Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/75

Click to flip

75 Cards in this Set

  • Front
  • Back
What security committee is designed to address security-related matters on an installation-wide perspective

1. LPS
2. LEPS
3. PSRC
4. PSRB
4. PSRB
Personal selected as the command key control officer ideally should have a clearance equal to th highest level of classified material held at the command

1. True
2. False
1. True
Which of the followin personnel should NOT have access to a central key room

1. Locksmith
2. Key custodian
3. Commanding officer
4. Public works officer
4. Public works officer
The lack of free play in a car ball end seal may indicate tampering. Approximately how much free play, in inches, should there be

1. 1/16
2. 1/8
3. 1/4
4. 1/2
2. 1/8
How often should all unused seals be inventoried

1. Monthly
2. Quarterly
3. Semiannually
4. Annually
4. Annually
Which of the following instructions outlines policy on quarterdeck inspections

1. OPNAVINST 5580.1
2. OPNAVINST 5530.14
3. OPNAVINST 3120.32
4. OPNAVINST 2910.2
3. OPNAVINST 3120.32
Which of the following personnel would be exempt from an administrative inspection of vehicles while on official duty

1. NCIS agent
2. Security officer
3. Base Commanding officer
4. Chief of Naval training
1. NCIS agent
Perimeter and area protective controls are the first steps in providing protection against certain security hazards

1. True
2. False
1. True
All security barriers are broken down into what two types

1. Natural and structural
2. Buildings and mountains
3. Fences and waterways
4. Perimeters and buildings
1. Natural and structural
Which of the following security methods should be used to secure relatively small areas within an installation

1. Limited
2. Enclaving
3. Exclusion
4. Controlled
2. Enclaving
An asset lost or stolen from this area would cause serious damage

1. Level one
2. Level two
3. Level three
4. Nonrestricted
2. Level two
The most secure type of restricted area

1. Level one
2. Level two
3. Level three
4. Nonrestricted
3. Level three
Access to this area constitutes access to the security

1. Level one
2. Level two
3. Level three
4. Nonstricted
2. Level two
Never inside a level three area

1. Level one
2. Level two
3. Level three
4. Nonrestricted
2. Level two
An asset stolen from this area would cause grave damage

1. Level one
2. Level two
3. Level three
4. Nonrestricted
3. Level three
Unescorted movement in this area could permit access to the security interest

1. Level one
2. Level two
3. Level three
4. Unrestricted
2. Level two
This area is th least secure type of restricted area

1. Level one
2. Level two
3. Level three
4. Unrestricted
1. Level one
Access to this area is minimally controlled or uncontrolled

1. Level one
2. Level two
3. Level three
4. Unrestricted
4. Unrestricted
This type of area should not be located inside restricted areas

1. Level one
2. Level two
3. Level three
4. Unrestricted
4. Unrestricted
This area may serve as a buffer zone for a level two area

1. Level one
2. Level two
3. Level three
4. Unrestricted
1. Level one
Uncontrolled movement may or may not permit access to a security interest

1. Level one
2. Level two
3. Level three
4. Unrestricted
1. Level one
Which of the following security areas is required to have the perimeter fence posted at no less than 100 feet intervals along the perimeter

1. Level one
2. Level two
3. Level three
4. Each of the above
3. Level three
Which of the following security areas requires that visitors be logged in and out during normal duty hours

1. Level one
2. Level two
3. Level three
4. Each of the above
3. Level three
During normal duty hours, the use of an access list and entry and depature log is suggested but not required for what security areas

1. Level one
2. Level two
3. Both 1 and two above
4. Level three
2. Level two
What appendix of OPNAVINST 5530.14 lists facilities and assests that are critical and essential to the overall mission of the Navy

1. 6
2. 7
3. 8
4. 9
4. 9
At a minimum, of how often should administrative vehicle and personnel inspections operations be conducted

1. Daily
2. Weekly
3. Biweekly
5. Monthly
2. Weekly
Which of the following agencies has/have the authority to control access to certain limited waterway areas under its jurisdiction when security dictates

1. USCG
2. USACE
3. Both 1 and 2 above
4. NCIS
3. Both 1 and 2 above
In which of the following limited waterway areas may enforcement be delegated to the Navy command

1. Restricted waterfront
2. Restricted area
3. Security zone
4. Safety zone
2. Restricted area
The signs posted at points of ingress to restricted areas should be approximately what size

1. 2 ft x 2 ft
2. 2 ft x 3 ft
3. 3 ft x 3 ft
4. 4 ft x 4 ft
3. 3 ft x 3 ft
The signs posted on perimeter barriers of restricted areas should be approximately what size

1. 12 in x 18 in
2. 12 in x 24 in
3. 2 ft x 2 ft
4. 3 ft x 3 ft
1. 12 in x 18 in
The signs posted on perimeter barriers of nonrestricted areas should be approximately what size

1. 11 in x 12 in
2. 12 in x 24 in
3. 2 ft x 2 ft
4. 3 ft x 3 ft
11 in x 12 in
The interval between signs posted along restricted and nonrestricted area perimeters should not exceed how many feet

1. 50
2. 100
3. 150
4. 200
4. 200
During daylight conditions, signs should be legible from a distance of at least how many feet

1. 25
2. 50
3. 100
4. 150
3. 100
The lettering in area perimeter signs should be black in color except for the word 'WARNING' which should be red in color

1. True
2. False
1. True
A light source that points toward likely avenues of approach and provides relative darkness for security personnel is called what type of lighting

