Physical Security Planning and Implementation Flashcards

(79 cards)

1
Q

Lesson 1
Which of the following statements are true of physical security planning and implementation?

The risk management process must be used to plan which physical security measures should be utilized to protect DoD assets.

a. True
b. False

A

a. True

True. Assets, threats, vulnerabilities, and risks must be identified before determining which physical security countermeasures to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lesson 1
Which of the following statements are true of physical security planning and implementation?

Protection of DoD assets must be performed at any cost; therefore, a cost vs. benefit analysis is not necessary.

a. True
b. False

A

b. False

False. Cost vs. benefit must always be considered when planning the protection of DoD assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lesson 1
Which of the following statements are true of physical security planning and implementation?

Use of oversight tools is an important part of physical security implementation.

a. True
b. False

A

a. True

True. Oversight tools—such as observations, surveys, and inspections—are important in ensuring that physical security is being implemented appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lesson 1
Which of the following statements are true of physical security planning and implementation?

Facility design must be considered in physical security planning.

a. True
b. False

A

a. True

True. Physical security countermeasures must always be planned for when designing a facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lesson 1
Which of the following would best be described as a DoD asset?

a. Terrorist
b. Fence
c. Open, unattended installation gate
d. Arms and ammunition
e. Loss of life

A

d. Arms and ammunition

Arms and ammunition would be considered equipment assets in PIE-FAO, which stands for the following DoD assets: People, Information, Equipment, Facilities, Activities, and Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lesson 1
Which of the following would best be described as a threat?

a. Terrorist
b. Fence
c. Open, unattended installation gate
d. Arms and ammunition
e. Loss of life

A

a. Terrorist

A terrorist is a threat to DoD assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lesson 1
Which of the following would best be described as a vulnerability?

a. Terrorist
b. Fence
c. Open, unattended installation gate
d. Arms and ammunition
e. Loss of life

A

c. Open, unattended installation gate

A gate to an installation that was inadvertently left open and unattended would be a vulnerability as that would make it easier for unauthorized access to the installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lesson 1
Which of the following would best be described as a risk?

a. Terrorist
b. Fence
c. Open, unattended installation gate
d. Arms and ammunition
e. Loss of life

A

e. Loss of life

Loss of life is a very important risk you must consider when planning for the physical security of an installation or facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lesson 1
Which of the following would best be described as a countermeasure?

a. Terrorist
b. Fence
c. Open, unattended installation gate
d. Arms and ammunition
e. Loss of life

A

b. Fence

A fence is one of many physical security countermeasures used to protect DoD assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lesson 1
The [blank] is responsible for the installation’s antiterrorism program.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

B. Antiterrorism Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Lesson 1
[blank] is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

D. CI Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lesson 1
The [blank] analyzes threats to assets and their vulnerabilities.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

C. OPSEC Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lesson 1
[blank] must be included in the intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a federal installation.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

A. Law Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lesson 1
The [blank] is charged with the management, implementation, and direction of all physical security programs.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

E. Physical Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lesson 1
The [blank] is responsible for the safety of people and property under their command.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

G. Installation Commander/ Facility Director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lesson 1
The [blank] is responsible for mitigating risks against Defense Critical Infrastructure assets that support the mission of an installation or facility.

A. Law Enforcement
B. Antiterrorism Officer
C. OPSEC Officer
D. CI Support
E. Physical Security Officer
F. DCIP Officer
G. Installation Commander/ Facility Director

A

F. DCIP Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Lesson 3
Flashlights are a reliable form of continuous lighting.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Lesson 3
Emergency lighting depends upon the power supply of the utility company.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Lesson 3
Standby lighting is the type of lighting used when the primary power source fails.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Lesson 3
Certain types of lighting can incapacitate an intruder.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Lesson 3
Controlled lighting is used to illuminate the perimeter of a facility.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Lesson 3
[blank] is often used as a temporary barrier when rolled out on the ground.

A. Barbed wire
B. Concertina wire
C. Chain-link fencing
D. Metal ornamental high security fencing

A

B. Concertina wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Lesson 3
[blank] can be used as permanent standalone fencing but is more often used as an outrigger on the top of the chain link fencing.

A. Barbed wire
B. Concertina wire
C. Chain-link fencing
D. Metal ornamental high security fencing

A

A. Barbed wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Lesson 3
[blank] is more difficult for intruders to scale.

