100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

PHYSICAL SECURITY-- (SPED), Physical Security Certification (PSC), DCSA SPeD: Physical Security Certification (PSC) Exam Questions & Answers

Puntuación
1.0
(1)
Vendido
2
Páginas
32
Grado
A
Subido en
21-06-2023
Escrito en
2024/2025

PHYSICAL SECURITY-- (SPED), Physical Security Certification (PSC), DCSA SPeD: Physical Security Certification (PSC) Exam Questions & Answers-Before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening, what steps in the risk management process must you take first? Identify (3) - Identify assets Identify threats Identify vulnerabilities Which policy should you consult to find the physical security requirements of protecting classified information? - DoDM 5200.01, Volumes 1-4 DoD Information Security Program Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command? - DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB) Which of the following individuals should be included in a Threat Working Group? - Chemical, biological, radiological, nuclear and high yield explosive representative, Information operations representative, Operations security officer, Law enforcement, Counterintelligence, Antiterrorism Officer Which of these can be made of solid steel to make them more attack resistant? - Doors Which of these house ventilation systems that should be secured with steel bars? - Roofs Which of these should be covered with a protective film to make them less dangerous in an attack? - Windows Which of the following locks are approved to secure classified information or material? - Kaba Mas X-10, S&G 8077/AD At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS). - Physical Security Plans Assets fall into 5 categories, name all 5 of them. - 1. People 2. Information 3. Equipment 4. Facilities and 5. Activities and Operations Who provides construction and security requirements for SCIFs? - Director of National Intelligence (DNI) Who provides accreditation for SCIFs? - Defense Intelligence Agency (DIA) They are used by the intelligence community to store classified information. - SCIFs are used by the intelligence community to store classified information called Sensitive Compartmented Information (SCI). Warning signs must be posted at each boundary of a restricted area and must be conspicuous to those approaching on foot or by vehicle. T/F - True The use of master key systems is acceptable in the storage of AA&E. - False. The use of master key systems is not authorized in AA&E storage facilities. The first line of defense in any physical security system is usually some form of? - perimeter protection system What kind of fencing is used when a stationary perimeter requires protection? - Permanent What kind of fencing can be used as a temporary perimeter to establish psychological barriers and to channel pedestrian and vehicle movement. - Temporary The basic manual access control system is simply? - personal recognition. Although there are many different types of locks, they all share three components. - Locking device Switching device Operating mechanism Some key-operated locks are built into the door or container they are securing. These are also known as - Mortise locks, because their case is recessed, or mortised into a door or container. The __________________ is the most common of all door locks in use today. - cylindrical lock What kind of locks are used for securing classified information? - Electromechanical combination locks When a container is taken out of service, the combination must be reset back to the factory settings. The factory setting for a built-in container lock is? - 50-25-50. You just received a security container that has the S&G 2740 Electromechanical Safe Lock with a factory setting of 50-25-50. What should you do first? - Calibrate the lock Certification and accreditation (C&A) for Storage of Classified DoD Information Systems. A. DoD Manual 5100.76M governs the C&A for Storage of Classified DoD Information Systems. B. Designated Accrediting Authority (DAAs) have the authority and responsibility for accreditation decisions. - B A. Physical security is the branch of security that is only concerned with active measures designed to prevent unauthorized access. B. Physical security aims to safeguard assets against espionage, sabotage, terrorism, damage, and criminal activity. - B

Mostrar más Leer menos
Institución
Physical Security Certification , DCSA SPeD
Grado
Physical Security Certification , DCSA SPeD











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Physical Security Certification , DCSA SPeD
Grado
Physical Security Certification , DCSA SPeD

Información del documento

Subido en
21 de junio de 2023
Archivo actualizado en
21 de enero de 2025
Número de páginas
32
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

PHYSICAL SECURITY-- (SPED), Physical Security Certification (PSC), DCSA SPeD:
Physical Security Certification (PSC) Exam Questions & Answers

Before you can conduct a risk analysis based on the impact and likelihood of an
unwanted event happening, what steps in the risk management process must you
take first? Identify (3) - Identify assets
Identify threats
Identify vulnerabilities

Which policy should you consult to find the physical security requirements of
protecting classified information? - DoDM 5200.01, Volumes 1-4 DoD
Information Security Program

