Security Certification (PSC), DCSA Sped.
Physical Security Certification (PSC)
Questions and Answer 100%
Before you can conduct a risk analysis based on the impact and likelihood of an
unwanted event happening, what steps in the risk management process must you take
first? Identify (3) - answerIdentify assets
Identify threats
Identify vulnerabilities
Which policy should you consult to find the physical security requirements of protecting
classified information? - answerDoDM 5200.01, Volumes 1-4 DoD Information Security
Program
Which policy authorizes commanders to issue regulations for the protection or security
of property and places under their command? - answerDoDI 5200.08, Security of DoD
Installations and Resources and the DoD Physical
Security Review Board (PSRB)
Which of the following individuals should be included in a Threat Working Group? -
answerChemical, biological, radiological, nuclear and high yield explosive
representative, Information operations representative, Operations security officer, Law
enforcement, Counterintelligence, Antiterrorism Officer
Which of these can be made of solid steel to make them more attack resistant? -
answerDoors
Which of these house ventilation systems that should be secured with steel bars? -
answerRoofs
Which of these should be covered with a protective film to make them less dangerous in
an attack? - answerWindows
Which of the following locks are approved to secure classified information or material? -
answerKaba Mas X-10, S&G 8077/AD
At a minimum _________ should include special and general guard orders, access and
material control, protective barriers, lighting systems, locks, and Intrusion Detection
Systems (IDS). - answerPhysical Security Plans
,Assets fall into 5 categories, name all 5 of them. - answer1. People
2. Information
3. Equipment
4. Facilities and
5. Activities and Operations
Who provides construction and security
requirements for SCIFs? - answerDirector of National Intelligence (DNI)
Who provides accreditation for SCIFs? - answerDefense Intelligence Agency (DIA)
They are used by the intelligence community to store classified information. -
answerSCIFs are used by the intelligence community to store
classified information called Sensitive Compartmented Information (SCI).
Warning signs must be posted at each boundary of a restricted area and must be
conspicuous to those approaching on foot or by vehicle. T/F - answerTrue
The use of master key systems is acceptable in the storage of AA&E. - answerFalse.
The use of master key systems is not authorized in AA&E storage facilities.
The first line of defense in any physical security system is usually some form of? -
answerperimeter protection system
What kind of fencing is used when a stationary perimeter requires protection? -
answerPermanent
What kind of fencing can be used as a temporary perimeter to establish psychological
barriers and to channel pedestrian and vehicle movement. - answerTemporary
The basic manual access control system is simply? - answerpersonal recognition.
Although there are many different types of locks, they all share three components. -
answerLocking device
Switching device
Operating mechanism
Some key-operated locks are built into the door or container they are securing. These
are also known as - answerMortise locks, because their case is recessed, or mortised
into a door or container.
The __________________ is the most common of all door locks in use today. -
answercylindrical lock
, What kind of locks are used for securing classified information? -
answerElectromechanical combination locks
When a container is taken out of service, the combination must be reset back to the
factory settings. The factory setting for a built-in container lock is? - answer50-25-50.
You just received a security container that has the S&G 2740 Electromechanical Safe
Lock with a factory setting of 50-25-50. What should you do first? - answerCalibrate the
lock
Certification and accreditation (C&A) for Storage of Classified DoD Information
Systems.
A. DoD Manual 5100.76M governs the C&A for Storage of Classified DoD Information
Systems.
B. Designated Accrediting Authority (DAAs) have the authority and responsibility for
accreditation decisions. - answerB
A. Physical security is the branch of security that is only concerned with active
measures designed to prevent unauthorized access.
B. Physical security aims to safeguard assets against espionage, sabotage, terrorism,
damage, and criminal activity. - answerB
Which of the following is true of access control measures? - answerAccess control is
integral and interoperable part of DoD installation physical security programs.
The installation commander/facility director is responsible for defining access control
measures consistent with DoD policy.
Which of the following is NOT a physical security measure? - answerMarking classified
documents.
Name 3 physical security measures? - answerPerimeter Fences
Security Guards
Alarm Systems
What does a physical security program aim to prevent unauthorized access to? (4) -
answerPersonnel
Equipment
Installations
Information
What are considered access control measures? (3) - answerIdentification Cards
Security Guards
Locks and Keys
List the nine capabilities a security system must provide to achieve Security-in-Depth? -
answerDeter