PHYSICAL SECURITY-- (SPED), Physical Security Certification (PSC), DCSA SPeD: Physical Security Certification (PSC) Exam Q&A QUESTIONS AND ANSWERS WELL VERIFIED BY DOCWISE
happening, what steps in the risk management process must you take first? Identify (3) Answer is : Identify assets Identify threats Identify vulnerabilities Which policy should you consult to find the physical security requirements of protecting classified information? Answer is : DoDM 5200.01, Volumes 1-4 DoD Information Security Program property and places under their command? Answer is : DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB) Which of the following individuals should be included in a Threat Working Group? Answer is : Chemical, biological, radiological, nuclear and high yield explosive representative, Information operations representative, Operations security officer, Law enforcement, Counterintelligence, Antiterrorism Officer Which of these can be made of solid steel to make them more attack resistant? Answer is : Doors Which of these house ventilation systems that should be secured with steel bars? Answer is : Roofs Which of these should be covered with a protective film to make them less dangerous in an attack? Answer is : Windows Which of the following locks are approved to secure classified information or material? Answer is : Kaba Mas X-10, S&G 8077/AD Page 2 of 32 At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS). Answer is : Physical Security Plans Assets fall into 5 categories, name all 5 of them. Answer is : 1. People 2. Information 3. Equipment 4. Facilities and 5. Activities and Operations Who provides construction and security requirements for SCIFs? Answer is : Director of National Intelligence (DNI) Who provides accreditation for SCIFs? Answer is : Defense Intelligence Agency (DIA) They are used by the intelligence community to store classified information. Answer is : SCIFs are used by the intelligence community to store classified information called Sensitive Compartmented Information (SCI). Warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle. T/F Answer is : True The use of master key systems is acceptable in the storage of AA&E. Answer is : False. The use of master key systems is not authorized in AA&E storage facilities. The first line of defense in any physical security system is usually some form of? Answer is : perimeter protection system What kind of fencing is used when a stationary perimeter requires protection? Answer is : Permanent What kind of fencing can be used as a temporary perimeter to establish psychological barriers and to channel pedestrian and vehicle movement. Page 3 of 32 Answer is : Temporary The basic manual access control system is simply? Answer is : personal recognition. Although there are many different types of locks, they all share three components. Answer is : Locking device Switching device Operating mechanism Some key-operated locks are built into the door or container they are securing. These are also known as Answer is : Mortise locks, because their case is recessed, or mortised into a door or container. The __________________ is the most common of all door locks in use today. Answer is : cylindrical lock What kind of locks are used for securing classified information? Answer is : Electromechanical combination locks When a container is taken out of service, the combination must be reset back to the factory settings. The factory setting for a built-in container lock is? Answer is : 50-25-50. You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first? Answer is : Calibrate the lock Certification and accreditation (C&A) for Storage of Classified DoD Information Systems. A. DoD Manual 5100.76M governs the C&A for Storage of Classified DoD Information Systems. B. Designated Accrediting Authority (DAAs) have the authority and responsibility for accreditation decisions. Answer is : B A. Physical security is the branch of security that is only concerned with active measures designed to prevent unauthorized access. Page 4 of 32 B. Physical security aims to safeguard assets against espionage, sabotage, terrorism, damage, and criminal activity. Answer is : B Which of the following is true of access control measures? Answer is : Access control is integral and interoperable part of DoD installation physical security programs. The installation commander/facility director is responsible for defining access control measures consistent with DoD policy. Which of the following is NOT a physical security measure? Answer is : Marking classified documents. Name 3 physical security measures? Answer is : Perimeter Fences Security Guards Alarm Systems What does a physical security program aim to prevent unauthorized access to? (4) Answer is : Personnel Equipment Installations Information What are considered access control measures? (3) Answer is : Identification Cards Security Guards Locks and Keys List the nine capabilities a security system must provide to achieve Security-in-Depth? Answer is : Deter Detect Identify Track Assess Record Communicate Delay Respond Page 5 of 32 Describe
Geschreven voor
- Instelling
- PHYSICAL SECURITY-- , Physical Security Cert
- Vak
- PHYSICAL SECURITY-- , Physical Security Cert
Documentinformatie
- Geüpload op
- 24 juli 2023
- Aantal pagina's
- 32
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
before you can conduct a risk analysis based on th
-
which policy authorizes commanders to issue regula
-
which of the following individuals should be inclu
-
which of these can be made of solid steel to ma