SOLUTIONS RATED A+
✔✔SAP Lifecycle - ✔✔1. Establishment (is extra protection warranted?)
2. Management and Administration (continued need? processed followed?)
3. Apportionment (proper measures in place? approval received)
4. Disestablishment (program no longer needed?)
✔✔Component-level SAP Central Offices - ✔✔Exist for each military component, the
Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and
Missile Defense Agency (MDA)
✔✔Special Access Program Oversight Committee (SAPOC) - ✔✔The final SAP
approving body chaired by the Deputy Secretary of Defense
✔✔Senior Review Group (SRG) - ✔✔This group ensures there are no duplicative efforts
across SAPs
✔✔DoD Special Access Central Office (SAPCO) - ✔✔DoD SAP legislative liaison that
notifies Congress of SAP approval
✔✔Authorization, Appropriations, and Intelligence Congressional - ✔✔Congressional
committees granted SAP access
✔✔OSD-level SAP Central Offices - ✔✔Exercise oversight authority for the specific
SAP category under their purview.
✔✔PIE-FAO - ✔✔People, information, equipment, facilities, activities, and operations
✔✔Antiterrorism Officer - ✔✔This person is responsible for the installation's
antiterrorism program
✔✔CI Support - ✔✔Responsible for providing valuable information on the capabilities,
intentions, and threats of adversaries
✔✔OPSEC Officer - ✔✔This person analyzes threats to assets and their vulnerabilities
✔✔Security Officer - ✔✔This person is charged with management, implementation, and
direction of all physical security programs
✔✔Law Enforcement - ✔✔Must be integrated into our intelligence gathering process so
that they can be part of coordinating emergency responses and criminal incidents on a
Federal installation
, ✔✔Criticality - ✔✔Determination based on an asset's importance to national security
and effect of loss
✔✔Area Security - ✔✔Security is geared towards protecting an entire area of the
installation or facility
✔✔Threat - ✔✔The intention and the capability of an adversary to undertake
detrimental actions
✔✔Point Security - ✔✔Security focused on the resource itself
✔✔Effective Protective Barriers - ✔✔1. Steel barriers
2. Chain link fence
3. Barbed wire
✔✔Purpose of protective barriers - ✔✔1. Establishing boundaries
2. Protecting the facility
3. Stopping observation
✔✔Controlling access - ✔✔The establishment of a restricted area improves security by
______________ and providing additional layers of security.
✔✔True - ✔✔True or False: Site lighting is used to enable guard force personnel to
observe activities inside or outside the installation
✔✔False - ✔✔True or False: Standby lighting is used when regular lighting is not
available
✔✔Two-way radio - ✔✔Using these assists in security; however, there must always be
back-up communication systems in addition to these
✔✔Intrusion Detection Systems - ✔✔This device sends a signal through wires when it
has been triggered
✔✔Closed Circuit Televisions (CCTV) - ✔✔This system has a camera that captures a
visual image, converts the image to a video signal, and transmits the image to a remote
location
✔✔Automated access control systems - ✔✔This system allows one to be identified by
their eye, handprint, or fingerprint
✔✔Common Access Card (CAC) - ✔✔This enables individuals to be able to
authenticate themselves on security websites and securely log into computer systems