Personal Sec Flashcards
Which of the following is not a best practice for personnel security
Limiting the use of background checks
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
Which of the following is an example of a personnel security control
Two factor authentication
What is the purpose of background checks in personnel security
To verify the identity and qualifications of job applicants
To assess the trustworthiness and reliability of individuals
To identify any potential security risks
What is the purpose of a security clearance
To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions
In the context of physical security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
What is the primary function of a legal hold notice
Informing relevant parties to preserve evidence
Which of the following is a potential threat to personnel security
Social Engineering
Insider Threats
Physical Security Breaches
What is the primary goal of personnel security
To prevent unauthorized access to sensitive information
To maintain confidentiality of information
To prevent theft and sabotage
To ensure the integrity of operations
Which of the following is not a purpose of personnel security
Ensuring the physical security of facilities
What is the purpose of security awareness training program in personnel security
To educate employees about potential security threats and best practices
Which of the following is a responsibility of the individual in the personnel security process
Reporting security incidents
Which of the following is a key principle of personnel security
Need to know principle
Least privilege principle
Separation of duties principle
What is the purpose of a personnel security policy
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
During a sting operation, what is the primary goal of the decoy
To trick the suspect into committing a crime
To induce a suspect to commit a crime for evidence collection
What is the purpose of conducting background checks in personnel security
To identify potential risks or threats
To verify employment history
To access criminal records
To evaluate financial stability
Which of the following is a key characteristic of the PEACE model of interviewing
Preparation and Planning
which of the following is an example of personnel security control
Security awareness training
Which of the following is a characteristic of secure entrance control system
Strong access controls
What is the purpose a background check in personnel security
To verify an individuals identity
To assess an individuals character and trustworthiness
To ensure an individual meets the requirements for the specific job
Which of the following is a personnel security best practice
Regularly updating access control lists
Conducting background checks on new employee
Implementing a strong password policy
What is the role of pre employment training
To verify the suitability of potential employees
Which of the following is an example of personnel security control
Access Control Measures
Security Awareness Training
Incident response procedures
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures
Which of the following is an example of security breach
Unauthorized access to restricted area
What is the role of a forensic accountant in an investigation
To analyze financial records for signs of fraud
What is the primary function of employee exit interviews
To gather information on why employees are leaving
Which of the following is not a method for preserving digital evidence
Modifying the original evidence
Encrypting the original evidence
Which of the following is not a common method used to identify a suspect a in a digital investigation
Data Carving
What is the purpose of conducting background checks in personnel security
To verify employment history
To assess criminal records
To evaluate financial stability
What is the main purpose of employee training programs in personnel security
Reducing security incidents
What is the primary advantage of using background checks in pre employment screening
Identifying potential red flags
Verifying qualifications
What is the purpose of personnel security
To protect classified information
To ensure the safety of employees
To prevent unauthorized access to facilities
To maintain a safe work environment
What is the role of access control policies in personnel security
To restrict unauthorized access to sensitive areas
Which of the following is a key element of a criminal investigation
Determining if a crime has occurred
What is the main challenge of using digital forensics in an investigation
Complexity of analysis
Cost of tools
Legal admissibility
Which of the following is not a component of personnel security
Cybersecurity protocols
Intrusion detection systems
Background checks
Physical security measures
Security awareness training
What is the purpose of physical access controls in personnel security
To restrict access to sensitive areas
What is the role of security awareness training in personnel security
To educate employees about security policies and procedures
To promote a culture of security awareness
To reduce the risk of security incidents caused by human error
To ensure compliance with security policies
What is the purpose of a termination process in personnel security
To ensure that an individuals access to sensitive information is revoked
Which of the following best describes a whistleblower policy
A policy to protect employees who report misconduct
Which of the following is not a typical step in the process of securing a crime scene
Collecting evidence immediately
What is the purpose of security awareness training for employees
To educate employees about the importance of personnel security
To teach employees how to recognize and respond to security threats
