1.
Two security professionals - Jo and Chris - are discussing access control systems.
Jo says that the choice of which access control system to use, manual or automated, should be determined by an analysis of the criticality, vulnerability and the threat.
Chris says that access control is one of the inner layers in a security-in-depth approach to physical security.
Who is correct?
DoDM 5200.01-V3, Encl. 3
Correct Answer
C. Jo and Chris are both correct.
Explanation
Both Jo and Chris are correct. Jo is correct in stating that the choice of access control system should be determined by an analysis of the criticality, vulnerability, and threat. This means that the level of security needed should be based on the specific risks and potential harm that could occur. Chris is also correct in stating that access control is one of the inner layers in a security-in-depth approach to physical security. This means that access control is just one component of a comprehensive security strategy that includes multiple layers of protection.
2.
Access control systems are implemented to prevent unauthorized personnel from entering a designated area. DoDm 5200.01-V3, Encl. 3
Correct Answer
A. True
Explanation
Access control systems are implemented to prevent unauthorized personnel from entering a designated area. This is an important security measure that ensures only authorized individuals have access to sensitive or restricted areas. By using various authentication methods such as keycards, biometrics, or passwords, access control systems can effectively limit entry to only those who have been granted permission. This helps to protect valuable assets, maintain privacy, and enhance overall security within an organization or facility.
3.
An example of a manual access control system is a stand-alone system that requires the user to know a three or four-digit number to gain access to the designated area. DoDm 5200.01-V3, Encl. 3
Correct Answer
A. True
Explanation
A manual access control system refers to a system that requires physical interaction or input from the user to grant access to a designated area. In this case, the example given is a stand-alone system that requires the user to know a three or four-digit number. This means that the user must have knowledge of the specific number in order to gain access. Therefore, the statement "An example of a manual access control system is a stand-alone system that requires the user to know a three or four-digit number to gain access to the designated area" is true.
4.
An example of a manual system that uses automated electronics is the Common Access Card that allows users to authenticate signatures, securely log onto computer systems and gain access into designated areas. DoDm 5200.01-V3, Encl. 3
Correct Answer
A. True
Explanation
The given statement is true. The Common Access Card (CAC) is a manual system that uses automated electronics. It is a smart card issued by the Department of Defense (DoD) to military personnel, civilian employees, and contractors. The CAC allows users to authenticate signatures, securely log onto computer systems, and gain access into designated areas. It combines both physical and logical access control, providing a secure and efficient way to verify the identity and privileges of the cardholder.
5.
Biometric access control systems use individually unique characteristics such as fingerprints and voice to authenticate that an individual is authorized to gain access onto a designated area. DoDm 5200.01-V3, Encl. 3
Correct Answer
A. True
Explanation
Biometric access control systems are indeed used to verify an individual's identity by analyzing their unique physical characteristics like fingerprints and voice. This technology ensures that only authorized individuals can enter specific areas. The reference to DoDm 5200.01-V3, Encl. 3 suggests that this practice is endorsed by the Department of Defense. Therefore, the correct answer is "True."
6.
Two security professionals - Jo and Chris - are discussing intrusion detection systems (IDS).
Jo says that an IDS uses sensors, control units, transmission line and monitor units to detect a change in the environment.
Chris says that the two types of IDS are active and passive.
Who is correct?
DoDM 5200.01-V3, Encl. 3
Correct Answer
A. Jo is correct.
Explanation
Jo is correct because an intrusion detection system (IDS) does indeed use sensors, control units, transmission lines, and monitor units to detect changes in the environment. This is the basic architecture of an IDS. Chris is incorrect because although there are different types of IDS, active and passive are not the only two types. There are also host-based IDS, network-based IDS, and hybrid IDS, among others. Therefore, Jo is the only one who provides a correct statement.
7.
Two security professionals - Jo and Chris - are discussing intrusion detection systems (IDS).
Jo says that IDS can be used for area security.
Chris says that IDS can be used for point security.
Who is correct?
DoDM 5200.01-V3, Encl. 3, 5200.8-R, C2.1.4.5 Based on a methodology.
Correct Answer
C. Jo and Chris are both correct.
Explanation
Jo and Chris are both correct. Intrusion detection systems (IDS) can be used for both area security and point security. IDS can monitor and analyze network traffic to detect any unauthorized access or malicious activities within a specific area (area security). Additionally, IDS can also be deployed to protect specific devices or endpoints (point security) by monitoring their network traffic and detecting any suspicious or unauthorized activities. Therefore, both Jo and Chris are correct in their statements about the capabilities of IDS.
8.
CCTV is considered cost effective because it allows security personnel to monitor.
DoD 5200.8-R, C2.1.4.6 Based on a methodology.
Correct Answer
A. True
Explanation
CCTV is considered cost effective because it allows security personnel to monitor. This means that with the help of CCTV cameras, security personnel can keep an eye on different areas without physically being present everywhere. This reduces the need for hiring a large number of security personnel, resulting in cost savings. Additionally, CCTV cameras can continuously record footage, allowing for later review and analysis if needed. Therefore, CCTV is considered a cost-effective security solution.
9.
CCTV systems consist of sensors, control units, transmission lines and monitor units.
DoDM 5200.01-V3, Encl. 3
Correct Answer
B. False
Explanation
The given statement is false. CCTV systems actually consist of cameras, not sensors. The cameras capture the video footage, which is then transmitted through transmission lines to the control units. The control units process and manage the video signals, and the monitor units display the video feed. Therefore, the correct answer is false because the statement incorrectly includes sensors as part of CCTV systems.
10.
CCTV systems are used to prevent, deter and detect pilferage.
DoD 5200.8-R, C2.3
Correct Answer
A. True
Explanation
CCTV systems are commonly used to prevent, deter, and detect pilferage. This means that they are employed to discourage theft and catch individuals who engage in stealing. The given answer is "True" because it accurately states that CCTV systems serve these purposes.
11.
CCTV systems allow security personnel to safely assess and determine the size and intention of an unauthorized intrusion.
DoD 5200.8-R, C2.3
Correct Answer
A. True
Explanation
CCTV systems provide security personnel with the ability to assess and determine the size and intention of an unauthorized intrusion. This means that security personnel can use CCTV footage to evaluate the nature and extent of any unauthorized access or breach, helping them to make informed decisions about how to respond and mitigate the situation. The statement is true because CCTV systems are indeed used for this purpose in security operations.
12.
CCTV systems provide security personnel the capability to detect, identify, track, assess, record and coordinate response to unauthorized intrusions.
DoD 5200.8-R, C2.3
Correct Answer
A. True
Explanation
CCTV systems are able to provide security personnel with various capabilities that help in ensuring security. These capabilities include detecting unauthorized intrusions, identifying the intruders, tracking their movements, assessing the situation, recording the events, and coordinating an appropriate response. The statement is true as it accurately describes the capabilities of CCTV systems in enhancing security measures.
13.
Two security professionals - Jo and Chris - are discussing screening equipment.
Jo says that screening equipment is used in facility access control procedures.
Chris says that the use of screening equipment includes the use of two-way radios as a way for response forces to communicate with their respective control centers.
Who is correct?
DoDM 5200.8-R, C2.3.2.6
Correct Answer
A. Jo is correct.
Explanation
Jo is correct because screening equipment is indeed used in facility access control procedures. This equipment includes devices such as metal detectors, X-ray machines, and CCTV cameras, which are used to screen individuals and their belongings for prohibited items before granting them access to a facility. Chris's statement about the use of two-way radios for communication between response forces and control centers is not related to screening equipment and therefore is incorrect.