A. Barbed wire
B. Concertina wire
C. Chain-link fencing
D. Metal ornamental high security fencing

A

D. Metal ornamental high security fencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Lesson 3 [blank] is a common type of perimeter fencing for DoD facilities. A. Barbed wire B. Concertina wire C. Chain-link fencing D. Metal ornamental high security fencing
C. Chain-link fencing
26
Lesson 3 Securing man-passable openings is one of the most overlooked physical security protective measures. a. True b. False
a. True
27
Lesson 3 Intrusion Detection Systems (IDS) prevent unauthorized entry. a. True b. False
b. False
28
Lesson 3 Cost and risk must always be considered when planning which physical security measures to use in a facility or installation. a. True b. False
a. True
29
Lesson 3 Access control systems help to prevent unauthorized entry. a. True b. False
a. True
30
Lesson 3 CCTV can deter loss, theft, or misuse of government property and resources. a. True b. False
a. True
31
Lesson 4 Operational/administrative procedures for normal and emergency situations. A. COOP B. MOU/MOA C. Post Orders D. SOP E. PSP
D. SOP
32
Lesson 4 Comprehensive protective measures for an installation, facility, or activity. A. COOP B. MOU/MOA C. Post Orders D. SOP E. PSP
E. PSP
33
Lesson 4 Roles and responsibilities for individual work areas such as checkpoints and guard gates. A. COOP B. MOU/MOA C. Post Orders D. SOP E. PSP
C. Post Orders
34
Lesson 4 Provisions for back-up facilities, utilities, communication and computer systems, and transportation in the event of a major emergency. A. COOP B. MOU/MOA C. Post Orders D. SOP E. PSP
A. COOP
35
Lesson 4 Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity. A. COOP B. MOU/MOA C. Post Orders D. SOP E. PSP
B. MOU/MOA
36
Lesson 5 Combatant Commanders issue both DoD Terrorist Threat Levels and FPCONs. a. True b. False
a. True
37
Lesson 5 Both the DIA and COCOMs issue FPCONs. a. True b. False
b. False
38
Lesson 5 Installation commanders and facility directors issue DoD Terrorist Threat Levels. a. True b. False
b. False
39
Lesson 5 Terrorist Threat Levels are based on information about terrorist groups such as their operational capability and their intentions. a. True b. False
a. True
40
Lesson 5 FPCONs are based on various factors, such as terrorist threat analyses and DoD Terrorist Threat Levels. a. True b. False
a. True
41
Lesson 6 System that standardizes the identification and recommended preventive actions and responses to terrorist threats against U.S. assets. A. Terrorist Threat Levels B. Force Protection C. DoD AT Program D. Force Protection Conditions
D. Force Protection Conditions
42
Lesson 6 The prevention and detection of terrorist attacks against DoD assets as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents. A. Terrorist Threat Levels B. Force Protection C. DoD AT Program D. Force Protection Conditions
C. DoD AT Program
43
Lesson 6 Intelligence threat assessments of the level of terrorist threat faced by U.S. personnel and interests. A. Terrorist Threat Levels B. Force Protection C. DoD AT Program D. Force Protection Conditions
A. Terrorist Threat Levels
44
Lesson 6 Actions taken to prevent or mitigate hostile actions against DoD assets such as DoD personnel, family members, resources, facilities, and critical information. A. Terrorist Threat Levels B. Force Protection C. DoD AT Program D. Force Protection Conditions
B. Force Protection
45
Lesson 6 Internal reviews conducted by members of the organization to aid internal control and ensure cost-effective security program. A. Surveys B. Staff assist visits C. Compliance inspections D. Day-to-day observations E. Management/self-inspections
E. Management/self-inspections
46
Lesson 6 Formal reviews conducted by senior officials in the chain-of-command. A. Surveys B. Staff assist visits C. Compliance inspections D. Day-to-day observations E. Management/self-inspections
C. Compliance inspections
47
Lesson 6 Validate baseline security posture when personnel assume security responsibilities or as a prelude to a formal inspection. A. Surveys B. Staff assist visits C. Compliance inspections D. Day-to-day observations E. Management/self-inspections
B. Staff assist visits
48
Lesson 6 Can be self-initiated or directed by higher authorities to determine the physical security posture of an installation or facility A. Surveys B. Staff assist visits C. Compliance inspections D. Day-to-day observations E. Management/self-inspections
A. Surveys
49
Lesson 6 Most common and informal oversight tool; immediate action taken to correct deficiencies. A. Surveys B. Staff assist visits C. Compliance inspections D. Day-to-day observations E. Management/self-inspections
D. Day-to-day observations
50
Antiterrorism measures used by the DoD to communicate levels of threat in specific areas and what security measures are to be used in response to those threats are called _____________________________________________. a. Terrorist Threat Levels and FPCONs b. FPCONs and THREATCONs c. THREATCONs and Terrorist Threat Levels
a. Terrorist Threat Levels and FPCONs
51
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same. a. True b. False
b. False
52
Examples of oversight tools include day-to-day observations, surveys; staff assist visits, _____________________, and analysis of reports. a. policy manuals b. Executive Orders c. Inspections
c. Inspections
53
Every effort should be made to locate lights so they avoid creating a glare problem for both guards and anyone approaching the boundary. a. True b. False
b. False
54