1. Shadow zone
2. Overlapping
3. Spot projection
4. Glare projection
4. Glare projection
The two primary methods of continuous lighting are glare projection and controlled

1. True
2. False
1. True
What type of lighting is used to limit the width of a lighted strip outside a perimeter

1. Shadow
2. Moveable
3. Controlled
4. Glare projection
3. Controlled
What type of lighting is turned on automatially when activity is detected by an intrusion system

1. Controlled
2. Moveable
3. Standby
4. Emergency
3. Standby
What type of lighting is normally used to supplement continuous lighting

1. Standby
2. Moveable
3. Emergency
4. Controlled
2. Moveable
Who decides what additional areas, if any, need illuminating at a command

1. Commanding officer
2. Security officer
3. Public works officer
4. Chief of police
1. Commanding officer
How often should protective lighting be checked by security force personnel

1. Daily
2. Weekly
3. Biweekly
4. Monthly
1. Daily
How often should an emergency power system be tested

1. Daily
2. Weekly
3. Monthly
4. Yearly
3. Monthly
The test results of an emergency power system should be recorded for how many years

1. 5
2. 2
3. 3
4. 4
3. 3
At least how often should an immediate cuperior in command conduct a physical security inspection

1. Every year
2. Every 2 years
3. Every 3 years
4. Every 4 years
3. Every 3 years
The purpose of a physical security survey is to evaluate the adequacy of a command's security program

1. True
2. False
1. True
A physical security survey should be conducted during which of the followin times

1. Normal working hours
2. Non-duty hours
3. Hours of darkness
4. All of the above
6. All of the above
Physical security surveys are management tools that are normally sent up the chain of command

1. True
2. False
2. False
A total of how many types of physical security surveys are used by the Navy

1. Five
2. Two
3. Three
4. Four
3. Three
What type of physical security survey is conducted when changes occur that could affect the physical security of an installation

1. Initial
2. Special
3. Follow-up
4. Supplement
4. Supplement
The most positive method of identification

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
3. Personal recognition
The least reliable means for determining access authorization

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
2. Military/dependent ID card
Optional Form 55

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
4. U.S. government ID card
May be used to identify personnel who are authorized access to nonrestricted areas

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
1. Access list
2. M
2. Military/dependent ID card
Required for level three areas

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
1. Access list
Used in areas where the number of authorized personnel does not exceed 50

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
3. Personal recognition
Should be maintained under stringent control

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
1. Access list
May be issued to civil service employees

1. Access list
2. Military/dependent ID card
3. Personal recognition
4. U.S. government ID card
4. U.S. government ID card
When, if ever, may an assigned escort leave a visitor alone in a security area

1. After escorting the visitor
2. When taking a short break
3. When the visitor goes to the bathroom
4. Never
4. Never
How often should installations and activities re-badge all regular employees and other personnel possessing permanent picture badges

1. Every year
2. Every 3 years
3. Every 6 years
4. Every 7 years
3. Every 6 years
During normal daylight hours, the expiration date of a badge should be distinguishable from a distance of at least how many feet

1. 5
2. 2
3. 3
4. 7
3. 3
All badges issued during a 6 year period ending December 1997 would normally bear a December 1997 expiration date

1. True
2. False
1. True
A contractor picture badge may be issued for what maximum period of time

1. 6 mo
2. 12 mo
3. 24 mo
4. 36 mo
3. 24
The issuing activity should conduct an inventory of serialized badges or passes on hand at least how often

1. Monthly
2. Quarterly
3. Semiannually
4. Yearly
3. Semiannually
The photo on a picture badge should be of what minimum size

1. 1 in x 1 1/4 in
2. 2 in x 1 1/2 in
3. 3 in x 1 1/2 in
4. 3 in x 2 in
1. 1 in x 1 1/4 in
Which of the following forms is used to identify and control motor vehicles on most installations

1. DD Form 222
2. DD Form 321
3. DD Form 1243
4. DD Form 2220
4. DD Form 2220
Certain overseas ativities where terrorist activity is acute may be exempt from the use of motor vehicle decals

1. True
2. False
1. True
What instruction provides guidance on the honoring of base decals issued by another activity

1. OPNAVINST 5580.1
2. OPNAVINST 5530.14
3. OPNAVINST 5560.10
4. OPNAVINST 11200.5
3. OPNAVINST 5560.10
Which of the following factors should be considered in determining the feasibility and necessity of installing IDS equipment

1. Threat
2. Mission
3. Criticality
4. All of the above
4. All of the above
There are a total of how many basic types of intrusion detection systems

1. Seven
2. Five
3. Three
4. Four
4. Four
What type of intrusion detection system is prescribed for all naval activities and installations

1. Police connection
2. Central station
3. Local alarm
4. Proprietary
4. Proprietary
What intrusion detection system allows the intruder to know when the alarm is activated

1. Police connection
2. Central station
3. Local alarm
4. Proprietary
3. Local alarm
What intrusion detection system is usually connected over leased telephone company lines

1. Police connection
2. Central station
3. Local alarm
4. Porprietary
2. Central station
What intrusion detection system requires an arranged agreement prior to establishment

1. Police connection
2. Central station
3. Local alarm
4. Proprietary
1. Police connection
The sensor subsystem is divided into a total of how many areas

1. Five
2. Two
3. Six
4. Four
2. Two
What is the normal power requirement for an intrusion detection system

1. 12 volt DC
2. 115 volt AC
3. 220 volt AC
4. 440 volt AC
2. 115 volt AC