Personal Sec Flashcards
Which of the following is not a best practice for personnel security
Limiting the use of background checks
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
Which of the following is an example of a personnel security control
Two factor authentication
What is the purpose of background checks in personnel security
To verify the identity and qualifications of job applicants
To assess the trustworthiness and reliability of individuals
To identity any potential security risks
What is the purpose of a security clearance
To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions
In the context of physical security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
What is the primary function of a legal hold notice
Informing relevant parties to preserve evidence
Which of the following is a potential threat to personnel security
Social Engineering
Insider Threats
Physical Security Breaches
What is the primary goal of personnel security
To prevent unauthorized access to sensitive information
To maintain confidentiality of information
To prevent theft and sabotage
To ensure the integrity of operations
Which of the following is not a purpose of personnel security
Ensuring the physical security of facilities
What is the purpose of security awareness training program in personnel security
To educate employees about potential security threats and best practices
Which of the following is a responsibility of the individual in the personnel security process
Reporting security incidents
Which of the following is a key principle of personnel security
Need to know principle
Least privilege principle
Separation of duties principle
What is the purpose of a personnel security policy
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
During a sting operation, what is the primary goal of the decoy
To trick the suspect into committing a crime
To induce a suspect to commit a crime for evidence collection
What is the purpose of conducting background checks in personnel security
To identify potential risks or threats
To verify employment history
To access criminal records
To evaluate financial stability
Which of the following is a key characteristic of the PEACE model of interviewing
Preparation and Planning
which of the following is an example of personnel security control
Security awareness training
Which of the following is a characteristic of secure entrance control system
Strong access controls
What is the purpose a background check in personnel security
To verify an individuals identity
To assess an individuals character and trustworthiness
To ensure an individual meets the requirements for the specific job
Which of the following is a personnel security best practice
Regularly updating access control lists
Conducting background checks on new employee
Implementing a strong password policy
What is the role of pre employment training
To verify the suitability of potential employees
Which of the following is an example of personnel security control
Access Control Measures
Security Awareness Training
Incident response procedures
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures
Which of the following is an example of security breach
Unauthorized access to restricted area
What is the role of a forensic accountant in an investigation
To analyze financial records for signs of fraud
What is the primary function of employee exit interviews
To gather information on why employees are leaving
Which of the following is not a method for preserving digital evidence
Modifying the original evidence
Encrypting the original evidence
Which of the following is not a common method used to identify a suspect a in a digital investigation
Data Carving
What is the purpose of conducting background checks in personnel security
To verify employment history
To assess criminal records
To evaluate financial stability
What is the main purpose of employee training programs in personnel security
Reducing security incidents
What is the primary advantage of using background checks in pre employment screening
Identifying potential red flags
Verifying qualifications
What is the purpose of personnel security
To protect classified information
To ensure the safety of employees
To prevent unauthorized access to facilities
To maintain a safe work environment
What is the role of access control policies in personnel security
To restrict unauthorized access to sensitive areas
Which of the following is a key element of a criminal investigation
Determining if a crime has occurred
What is the main challenge of using digital forensics in an investigation
Complexity of analysis
Cost of tools
Legal admissibility
Which of the following is not a component of personnel security
Cybersecurity protocols
Intrusion detection systems
Background checks
Physical security measures
Security awareness training
What is the purpose of physical access controls in personnel security
To restrict access to sensitive areas
What is the role of security awareness training in personnel security
To educate employees about security policies and procedures
To promote a culture of security awareness
To reduce the risk of security incidents caused by human error
To ensure compliance with security policies
What is the purpose of a termination process in personnel security
To ensure that an individuals access to sensitive information is revoked
Which of the following best describes a whistleblower policy
A policy to protect employees who report misconduct
Which of the following is not a typical step in the process of securing a crime scene
Collecting evidence immediately
What is the purpose of security awareness training for employees
To educate employees about the importance of personnel security
To teach employees how to recognize and respond to security threats
To promote a culture of security within the organization
To document and respond to security incidents
To reduce the risk of security incidents caused by human error
What is the role of access control in personnel security
To restrict access to sensitive areas
What is the purpose of a pre employment screening process in personnel security
To determine an individuals potential for misconduct
Which of the following is not a method of personnel security
Incident response
Which of the following is not a factor considered during personnel security clearance
All should be considered
Criminal history
Financial stability
Education qualifications
What it is necessary to question a witness about sexual deviation all of the following should be avoided except
Allow the witness to frame the testimony in his or her own word
What is the primary feature of PEACE model of interviewing
Empathy and rapport building
What is the primary goal of personnel security
To ensure the safety of employees
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Application form, pencil and paper tests, performance-simulation tests, interviews
Which of the following is not a best practice for personnel security
Regularly updating security clearance records
Implementing access control measures
Conducting background checks on visitors
Which of the following is an example of a personnel security control measure
Access Control Systems
Security Cameras
Encryption Software
What is the primary goal of background checks in personnel security
To verify employment history
