic switch (BMS)/ High security switch (HSS) Balanced magnetic switches (BMS) or high security switches (HSS) are used on doors, roof hatches, and windows.
26
Lesson 4 For each statement, select which CCTV system capability it demonstrates. Monitoring a military exchange A) Access Control B) Alarm Assessment C) Surveillance
C) Surveillance CCTV systems enable security personnel to conduct surveillance of multiple locations from a centralized remote viewing area.
27
Lesson 4 For each statement, select which CCTV system capability it demonstrates. Viewing a CCTV monitor to determine security force response to an alarm A) Access Control B) Alarm Assessment C) Surveillance
B) Alarm Assessment Connecting a CCTV system to an IDS alarm allows security personnel to visually assess a situation to determine what type of response may be required.
28
Lesson 4 For each statement, select which CCTV system capability it demonstrates. Viewing individuals on a CCTV camera to grant or deny access to a facility A) Access Control B) Alarm Assessment C) Surveillance
A) Access Control Connecting a CCTV system to an AACS allows security personnel to visually identify persons and vehicles requesting entry before they release a controlled portal, such as a door, turnstile, gate, or vehicle barrier.
29
Lesson 5 A wireless network is more secure than a hardwired network. True or False
False Hardwired networks are more secure and the least likely to be intercepted. Wireless networks, although best suited for communication over barriers, are more vulnerable to interception than hardwired networks.
30
Lesson 5 Software-based integration is the preferred DTM method for most projects. True or False
True Software-based integration is the preferred DTM method for most projects.
31
Lesson 5 A DTM allows an automated access control system to communicate with a control center. True or False
True A DTM allows any ESS subsystem to communicate with each other and a control center.
32
Lesson 5 Wireline DTM, which is good for most ESS data transmission needs, has a high bandwidth. True or False
True Wireline is good for most ESS data transmission needs, but it has a limited bandwidth. Both fiber optic cable and coaxial cable have a high bandwidth.
33
Lesson 5 Which of the following are considerations when planning for a DTM link? Select all that apply. A) What is the bandwidth of each ESS subsystem being connected? B) What level of security will be required? C) Is there an uninterruptible power supply? D) Can you use existing networks, or will you need to create a new pathway? E) All of the above
E) All of the above
34
Lesson 6 Police connection and central station monitoring generally require an increase in staffing at the facility being monitored. True or False
False Police connection and central station monitoring do not generally require an increase in staffing at the facility being monitored. However, local alarm and proprietary monitoring do generally require an increase in staffing.
35
Lesson 6 Proprietary station monitoring is the method used most by DoD installations. True or False
True Proprietary station monitoring is the method used most by DoD installations.
36
Lesson 6 Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines. True or False
True Police connection and central station monitoring are generally connected to the facility being monitored through leased telephone lines.
37
Lesson 6 Local alarm monitoring works best without another type of monitoring used in conjunction with it. True or False
False Local alarm monitoring works best when used in conjunction with another type of monitoring.
38
Lesson 6 A facility owns and operates the dispatch center and security forces. A) Proprietary Station B) Local Alarm C) Central Station D) Police Connection
A) Proprietary Station In proprietary station monitoring, a facility owns and operates the dispatch center and security forces.
39
Lesson 6 The local police agency monitors a facility’s alarms. A) Proprietary Station B) Local Alarm C) Central Station D) Police Connection
D) Police Connection In police connection monitoring, the local police agency monitors a facility’s alarms, and police personnel respond to alarms.
40
Lesson 6 Owned by a commercial firm and not usually located on the facility being monitored. A) Proprietary Station B) Local Alarm C) Central Station D) Police Connection
C) Central Station In central station monitoring, a commercial firm owns and operates the central station, which is not usually located on the facility being monitored.
41
Lesson 6 Requires roving security forces. A) Proprietary Station B) Local Alarm C) Central Station D) Police Connection
B) Local Alarm Local alarm monitoring requires roving security forces to hear or see and respond to audible or visual alarms.
42
Lesson 7 Which of the following require(s) a mechanical/automated access control system or visual recognition as the access control method? Select all that apply. A) SCIF B) Top Secret/Secret collateral open storage area C) Arms room D) Magazine E) All of the Above
B) Top Secret/Secret collateral open storage area Top Secret/Secret collateral open storage areas require visual recognition or a mechanical or automated ACS device, while SCIFs, arms rooms and magazines do not have this requirement. Instead, SCIFs require a card reader with a keypad and arms rooms and magazines require the use of a high-security padlock with a hasp to control access.
43
Lesson 7 Which of the following may contain a CCTV within the protected area? Select all that apply. A) SCIF B) Top Secret/Secret collateral open storage area C) Arms room D) Magazine E) All of the Above
C) Arms room D) Magazine CCTV cameras are not allowed inside any areas that contain classified information. CCTV cameras are permitted inside arms rooms and magazine and must be integrated with the IDS for those areas.
44
Lesson 7 Which of the following must have vibration sensors on its walls to detect boundary penetration attempts? Select all that apply. A) SCIF B) Top Secret/Secret collateral open storage area C) Arms room D) Magazine E) All of the Above
D) Magazine A magazine, if it is classified as a Security Risk Category (SRC) I or II AA&E facility, must have vibration sensors on its walls to detect boundary penetration attempts. These other special areas do not have this as a baseline ESS requirement.
45
Lesson 7 Which of the following require(s) any system-associated cabling that extends beyond protected area perimeter to be installed in rigid conduit? A) SCIF B) Top Secret/Secret collateral open storage area C) Arms room D) Magazine E) All of the Above
All of the Above All of these areas have this and other DTM requirements for any system associated cabling that extends beyond the protected area perimeter.