Which policy authorizes commanders to issue regulations for the protection or
security of property and places under their command? - DoDI 5200.08, Security of
DoD Installations and Resources and the DoD Physical
Security Review Board (PSRB)

Which of the following individuals should be included in a Threat Working
Group? - Chemical, biological, radiological, nuclear and high yield explosive
representative, Information operations representative, Operations security officer,
Law enforcement, Counterintelligence, Antiterrorism Officer

Which of these can be made of solid steel to make them more attack resistant? -
Doors

Which of these house ventilation systems that should be secured with steel bars? -
Roofs

Which of these should be covered with a protective film to make them less
dangerous in an attack? - Windows

Which of the following locks are approved to secure classified information or
material? - Kaba Mas X-10, S&G 8077/AD

,At a minimum _________ should include special and general guard orders, access
and material control, protective barriers, lighting systems, locks, and Intrusion
Detection Systems (IDS). - Physical Security Plans

Assets fall into 5 categories, name all 5 of them. - 1. People
2. Information
3. Equipment
4. Facilities and
5. Activities and Operations

Who provides construction and security requirements for SCIFs? - Director of
National Intelligence (DNI)

Who provides accreditation for SCIFs? - Defense Intelligence Agency (DIA)

They are used by the intelligence community to store classified information. -
SCIFs are used by the intelligence community to store classified information called
Sensitive Compartmented Information (SCI).

Warning signs must be posted at each boundary of a restricted area and must be
conspicuous to those approaching on foot or by vehicle. T/F - True

The use of master key systems is acceptable in the storage of AA&E. - False. The
use of master key systems is not authorized in AA&E storage facilities.

The first line of defense in any physical security system is usually some form of? -
perimeter protection system

What kind of fencing is used when a stationary perimeter requires protection? -
Permanent

What kind of fencing can be used as a temporary perimeter to establish
psychological barriers and to channel pedestrian and vehicle movement. -
Temporary

,The basic manual access control system is simply? - personal recognition.

Although there are many different types of locks, they all share three components.
- Locking device
Switching device
Operating mechanism

Some key-operated locks are built into the door or container they are securing.
These are also known as - Mortise locks, because their case is recessed, or
mortised into a door or container.

The __________________ is the most common of all door locks in use today. -
cylindrical lock

What kind of locks are used for securing classified information? -
Electromechanical combination locks

When a container is taken out of service, the combination must be reset back to the
factory settings. The factory setting for a built-in container lock is? - 50-25-50.

You just received a security container that has the S&G 2740 Electromechanical
Safe Lock with a factory setting of 50-25-50. What should you do first? - Calibrate
the lock

Certification and accreditation (C&A) for Storage of Classified DoD Information
Systems.
A. DoD Manual 5100.76M governs the C&A for Storage of Classified DoD
Information Systems.
B. Designated Accrediting Authority (DAAs) have the authority and responsibility
for accreditation decisions. - B

A. Physical security is the branch of security that is only concerned with active
measures designed to prevent unauthorized access.
B. Physical security aims to safeguard assets against espionage, sabotage,
terrorism, damage, and criminal activity. - B

, Which of the following is true of access control measures? - Access control is
integral and interoperable part of DoD installation physical security programs.
The installation commander/facility director is responsible for defining access
control measures consistent with DoD policy.

Which of the following is NOT a physical security measure? - Marking classified
documents.

Name 3 physical security measures? - Perimeter Fences
Security Guards
Alarm Systems

What does a physical security program aim to prevent unauthorized access to? (4) -
Personnel
Equipment
Installations
Information

What are considered access control measures? (3) - Identification Cards
Security Guards
Locks and Keys

List the nine capabilities a security system must provide to achieve Security-in-
Depth? - Deter
Detect
Identify
Track
Assess
Record
Communicate
Delay
Respond
$9.54
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Reseñas de compradores verificados

Se muestran los comentarios
2 año hace

1.0

1 reseñas

5
0
4
0
3
0
2
0
1
1
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ProfMiaKennedy Arizona State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1990
Miembro desde
4 año
Número de seguidores
1609
Documentos
3279
Última venta
2 días hace

We all get stuck sometimes, you feel frustrated about exams coming up and not fully prepared? Worry no more mate, with my documents i assure you atleast an A, get unstuck with the most recent, analyzed and graded exams with just a simple mouse click... Download and crash those exams!!

3.9

380 reseñas

5
195
4
57
3
56
2
25
1
47

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes