CPP 2012 Domain 4: Personnel Security Flashcards

1
Q

According to Oatman, what are the six principles that should guide thinking about executive protection?

A

Prevent and avoid danger,
Realize that anyone can protect anyone,

Don’t stop to think,
Keep clients out of trouble,
Understand the security vs. convenience continuum,
Rely on brains, not on technology.

Source: POA: Security Management, 9.5, page 271

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three levels of assessment for violent risk among known subjects

A

Initial,
Threshold,

Comprehensive.

Source: POA: Security Management, 122.7.2, page 367

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What questions does an executive protection risk analysis answer?

A

Who would want to harm the executive?
How are adversaries gaining information about the executive?
What is the current likelihood of the various identified threats?
When does the executive desire, require, and accept protection?
Source: POA: Security Management, 9.6, page 275

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are executives most vulnerable to attack?

A

At home.

Source: POA: Security Management, 9.8, pages 277-278

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In executive protection (EP), what is an advance?

A

The process of researching a destination before the principal arrives.

Source: POA: Security Management, 9.9, page 278

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During a trip with a principal, what are the three key concepts for an executive protection (EP) specialist to remember?

A

Keep a low profile,
Stay away from problem areas and situations,
Know what to do if trouble arises.
Source: POA: Security Management, 9.9, page 281

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “working the principal”?

A

The choreography used by an executive protection specialist to physically move about with the principal.

Source: POA: Security Management, 9.10, page 282

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the chain of action that must occur if a principal is attacked?

A

Arm’s reach (immobilize attacker if within arm’s reach, otherwise cover the principal),
Sound off (shout the weapon displayed and the direction, in relation to the principal, from which it is coming),
Cover,
Evacuate.
Source: POA: Security Management, 9.10, page 284

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Schedule I drugs, and what are the specific types?

A

Schedule I drugs have a high potential for abuse and no accepted medical use in the United States. Types include marijuana, hashish, heroin, and LSD.

Source: POA: Security Management, 11.6.1, page 313

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some effects of depressants in large doses?

A

Impaired reflexes,
Slurred speech,
Uncontrollable drowsiness.
Source: POA: Security Management, 11.6.2, page 314

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four symptoms of alcohol dependence?

A
Craving,
Loss of control, 
Physical dependence,
Tolerance.
Source: POA: Security Management, 11.6.2, page 314
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the immediate effects of cocaine use?

A
Dilated pupils,
Elevated blood pressure,
Increased heart rate,
Euphoria.
Source: POA: Security Management, 11.6.4, page 316
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the effects of large doses of cocaine?

A
Bizarre behavior,
Tremors,
Vertigo,
Muscle twitches,
Paranoia, 
Toxic reaction.
Source: POA: Security Management,11.6.4, page 317
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “ice”?

A

“Ice” is a smokable form of methamphetamine. It is a large, usually clear crystal of high quality that produces effects that can last for 12 hours or more.

Source: POA: Security Management,11.6.4, page 317

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the most commonly abused hallucinogens?

A
LSD,
MDA,
MDMA (ecstasy)
PCP (angel dust),
Mescaline,
Mushrooms.
Source: POA: Security Management, 11.6.5, page 318
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two most commonly abused drugs in the workplace?

A
#1 Alcohol,
#2 Marijuana.
Source: POA: Security Management, 11.6.6, page 320
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is flunitrazepam (Rohypnol)?

A

A date rape drug, sometimes placed in drinks to incapacitate victims, widely known as roofies.

Source: POA: Security Management, 11.6.8, page 321

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three basic stages of addiction?

A

Increased tolerance to the drug,
Increased rationalization and lying,
Obsession with the substance.
Source: POA: Security Management, 11.7.1, page 322

19
Q

What should every job offer be based on?

A

Satisfactory completion of preemployment background checks.

Source: Preemployment Background Screening Guideline, 10.1, page 42

20
Q

What is the most commonly used preliminary drug test?

A

Thin-layer chromatography (TLC).

Source: POA: Security Management, 11.9.1, page 335

21
Q

What is the most accurate preliminary drug test?

A

Radioimmunoassay (RIA).

Source: POA: Security Management, 11.9.1, page 335

22
Q

What type of specimen is analyzed most often in drug tests?

A

Urine.

Source: POA: Security Management, 11.9.1, page 335

23
Q

What is the most accurate confirmatory drug test?

A

Gas chromatography/mass spectrometry.

Source: POA: Security Management, 11.9.1, pages 335-336

24
Q

On what occasions may drug testing be performed?