In ______________________________, you must consider the cost versus the benefit of protecting DoD assets. a. making risk management decisions b. identifying vulnerabilities c. assessing risks
a. making risk management decisions
55
In order to calculate risks and determine countermeasure options for an installation or facility, you must assess ____________________________________. a. the Physical Security Plan b. assets, threats, and vulnerabilities c. DoD Directives
b. assets, threats, and vulnerabilities
56
__________________________ are based on information about terrorist groups such as their operational capability, intentions, activity, and the operational environment. a. Continuity of Operations Plans (COOPs) b. Force Protection Conditions (FPCONs) c. DoD Terrorist Threat Levels d. Counterterrorism measures
c. DoD Terrorist Threat Levels
57
Which type of barrier requires action by personnel or equipment to permit entry to personnel or vehicles? a. Passive barriers b. Active barriers c. Natural barriers
b. Active barriers
58
Two antiterrorism tools the DoD uses to safeguard DoD assets are ______________________ and ____________________________. a. Threat Working Group and Post Orders b. Force Protection Conditions (FPCONs) and Terrorist Threat Levels c. Countermeasures and Standard Operating Procedures
b. Force Protection Conditions (FPCONs) and Terrorist Threat Levels
59
__________________________ can result from day-to-day observations or more formal oversight. a. Inspection reports b. Incident reports c. Surveys
b. Incident reports
60
Antiterrorism physical security measures incorporate detection, deterrence, denial, and ____________ a. Notification b. Documentation c. Evaluation d. Determination
a. Notification
61
_________________________ detail(s) the security measures for a facility or installation. a. Post Orders b. Standard Operating Procedures (SOP) c. A Physical Security Plan (PSP)
c. A Physical Security Plan (PSP)
62
___________ ensure that FPCONs are uniformly implemented. a. Installation commanders b. Operations Security Officers c. Facility directors d. Geographic Combatant Commanders
c. Facility directors
63
Loss of badges can be a consideration for both manual and automated access control systems. a. True b. False
a. True
64
Physical security implementation includes incorporating physical security measures in the construction and renovation of facilities, as well as using physical security planning documents to implement physical security measures on a day-to-day basis and in emergency situations. a. True b. False
a. True
65
In preparing the inspection report, the inspector should ______________________________________________________. a. only include security violations because the inspection report should be short and to the point b. include his/her opinion on how things should be c. include positive observations to support quality performance
c. include positive observations to support quality performance
66
____________________________________ develop and maintain physical security plans. a. Physical Security Officers b. Defense Critical Infrastructure Protection (DCIP) Program Officers c. Operations Security (OPSEC) Officers
a. Physical Security Officers
67
It's better for an inspector not to announce the inspection in order to create a surprise effect and see how everything really operates. a. True b. False
b. False
68
Low threat levels designate that a terrorist group is in the vicinity and is _________. a. Threatening b. Non-threatening c. Targeted d. Active
b. Non-threatening
69
Physical Security Plans should never contain information that is For Official Use Only (FOUO) or Classified. a. True b. False
b. False
69
During an inspection, the inspector should use a checklist, talk with people, examine and test products, advise personnel about policy and changes to policy, and __________________________________. a. send violators to the senior manager's office for reprimand b. take good notes c. issue security violation citations on the spot
b. take good notes
70
The most common type of fencing material used as a standalone fence in the DoD is __________________. a. Metal ornamental high security b. Barbed wire c. Chain link
c. Chain link
71
__________________________ are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA. a. Force Protection Conditions b. Counterterrorism measures c. DoD Terrorist Threat Levels
a. Force Protection Conditions
72
The Physical Security Plan should cover the assets of any tenant organizations in the installation or facility a. True b. False
a. True
73
Under FPCON NORMAL, which warrants a routine security posture, access control will be conducted at all DoD installations and facilities. a. True b. False
a. True
74
Threat levels assist senior leaders to determine the appropriate ________ level. a. FPCON b. Classification designation c. GSA security specification d. SOP
a. FPCON
75
____________________________________ provide information on the capabilities, intentions, and threats of adversaries. a. Counterintelligence (CI) support personnel b. Physical Security Officers c. Antiterrorism Officers (ATO)
a. Counterintelligence (CI) support personnel
76
Authorities directing implementation may augment their FPCON by adding security measures from higher FPCON standards as they deem necessary. a. True b. False
a. True
77
There are __________ DoD-approved FPCON levels. a. Three b. Six c. Five d. Four
c. Five
78
___________________ establish operational and administrative physical security procedures for both normal and emergency situations. a. Standard Operating Procedures (SOP) b. Continuity of Operations Plans (COOP) c. Memorandums of Agreement (MOA)
a. Standard Operating Procedures (SOP)