Study Guide – Questions & Detailed Answers
⭐ Latest Updated Version 2026 | Exam-Focused | High
Success Rate
Boost your exam preparation with this simple, clear, and effective study guide. It includes
complete exam questions with correct detailed answers, designed to help you quickly
understand key concepts and improve your confidence.
Perfect for fast revision and focused study, this guide helps you practice exam-style questions
and reinforce important topics without wasting time.
✔ Complete questions with accurate answers
✔ Clear explanations for better understanding
✔ Easy-to-follow format for quick revision
✔ Covers commonly tested concepts
📚 Study smarter, feel confident, and get ready to succeed in 2026 exams.
What are the two primary purposes of a physical security program?
Prevention and Protection
What is the ATWG?
Antiterrorism Working Group
Responsible for assessing requirements for physical security;
recommending and developing policy;
preparing planning documents, and;
conducting criticality, vulnerability, and risk assessments.
What is the ATEC?
Antiterrorism Executive Committee
Develops and refines antiterrorism program guidance, policy, and standards.
Acts upon recommendations of the Antiterrorism Working Group and Threat Working
Group.
What is the ISO?
Information System Owner
Responsible for the security of information systems.
Develops contingency plans for the protection of the information systems.
What is the TWG and who is in it?
Threat Working Group.
This group is comprised of an:
1) Antiterrorism Officer
, 2) CI representative
3) Law enforcement representative
4) OPSEC officer
5) Information operations representative
6) Chemical, biological, radiological, nuclear, and high yield explosive representative.
Name 3 of the 6 key individuals associated with a physical security program.
1) Installation Commander/Facility Director
2) Antiterrorism Officer
3) CI Support Personnel
4) Law Enforcement Officials
5) Operations Security (OPSEC) Officer
6) Physical Security Officer
How is Site Design important in creating a physical security program?
Properly designed facilities provide a physical and psychological deterrence to
intruders. Poor facility design can also make a facility a possible target for intruders.
List 3 ways you would station Security Forces.
1) Access control points
2) Static observation posts
3) Roving patrols
4) Response forces
5) Security systems monitors
6) Dispatch and control centers
7) Escorts
What is the purpose of an IDS?
To deter, detect, document, and deny or delay intrusion.
List 2 Physical Security Systems.
IDS
ACS
Closed Circuit TV
Screening Equipment
2-Way Radios
How would you determine which type of access control system to install?
Based on risk management: defining the criticality, vulnerability, and the threat to DoD
assets.
In a Physical Security Program, what is a CAC an example of?
Access Control
What should you know about your keys?
At a minimum, lock and key control procedures should include a key register to list keys,
document their issuance, return, and/or disposition.
Another control measure would be to have a list of personnel who are authorized
access to keys and key records.
What are the levels FPCONs?
FPCON NORMAL applies when a general global threat of possible terrorist activity
exists and warrants a routine security posture.
FPCON ALPHA applies when there is an increased general threat of possible terrorist
activity against personnel or facilities; the nature and extent of which are unpredictable.