2026/2027 – 120 Practice Questions, SCIF,
AA&E, IDS, Locks & Access Control
Description:
Master the DoD Physical Security Program with 120 exam-style questions updated for
2026/2027. Covers SCIFs, AA&E storage, intrusion detection systems, locks, access
control, and Security-in-Depth. Ideal for DoD personnel, contractors, and security
professionals.
Download the complete 2026/2027 exam guide now to pass with confidence.
, DoD Physical Security Exam Prep 2026/2027
Course: DoD Physical Security Program Management
Exam Code: PHYS-SEC-001 (Comprehensive Edition)
Total Questions: 120
Time Allowed: 3.5 Hours
Section 1: Foundational Concepts and Risk Management (Questions 1–10)
1. Before conducting a risk analysis based on the impact and likelihood of an unwanted
event, what are the three prerequisite steps in the risk management process?
A. Identify threats, identify vulnerabilities, identify assets
B. Identify assets, identify threats, identify vulnerabilities
C. Identify vulnerabilities, identify assets, identify threats
D. Identify assets, identify vulnerabilities, identify threats
Answer: B
Explanation: The foundational sequence requires first identifying what needs to be protected
(assets), then determining what could cause harm (threats), and finally understanding existing
weaknesses (vulnerabilities) that could be exploited. Risk analysis is then performed on this
established framework.
2. Which policy should you consult to find the physical security requirements for protecting
classified information?
A. DoDI 5200.08, Security of DoD Installations and Resources
B. DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and
Explosives
C. DoDM 5200.01, Volumes 1–4, DoD Information Security Program
D. DoDM 5105.21, Sensitive Compartmented Information Administrative Security Manual
Answer: C
Explanation: DoDM 5200.01 (the DoD Information Security Program) provides overarching
policy for classifying, safeguarding, and declassifying national security information,
including physical security requirements for its protection.
,3. Which policy authorizes commanders to issue regulations for the protection or security of
property and places under their command?
A. DoDM 5200.01, DoD Information Security Program
B. DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical
Security Review Board (PSRB)
C. DoDI 2000.16, DoD Antiterrorism (AT) Standards
D. DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and
Explosives
Answer: B
Explanation: DoDI 5200.08 explicitly grants installation commanders and facility directors
the authority to issue necessary regulations for the protection of property and places under
their command, establishing the framework for local security policies.
4. Which of the following individuals should be included in a Threat Working Group (TWG)?
A. Logistics officer, public affairs officer, finance officer
B. Chemical, biological, radiological, nuclear and high-yield explosives representative,
information operations representative, operations security officer, law enforcement,
counterintelligence, antiterrorism officer
C. Only the installation commander and the physical security officer
D. Human resources director, safety officer, medical commander
Answer: B
Explanation: A Threat Working Group is a multi-disciplinary team that requires a broad
spectrum of expertise to accurately assess threats. The listed members—CBRNE, IO,
OPSEC, LE, CI, and AT—provide diverse perspectives on adversary capabilities, intentions,
and potential impacts.
5. Assets fall into five categories. Name all five.
A. People, Information, Equipment, Facilities, Activities and Operations
B. Personnel, Data, Hardware, Infrastructure, Missions
C. Staff, Intel, Machinery, Buildings, Procedures
D. Human Capital, Knowledge, Tools, Real Estate, Functions
Answer: A
Explanation: The five categories of assets as defined in DoD physical security doctrine are
, People, Information, Equipment, Facilities, and Activities and Operations. This classification
ensures a comprehensive approach to asset protection.
6. What is the central and overriding objective for nuclear security?
A. Prevention of theft of nuclear materials
B. Denial of unauthorized access, as outlined in National Security Presidential Directive-28
C. Protection of nuclear power plants from sabotage
D. Ensuring continuity of operations during a nuclear incident
Answer: B
Explanation: National Security Presidential Directive-28 establishes the denial of
unauthorized access as the central objective for nuclear security, emphasizing prevention as
the primary goal.
7. Which reference governs the Certification and Accreditation (C&A) for storage of DoD
collateral Classified Information Systems?
A. DoDM 5200.01, Volume 3, Protection of Classified Information
B. DoDI 5200.08, Security of DoD Installations and Resources
C. DoDM 5100.76, Physical Security of Sensitive Conventional Arms, Ammunition, and
Explosives
D. NISPOM, DoD 5220.22M
Answer: A
Explanation: DoD Manual 5200.01, Volume 3 (Protection of Classified Information)
outlines the specific requirements for the certification and accreditation of information
systems that store or process classified national security information.
8. Who is responsible for issuing instructions governing the security of weapons systems
within their inventory?
A. The Under Secretary of Defense for Intelligence
B. The Director of the Defense Security Service
C. Each DoD Component head
D. The Joint Chiefs of Staff
Answer: C
Explanation: The responsibility for developing and implementing specific security