Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
What factors should you consider when planning the installation of IDS?
|
Equipment capabilities and limitations, mission criticality, and threat to the resources that are to be
protected. |
|
How does IDS assist SF capabilities?
|
By alerting security personnel to an approach, intrusion, or attempted intrusion.
|
|
What type of system should the installed IDS be?
|
A “closed” system, not allowing access from external source.
|
|
What is the main purpose of a boundary fence?
|
To present a physical and psychological deterrent to unauthorized entry.
|
|
What does a clear zone consists of?
|
A 30 foot area inside and outside the site perimeter fence.
|
|
For what purpose does the area lighting need to illuminate the interior of the restricted area?
|
To help personnel detect and track intruders.
|
|
What must a line of detection detect?
|
A person walking, running, rolling, crawling across, or jumping through the line of detection.
|
|
Where are CCTVs typically located?
|
CCTVs are typically located along exterior site perimeter clear zones, at controlled access points to sites or
buildings, within a restricted area that overlooks selected security areas outside, and at selected locations within the protected areas indoor. |
|
What is the purpose of an entry control facility?
|
To assist SFs in controlling entry in to and exit from restricted areas.
|
|
What components make up a simple portal?
|
Single door, a turnstile, or a pedestrian or vehicle gate.
|
|
What personnel identification device can be used at portals to read the encoded magnetic stripe
on badges? |
The card reader PIN pad/prompt.
|
|
List the four card reader Pin/pad/prompt configurations used with the AECS.
|
(1) Card reader with prompt display.
(2) PIN pad with prompt display. (3) Prompt display only. (4) Card reader with PIN pad and prompt display. |
|
Which panel configuration locks and unlocks portals based on inspection of personnel credentials
such as magnetic stripe-encoded badges, PIN entries, or biometric measurements? |
The portal control panel (PCP).
|
|
What workstation functions as a central file server and communicates directly to the CSC
workstation? |
The enrollment master station (EMS).
|
|
Which workstation displays events and assists the operator in responding to these events?
|
Security workstation.
|
|
What audio subsystem component is typically located at access portals enabling persons
attempting entrance to a controlled area? |
Intercom substation.
|
|
What allows the camera inputs to the video switches located at the CSC, MSCF, and ECP
workstations to be forwarded to another station? |
Loop-through connections.
|
|
What devices are used to accommodate large geographical separations between workstations and
panels? |
Modems and fiber optic transceivers.
|
|
What backup power voltage do the primary and backup power supplies provide in the event that
station power is lost? |
12–VDC.
|
|
What are some of the advantages of a conventional LMR system?
|
They are cost effective, they are easy to maintain, and their limited infrastructure ensures that
communication is possible in the event of a catastrophic failure. |
|
When you key and speak into a radio, who can hear you?
|
Everyone on that particular channel can hear you.
|
|
When would you use a simplex radio system?
|
Simplex radio system works well when there are only a few users who are closely located.
|
|
In a half-duplex operation, what are the two frequencies used for?
|
Transmissions take place on one frequency and receive on another.
|
|
Why do repeaters use duplexer?
|
With a duplexer, it isolates the receiver from “hearing” the transmitter and prevents damage to the receiver.
|
|
What are the limitations of a single-site configuration?
|
The user radio must be within the range of coverage of the repeater, base station, or other radio asset.
|
|
What system is employed to increase area coverage and to improve radios talkback capability?
|
To extend the coverage of an area and improve its talkback capability, a receiver voting system is employed
to the existing LMR architecture. |
|
Describe the primary difference between a simulcast and multicast system?
|
While a simulcast system transmits on the same RF channels simultaneously from each base
station/repeater, multicast systems use different RF channels at each site. |
|
What does a typical trunking system consist of?
|
Some type of access control (whether in each mobile unit or centralized at a base station site), switching
equipment, system management computer, control and voice channel repeaters, modems, and telephone interconnect. |
|
When you set up a trunking network, how are different user groups defined?
|
User groups are defined as “talkgroups.”
|
|
What is trunking?
|
Electronically controlled sharing of a relatively small number of communications channels among a
relatively large number of users. |
|
How does trunking result in a more balanced load sharing?
|
Trunked systems use access control schemes to share channel capacity among many users. The electronic
control enables users to take advantage of some transmitted channels that are idle at a particular time while others are busy. |
|
What part of the trunking system sends a data message over the control channel to automatically
switch all radios in a particular talk group to the available voice channel? |
If a voice channel is available, the system controller sends a data message over the control channel
switching all units in User A’s talk group to the available voice channel. |
|
Besides spectrum conservation, what are the other inherent benefits of a trunking system?
|
Other inherent benefits include faster system access, better channel efficiency, more user privacy, flexibility
to expand, and selective radio inhibit. |
|
On the radio, what does the scan function do?
|
Cycles through the talkgroups programmed in the scan function but again they are only monitoring one
talkgroup at a time. |
|
Which trunking user equipment provides users the capability to monitor more than one talkgroup
at a time? |
Dispatch consoles provide the capability to monitor more than one talkgroup at a time.
|
|
How are LMR radios rekeyed without having to physically recall the radios from the field?
|
LMR radios can support over-the-air rekeying of encryption keys without having to physically recall the
radios from the field. |
|
What does giant voice provide?
|
The base with crucial safety and security information.
|
|
What AFI requires communication squadrons to maintain “installation warning systems”?
|
AFI 10–2501, Full Spectrum Threat Response Planning and Operations.
|
|
Besides maintaining “installation warning systems,” what else must a communications squadron
do? |
To originate, verify, and maintain an audibility footprint map showing area of coverage and low
audible/hazard areas. |
|
What is one of the common problems with mass alert systems in a deployed environment?
|
Cleanliness.
|
|
What are the three basic components of a Whelen system?
|
Siren stacks, siren cabinet, the encoder.
|
|
Differentiate the operation between the remote and local position of the WPS–2800 system?
|
There are two ways to operate the WPS–2800 system, remote or local position. Remote position operation
involves transmitting signals from the encoder to the desired station via a landline connection or through FM transceivers. Local position operation is accomplished through the control panel on the front of the siren cabinet. |
|
How long does the E–969 encoder maintain current time when power is lost?
|
Up to three months.
|
|
Name the two ways you can program the E–969 encoder.
|
Through a personal computer or through the encoder’s keypad.
|
|
How many call keys does the E–2010 have?
|
62.
|