• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
What factors should you consider when planning the installation of IDS?
Equipment capabilities and limitations, mission criticality, and threat to the resources that are to be
protected.
How does IDS assist SF capabilities?
By alerting security personnel to an approach, intrusion, or attempted intrusion.
What type of system should the installed IDS be?
A “closed” system, not allowing access from external source.
What is the main purpose of a boundary fence?
To present a physical and psychological deterrent to unauthorized entry.
What does a clear zone consists of?
A 30 foot area inside and outside the site perimeter fence.
For what purpose does the area lighting need to illuminate the interior of the restricted area?
To help personnel detect and track intruders.
What must a line of detection detect?
A person walking, running, rolling, crawling across, or jumping through the line of detection.
Where are CCTVs typically located?
CCTVs are typically located along exterior site perimeter clear zones, at controlled access points to sites or
buildings, within a restricted area that overlooks selected security areas outside, and at selected locations
within the protected areas indoor.
What is the purpose of an entry control facility?
To assist SFs in controlling entry in to and exit from restricted areas.
What components make up a simple portal?
Single door, a turnstile, or a pedestrian or vehicle gate.
What personnel identification device can be used at portals to read the encoded magnetic stripe
on badges?
The card reader PIN pad/prompt.
List the four card reader Pin/pad/prompt configurations used with the AECS.
(1) Card reader with prompt display.
(2) PIN pad with prompt display.
(3) Prompt display only.
(4) Card reader with PIN pad and prompt display.
Which panel configuration locks and unlocks portals based on inspection of personnel credentials
such as magnetic stripe-encoded badges, PIN entries, or biometric measurements?
The portal control panel (PCP).
What workstation functions as a central file server and communicates directly to the CSC
workstation?
The enrollment master station (EMS).
Which workstation displays events and assists the operator in responding to these events?
Security workstation.
What audio subsystem component is typically located at access portals enabling persons
attempting entrance to a controlled area?
Intercom substation.
What allows the camera inputs to the video switches located at the CSC, MSCF, and ECP
workstations to be forwarded to another station?
Loop-through connections.
What devices are used to accommodate large geographical separations between workstations and
panels?
Modems and fiber optic transceivers.
What backup power voltage do the primary and backup power supplies provide in the event that
station power is lost?
12–VDC.
What are some of the advantages of a conventional LMR system?
They are cost effective, they are easy to maintain, and their limited infrastructure ensures that
communication is possible in the event of a catastrophic failure.
When you key and speak into a radio, who can hear you?
Everyone on that particular channel can hear you.
When would you use a simplex radio system?
Simplex radio system works well when there are only a few users who are closely located.
In a half-duplex operation, what are the two frequencies used for?
Transmissions take place on one frequency and receive on another.
Why do repeaters use duplexer?
With a duplexer, it isolates the receiver from “hearing” the transmitter and prevents damage to the receiver.
What are the limitations of a single-site configuration?
The user radio must be within the range of coverage of the repeater, base station, or other radio asset.
What system is employed to increase area coverage and to improve radios talkback capability?
To extend the coverage of an area and improve its talkback capability, a receiver voting system is employed
to the existing LMR architecture.
Describe the primary difference between a simulcast and multicast system?
While a simulcast system transmits on the same RF channels simultaneously from each base
station/repeater, multicast systems use different RF channels at each site.
What does a typical trunking system consist of?
Some type of access control (whether in each mobile unit or centralized at a base station site), switching
equipment, system management computer, control and voice channel repeaters, modems, and telephone
interconnect.
When you set up a trunking network, how are different user groups defined?
User groups are defined as “talkgroups.”
What is trunking?
Electronically controlled sharing of a relatively small number of communications channels among a
relatively large number of users.
How does trunking result in a more balanced load sharing?
Trunked systems use access control schemes to share channel capacity among many users. The electronic
control enables users to take advantage of some transmitted channels that are idle at a particular time while
others are busy.
What part of the trunking system sends a data message over the control channel to automatically
switch all radios in a particular talk group to the available voice channel?
If a voice channel is available, the system controller sends a data message over the control channel
switching all units in User A’s talk group to the available voice channel.
Besides spectrum conservation, what are the other inherent benefits of a trunking system?
Other inherent benefits include faster system access, better channel efficiency, more user privacy, flexibility
to expand, and selective radio inhibit.
On the radio, what does the scan function do?
Cycles through the talkgroups programmed in the scan function but again they are only monitoring one
talkgroup at a time.
Which trunking user equipment provides users the capability to monitor more than one talkgroup
at a time?
Dispatch consoles provide the capability to monitor more than one talkgroup at a time.
How are LMR radios rekeyed without having to physically recall the radios from the field?
LMR radios can support over-the-air rekeying of encryption keys without having to physically recall the
radios from the field.
What does giant voice provide?
The base with crucial safety and security information.
What AFI requires communication squadrons to maintain “installation warning systems”?
AFI 10–2501, Full Spectrum Threat Response Planning and Operations.
Besides maintaining “installation warning systems,” what else must a communications squadron
do?
To originate, verify, and maintain an audibility footprint map showing area of coverage and low
audible/hazard areas.
What is one of the common problems with mass alert systems in a deployed environment?
Cleanliness.
What are the three basic components of a Whelen system?
Siren stacks, siren cabinet, the encoder.
Differentiate the operation between the remote and local position of the WPS–2800 system?
There are two ways to operate the WPS–2800 system, remote or local position. Remote position operation
involves transmitting signals from the encoder to the desired station via a landline connection or through
FM transceivers. Local position operation is accomplished through the control panel on the front of the
siren cabinet.
How long does the E–969 encoder maintain current time when power is lost?
Up to three months.
Name the two ways you can program the E–969 encoder.
Through a personal computer or through the encoder’s keypad.
How many call keys does the E–2010 have?
62.