To promote a culture of security within the organization
To document and respond to security incidents
To reduce the risk of security incidents caused by human error
What is the role of access control in personnel security
To restrict access to sensitive areas
What is the purpose of a pre employment screening process in personnel security
To determine an individuals potential for misconduct
Which of the following is not a method of personnel security
Incident response
Which of the following is not a factor considered during personnel security clearance
All should be considered
Criminal history
Financial stability
Education qualifications
What it is necessary to question a witness about sexual deviation all of the following should be avoided except
Allow the witness to frame the testimony in his or her own word
What is the primary feature of PEACE model of interviewing
Empathy and rapport building
What is the primary goal of personnel security
To ensure the safety of employees
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Application form, pencil and paper tests, performance-simulation tests, interviews
Which of the following is not a best practice for personnel security
Regularly updating security clearance records
Implementing access control measures
Conducting background checks on visitors
Which of the following is an example of a personnel security control measure
Access Control Systems
Security Cameras
Encryption Software
What is the primary goal of background checks in personnel security
To verify employment history
To assess an individuals character
To identify potential security risks
What is the purpose of security clearances in personnel security
To grant individuals access to classified information
To assess an individuals trustworthiness and reliability
To restrict access to sensitive areas
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
What is the purpose of Non Disclosure Agreement (NDA) in personnel security
To protect sensitive information from unauthorized disclosure
To establish a legal contract between an organization and its employees
To ensure the confidentiality of classified information
What does the term personnel security refer to in the ASIS CPP domain
Security measures for employees and contractors
What is the primary goal of personnel security screening
To identity potential security risks
A narcotic addict is sometimes called
A hophead
What is the primary advantage of using a multidisciplinary team in investigations
Broader range of expertise
Which of the following is not a measure to protect against social engineering attacks
Implementing strong access controls
Conducting regular security awareness training
Verifying the identity of individuals before granting access
In the context of personnel security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
What is the purpose of a security awareness training program in personnel security
To educate employee about potential security threats and best practices
To ensure the safety of employee
To protect sensitive information
To prevent unauthorized access to facilities
Which of the following is an example of a personnel security violation
Unauthorized use of company resources
Unauthorized disclosure of classified information
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
Which of the following is not a type of personnel security clearance
Public
Which of the following is an example of a personnel security vulnerability
Lack of background checks for employees
Which of the following is a potential consequence of personnel security breaches
Financial loss
Decreased employee morale
Damage to company reputation
Which of the following is a responsibility of individuals in personnel security
Reporting Security incidents
Adhering to security policies
Protecting sensitive information
What is the purpose of a security badge system
To identify and control access for employees and visitors
Which of the following is not a typical step in the investigation process
Closing the investigation without reporting
Which of the following is not a potential risk associated with personnel security
Cybersecurity vulnerabilities
Which of the following is not a step in personnel security process
Social media monitoring
What is the primary goal of internal investigation
Identifying policy violations
Which of the following is a common method used in personnel security screening
Background checks
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures
Which of the following is an example of a personnel security policy
A set of guidelines for managing employee security
What is the role of security awareness training in personnel Security
To educate employees about security policies and procedures
To promote a culture of security within the organization
To reduce the likelihood of security incidents caused by human error
What is the purpose of personnel security
To protect the organizations physical assets
To ensure the safety of employee
To prevent unauthorized access to sensitive information
Which of the following is a potential risk to personnel security
Insider Threats
Social Engineering attacks
Unauthorized access
Which of the following is a best practice for managing personnel security risks
Regularly reviewing and updating security policies and procedures
Conducting thorough background checks for all employees
Implementing a comprehensive security awareness training program
Which of the following best describes a security incident log
A records for all security related incidents and actions taken
What is the primary function of access control in personnel security
Restricting unauthorized access
Which of the following is not a personnel security control meassure
Encryption technology
