with Approved Answers | Latest i,- i,- i,- i,- i,-
2025/2026 Update| 100% Correct. i,- i,- i,-
What is the purpose of an IDS?
i,- i,- i,- i,- i,- i,- i,- i,-To deter, detect, document,
i,- i,- i,- i,-
and deny or delay intrusion.
i,- i,- i,- i,-
List 2 Physical Security Systems.
i,- i,- i,- i,- i,- i,-IDS
ACS
Closed Circuit TV i,- i,-
Screening Equipment i,-
2-Way Radios i,-
How would you determine which type of access control system to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
install? Based on risk management: defining the criticality,
i,- i,- i,- i,- i,- i,- i,- i,- i,-
vulnerability, and the threat to DoD assets. i,- i,- i,- i,- i,- i,-
In a Physical Security Program, what is a CAC an example of?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
Access Control i,-
, What should you know about your keys?
i,- At a minimum, lock i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
and key control procedures should include a key register to list
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
keys, document their issuance, return, and/or disposition.
i,- i,- i,- i,- i,- i,-
Another control measure would be to have a list of personnel
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
who are authorized access to keys and key records.
i,- i,- i,- i,- i,- i,- i,- i,-
What are the levels FPCONs?
i,- FPCON NORMAL applies when a
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
general global threat of possible terrorist activity exists and
i,- i,- i,- i,- i,- i,- i,- i,- i,-
warrants a routine security posture. i,- i,- i,- i,-
FPCON ALPHA applies when there is an increased general threat
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
of possible terrorist activity against personnel or facilities; the
i,- i,- i,- i,- i,- i,- i,- i,- i,-
nature and extent of which are unpredictable.
i,- i,- i,- i,- i,- i,-
FPCON BRAVO indicates an increased or more predictable threat
i,- i,- i,- i,- i,- i,- i,- i,- i,-
of terrorist activity exists.
i,- i,- i,-
FPCON CHARLIE applies when an incident occurs or intelligence
i,- i,- i,- i,- i,- i,- i,- i,- i,-
is received indicating some form of terrorist action or terrorist
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
targeting against U.S. personnel or DoD assets is likely.
i,- i,- i,- i,- i,- i,- i,- i,-
FPCON DELTA applies in the immediate area where a terrorist
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
attack has occurred or when intelligence has been received that
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
terrorist action against a specific location or person is imminent.
i,- i,- i,- i,- i,- i,- i,- i,- i,-
What is the purpose of a security inspection?
i,- i,- Verify policy
i,- i,- i,- i,- i,- i,- i,- i,- i,-
compliance, promote cost effective security, serve as an i,- i,- i,- i,- i,- i,- i,- i,-
opportunity for security education, establish and/or enhance i,- i,- i,- i,- i,- i,- i,-
good working relationships, identify existing or potential program
i,- i,- i,- i,- i,- i,- i,- i,-