To assess an individuals character
To identify potential security risks
What is the purpose of security clearances in personnel security
To grant individuals access to classified information
To assess an individuals trustworthiness and reliability
To restrict access to sensitive areas
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
What is the purpose of Non Disclosure Agreement (NDA) in personnel security
To protect sensitive information from unauthorized disclosure
To establish a legal contract between an organization and its employees
To ensure the confidentiality of classified information
What does the term personnel security refer to in the ASIS CPP domain
Security measures for employees and contractors
What is the primary goal of personnel security screening
To identity potential security risks
A narcotic addict is sometimes called
A hophead
What is the primary advantage of using a multidisciplinary team in investigations
Broader range of expertise
Which of the following is not a measure to protect against social engineering attacks
Implementing strong access controls
Conducting regular security awareness training
Verifying the identity of individuals before granting access
In the context of personnel security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
What is the purpose of a security awareness training program in personnel security
To educate employee about potential security threats and best practices
To ensure the safety of employee
To protect sensitive information
To prevent unauthorized access to facilities
Which of the following is an example of a personnel security violation
Unauthorized use of company resources
Unauthorized disclosure of classified information
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
Which of the following is not a type of personnel security clearance
Public
Which of the following is an example of a personnel security vulnerability
Lack of background checks for employees
Which of the following is a potential consequence of personnel security breaches
Financial loss
Decreased employee morale
Damage to company reputation
Which of the following is a responsibility of individuals in personnel security
Reporting Security incidents
Adhering to security policies
Protecting sensitive information
What is the purpose of a security badge system
To identify and control access for employees and visitors
Which of the following is not a typical step in the investigation process
Closing the investigation without reporting
Which of the following is not a potential risk associated with personnel security
Cybersecurity vulnerabilities
Which of the following is not a step in personnel security process
Social media monitoring
What is the primary goal of internal investigation
Identifying policy violations
Which of the following is a common method used in personnel security screening
Background checks
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures
Which of the following is an example of a personnel security policy
A set of guidelines for managing employee security
What is the role of security awareness training in personnel Security
To educate employees about security policies and procedures
To promote a culture of security within the organization
To reduce the likelihood of security incidents caused by human error
What is the purpose of personnel security
To protect the organizations physical assets
To ensure the safety of employee
To prevent unauthorized access to sensitive information
Which of the following is a potential risk to personnel security
Insider Threats
Social Engineering attacks
Unauthorized access
Which of the following is a best practice for managing personnel security risks
Regularly reviewing and updating security policies and procedures
Conducting thorough background checks for all employees
Implementing a comprehensive security awareness training program
Which of the following best describes a security incident log
A records for all security related incidents and actions taken
What is the primary function of access control in personnel security
Restricting unauthorized access
Which of the following is not a personnel security control meassure
Encryption technology
Which of the following is not a factor considered in personnel security
Criminal history
Financial stability
Educational background
Which of the the following is an example of a personnel security control
Security awareness training
What is the primary disadvantage of using open source intelligence in investigations
Legal and Ethical considerations
Which of the following is not a potential threat to personnel security
Natural disasters
What is the purpose of security incident reporting
To document and respond to security incidents
What is the purpose of root cause analysis in investigations
Identifying the underlying reasons for an incident
Which of the following is not a requirement for obtaining a personnel security clearance
Credit check
Which of the following is not a common personnel security control measure
None of the above
The below points are the common personnel security control measure
Background checks
Security clearances
Physical access controls
The cardinal rule in management of transportation concern is that those assigned to line hauling duties must be
Of the highest integrity
Which of the following is the primary purpose of an investigation
To determine the facts of an incident
Which of the following best describes the concept of least privilege
Granting employees the minimum access necessary to perform their duties
Which of the following is a key benefit of using digital forensics
Ability to recover and analyze electronic evidence
Which of the following is an example of a red flag during pre employment screening
A history of employment gaps
Which of the following best describes the primary purpose of personnel security
To protect an organizations human resources and ensure their safety
Which of the following best describes the concept of dual control
Requiring two or more individuals to complete a sensitive task
What is the role of security audits in personnel security
To evaluate and improve security measures
Which of the following is not a benefit of personnel security programs
Increasing operational costs
Which of the following is a key element of a personnel security investigation
Interviewing involved parties
The principle of unity of command is most relevant to which aspect of investigations
Organizational structure
What is the purpose of a personnel security policty
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
Which of the following is not a typical step in the evidence collection process
Manipulation
What is the purpose of a personnel security program
To ensure compliance with legal and regulatory requirements
To protect against unauthorized access to sensitive information
To mitigate the risk of insider threats
Which of the following is an example of physical security measures
Security Cameras and access control systems
Which of the following is not a standard step in the investigation process
Marketing
Thefts of this nature are held to be impulsive acts committed by persons operating alone who pick up an item or two that is readily available when there is small risk of detection
Theft of opportunity
Which of the following is a key element of a personnel security program
Background checks