A

Before a job offer is made,
Upon reasonable suspicion,
After an incident or injury,
Randomly (safety-sensitive workers),
After return to duty following a violation,
As a follow-up to treatment.
Source: POA: Security Management, 11.9.3, 337

25
Q

What business-related concerns should a workplace violence program address?

A
Liability,
Productivity,
Workplace morale,
Associated costs.
Source: POA: Security Management, 12.3, page 361
26
Q

What is the most effective means for security professionals to prevent workplace violence?

A

Early detection of the behavioral, emotional, and psychological dynamic of workplace violence.

Source: POA: Security Management, 12.5, page 363

27
Q

How do aggressors decide to commit workplace violence?

A

Not by “snapping,” but through a process of emotional escalation, or, with psychopaths, non-emotional decision making.

Source: POA: Security Management, 12.5, page 363

28
Q

At a minimum, who should be part of a workplace violence incident management team (IMT)?

A

A senior management representative,
A senior HR manager,
A senior security manager,
A legal representative familiar with labor and employment law.
Source: POA: Security Management, 12.6, page 365

29
Q

What is the difference between behavioral investigative analysis (profiling) and violence risk assessment?

A

Profiling is used to exclude people from an investigative pool of subjects (to conserve resources).
Violence risk assessment is focused on an individual’s risk of committing a violent act.
Source: POA: Security Management, 12.7.2, page 367

30
Q

Why might companies keep secret the existence of kidnap, ransom, and extortion policies for their personnel?

A

To avoid being targeted.

Source: POA: Applications, 4.14, page 130

31
Q

What is the most important relationship for security during a strike?

A

The relationship with local law enforcement.

Source: POA: Legal Issues, 2.3, page 49

32
Q

What is a just cause discharge?

A

Often included in labor contracts, it requires an employer to prove misconduct or unsuitability, not merely allege it, before termination of a worker.

Source: POA: Legal Issues, 2.2.3, page 31

33
Q

If no guard force is available, who should provide security during a strike?

A

Supervisory personnel organized into patrol groups. Duties are observation and reporting, not apprehension.

Source: POA: Legal Issues, 2.3, Appendix A, page 58

34
Q

How long do the effects of controlled-release OxyContin last?

A

8 to 12 hours.

Source: POA: Security Management, 11.6.3, page 315

35
Q

How long does withdrawal from narcotics take?

A

7 to 10 days.

Source: POA: Security Management, 11.6.3, page 315

36
Q

What is the typology of workplace violence incidents used by U.S .occupational health and safety agencies?

A
Type I (no relationship between assailant and victim, e.g. robbery),
Type II (customer/client/patient violence), 
Type III (worker-on-worker violence), 
Type IV (violence stemming from a personal relationship).
Source: Workplace Violence Prevention and Response Guideline, 6.1.2, page 11
37
Q

What is “the second injury”?

A

Emotional harm to employees caused by unconcerned or callous management in the wake of a workplace violence incident.

Source: Workplace Violence Prevention and Response Guideline, 11.2, page47

38
Q

How many workplace violence incidents are committed annually by intimates of the victim?

A

18,700.

Source: Workplace Violence Prevention and Response Guideline, 15, page 32

39
Q

What legal causes of action are most frequently litigated in workplace violence cases?

A

Premises liability,
Respondent superior,
Harassment,
Negligence in: hiring, supervision, retention.
Source: Workplace Violence Prevention and Response Guideline, 11.5, page 12

40
Q

What departments are typically involved in preemployment background screening?

A
Human resources,
Security,
Business units,
Legal.
Source: Preemployment Background Screening Guideline, 4.2, pages 10-11
41
Q

How many years of prior work history should a job application ask for?

A

At least 7 to 10 years.

Source: Preemployment Background Screening Guideline, 6.2, page 24

42
Q

What are the three goals of preemployment interviews?

A

Convey critical information to the applicant to discourage unqualified applicants and encourage honesty,
Allow transfer of missing information from the applicant to the employer,
Permit an assessment of the candidate.
Source: Preemployment Background Screening Guideline, 8, page 25

43
Q

What is the name for the process by which an employer verifies the experience and qualifications presented by a job candidate?

A

Credentialing.

Source: Preemployment Background Screening Guideline, 9.2.3, page 37

44
Q

What are the five most common identifiers used to verify education history in a background check?

A
Name while attending school, 
Dates of attendance, 
Graduation date, 
Degree obtained, 
Date of birth.
Source: Preemployment Background Screening Guideline, 9.2.3.1, page 38