Physical Security Certification (PSC),
DCSA SPeD: Physical Security
Certification (PSC)
When planning and/or responding to an emergency, with whom should coordination
occur? - ✔️✔️Local, state, federal, and/or host country officials and organizations.
What are the three goals of the DoD Installation Emergency Management Program? -
✔️✔️Prepare DoD installations for emergencies
Respond appropriately to protect personnel and save lives
Recover and restore operations after an emergency
What is the role of the National Response Framework (NRF) for installation emergency
management? - ✔️✔️Establishes clear objectives for a concerted national effort to
prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and
other domestic emergencies. The NRF provides the structure and mechanism for a
consistent, nationwide approach for federal, state, and local governments to effectively
and efficiently work together to manage domestic incidents, regardless of cause, size,
or complexity.
Define preparedness in the context of emergency management? - ✔️✔️Preparedness
is the range of deliberate, critical tasks and activities necessary to build, sustain, and
improve the operational capability to prevent, protect against, respond to, and recover
from domestic incidents. Preparedness is a continuous process.
Preparedness involves efforts at all levels of government and coordination among
government, private sector, and non-governmental organizations to identify threats,
determine vulnerabilities, and identify required resources. Within the National Incident
Management System, preparedness is operationally focused on establishing guidelines,
protocols, and standards for planning, training and exercises, personnel qualification
and certification, equipment certification, and publication management.
Why are Physical Security Measures employed? - ✔️✔️To prevent or reduce the
potential for sabotage, theft, trespassing, terrorism, espionage, or other criminal activity.
How do Security Measures ensure security? - ✔️✔️Must provide the capability to deter,
detect, identify, track, assess, record, communicate, delay, and respond to unauthorized
access activities.
,Security requirements for classified contracts are stated in? - ✔️✔️DoD 5220.22M,
NISPOM
The protection of DoD assets is accomplished through? - ✔️✔️The application of active
and passive complimentary physical security measures.
Define Security in Depth? - ✔️✔️Integrating and using (layers) active and passive
complimentary physical security measures together.
Explain Security in Depth - ✔️✔️Facility planning
Use of barriers, fencing, signs, site lighting, and advanced technologies such as
intrusion detection systems, closed circuit television (CCTV) and biometric entry control
systems.
Which of these house ventilation systems that should be secured with steel bars? -
✔️✔️Roofs
Which of these should be covered with a protective film to make them less dangerous in
an attack? - ✔️✔️Windows
Which of the following locks are approved to secure classified information or material? -
✔️✔️Kaba Mas X-10, S&G 8077/AD
At a minimum _________ should include special and general guard orders, access and
material control, protective barriers, lighting systems, locks, and Intrusion Detection
Systems (IDS). - ✔️✔️Physical Security Plans
Assets fall into 5 categories, name all 5 of them. - ✔️✔️1. People
2. Information
3. Equipment
4. Facilities and
5. Activities and Operations
Who provides construction and security
requirements for SCIFs? - ✔️✔️Director of National Intelligence (DNI)
Who provides accreditation for SCIFs? - ✔️✔️Defense Intelligence Agency (DIA)
They are used by the intelligence community to store classified information. -
✔️✔️SCIFs are used by the intelligence community to store
classified information called Sensitive Compartmented Information (SCI).
, Before you can conduct a risk analysis based on the impact and likelihood of an
unwanted event happening, what steps in the risk management process must you take
first? Identify (3) - ✔️✔️Identify assets
Identify threats
Identify vulnerabilities
Which policy should you consult to find the physical security requirements of protecting
classified information? - ✔️✔️DoDM 5200.01, Volumes 1-4 DoD Information Security
Program
Which policy authorizes commanders to issue regulations for the protection or security
of property and places under their command? - ✔️✔️DoDI 5200.08, Security of DoD
Installations and Resources and the DoD Physical
Security Review Board (PSRB)
Which of the following individuals should be included in a Threat Working Group? -
✔️✔️Chemical, biological, radiological, nuclear and high yield explosive representative,
Information operations representative, Operations security officer, Law enforcement,
Counterintelligence, Antiterrorism Officer
Which of these can be made of solid steel to make them more attack resistant? -
✔️✔️Doors
Warning signs must be posted at each boundary of a restricted area and must be
conspicuous to those approaching on foot or by vehicle. T/F - ✔️✔️True
The use of master key systems is acceptable in the storage of AA&E. - ✔️✔️False. The
use of master key systems is not authorized in AA&E storage facilities.
The first line of defense in any physical security system is usually some form of? -
✔️✔️perimeter protection system
What kind of fencing is used when a stationary perimeter requires protection? -
✔️✔️Permanent
What kind of fencing can be used as a temporary perimeter to establish psychological
barriers and to channel pedestrian and vehicle movement. - ✔️✔️Temporary
The basic manual access control system is simply? - ✔️✔️personal recognition.
Although there are many different types of locks, they all share three components. -
✔️✔️Locking device
Switching device
Operating mechanism