PHYSICAL SECURITY-- (SPED), PHYSICAL
SECURITY CERTIFICATION (PSC), DCSA SPED:
PHYSICAL SECURITY CERTIFICATION (PSC)
Before you can conduct a risk analysis based on the impact and likelihood of an
unwanted event happening, what steps in the risk management process must you
take first? Identify (3) -correct-answer-Identify assets
Identify threats
Identify vulnerabilities
Which policy should you consult to find the physical security requirements of
protecting classified information? -correct-answer-DoDM 5200.01, Volumes 1-4
DoD Information Security Program
Which policy authorizes commanders to issue regulations for the protection or
security of property and places under their command? -correct-answer-DoDI
5200.08, Security of DoD Installations and Resources and the DoD Physical
Security Review Board (PSRB)
Which of the following individuals should be included in a Threat Working Group?
-correct-answer-Chemical, biological, radiological, nuclear and high yield explosive
,2|Page
representative, Information operations representative, Operations security officer,
Law enforcement, Counterintelligence, Antiterrorism Officer
Which of these can be made of solid steel to make them more attack resistant? -
correct-answer-Doors
Which of these house ventilation systems that should be secured with steel bars?
-correct-answer-Roofs
Which of these should be covered with a protective film to make them less
dangerous in an attack? -correct-answer-Windows
Which of the following locks are approved to secure classified information or
material? -correct-answer-Kaba Mas X-10, S&G 8077/AD
At a minimum _________ should include special and general guard orders, access
and material control, protective barriers, lighting systems, locks, and Intrusion
Detection Systems (IDS). -correct-answer-Physical Security Plans
,3|Page
Assets fall into 5 categories, name all 5 of them. -correct-answer-1. People
2. Information
3. Equipment
4. Facilities and
5. Activities and Operations
Who provides construction and security
requirements for SCIFs? -correct-answer-Director of National Intelligence (DNI)
Who provides accreditation for SCIFs? -correct-answer-Defense Intelligence
Agency (DIA)
They are used by the intelligence community to store classified information. -
correct-answer-SCIFs are used by the intelligence community to store
classified information called Sensitive Compartmented Information (SCI).
Warning signs must be posted at each boundary of a restricted area and must be
conspicuous to those approaching on foot or by vehicle. T/F -correct-answer-True
, 4|Page
The use of master key systems is acceptable in the storage of AA&E. -correct-
answer-False. The use of master key systems is not authorized in AA&E storage
facilities.
The first line of defense in any physical security system is usually some form of? -
correct-answer-perimeter protection system
What kind of fencing is used when a stationary perimeter requires protection? -
correct-answer-Permanent
What kind of fencing can be used as a temporary perimeter to establish
psychological barriers and to channel pedestrian and vehicle movement. -correct-
answer-Temporary
The basic manual access control system is simply? -correct-answer-personal
recognition.
Although there are many different types of locks, they all share three
components. -correct-answer-Locking device
Switching device
Operating mechanism