Which of the following is not a factor considered in personnel security
Criminal history
Financial stability
Educational background
Which of the the following is an example of a personnel security control
Security awareness training
What is the primary disadvantage of using open source intelligence in investigations
Legal and Ethical considerations
Which of the following is not a potential threat to personnel security
Natural disasters
What is the purpose of security incident reporting
To document and respond to security incidents
What is the purpose of root cause analysis in investigations
Identifying the underlying reasons for an incident
Which of the following is not a requirement for obtaining a personnel security clearance
Credit check
Which of the following is not a common personnel security control measure
None of the above
The below points are the common personnel security control measure
Background checks
Security clearances
Physical access controls
The cardinal rule in management of transportation concern is that those assigned to line hauling duties must be
Of the highest integrity
Which of the following is the primary purpose of an investigation
To determine the facts of an incident
Which of the following best describes the concept of least privilege
Granting employees the minimum access necessary to perform their duties
Which of the following is a key benefit of using digital forensics
Ability to recover and analyze electronic evidence
Which of the following is an example of a red flag during pre employment screening
A history of employment gaps
Which of the following best describes the primary purpose of personnel security
To protect an organizations human resources and ensure their safety
Which of the following best describes the concept of dual control
Requiring two or more individuals to complete a sensitive task
What is the role of security audits in personnel security
To evaluate and improve security measures
Which of the following is not a benefit of personnel security programs
Increasing operational costs
Which of the following is a key element of a personnel security investigation
Interviewing involved parties
The principle of unity of command is most relevant to which aspect of investigations
Organizational structure
What is the purpose of a personnel security policty
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
Which of the following is not a typical step in the evidence collection process
Manipulation
What is the purpose of a personnel security program
To ensure compliance with legal and regulatory requirements
To protect against unauthorized access to sensitive information
To mitigate the risk of insider threats
Which of the following is an example of physical security measures
Security Cameras and access control systems
Which of the following is not a standard step in the investigation process
Marketing
Thefts of this nature are held to be impulsive acts committed by persons operating alone who pick up an item or two that is readily available when there is small risk of detection
Theft of opportunity
Which of the following is a key element of a personnel security program
Background checks
Which of the following is an example of an insider threat
An employee who misuses access to sensitive information
What is the role of a security incident management team
To prevent security incidents from occurring
To respond to and manage security incidents
To investigate and resolve security incidents
Which of the following is an example of a personnel security measure
Background checks
What is the purpose of personnel security policy
To establish guidelines for screening and vetting personnel
To define the roles and responsibilities of personnel
To outline the procedures for reporting security incidents
What is the purpose of visitor management system
To tract and manage visitors entering a facility
Which of the following best describes an access control list (ACL)
A list of individuals who are authorized to access specific areas or information
What is the key to effective report writing in investigations
Being clear, concise and objective
Which of the following is not a element of criminal liability
Intention
In a cognitive interview, what is the purpose of the reverse order technique
Witness recalling the incident in reverse order to avoid chances of false reporting
What is the purpose of polygraph test in an investigation
To detect deception
What is the primary purpose of conducting a control hire in undercover operations
To monitor the activities of an informant
Which of the following best describes the term hearsay
Second information not directly observed by the witness
What is the main goal of using the alternative question technique in REID method
To make suspect choose between two versions of events
Which of the following is an example of a physical security control
Security Cameras
Which of the following is a potential disadvantage of a sting operation
Legal claims of entrapment
Which of the following is a key aspect of a personnel security plan
Risk assessment
Which of the following is a potential threat to personnel security
Insider threat
What is the main purpose of a root cause analysis in investigations
Identifying the cause of an incident
Preventing recurrence of incidents
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
Which of the following is a key component of a successful interview
Building rapport with the interviewee
Which of the following is not a potential threat to personnel security
Workplace accidents
Which of the following is not a method of employee monitoring
Job performance reviews
What is the primary goal of personnel security measures
To minimize the risk of insider threats
In the context of personnel security what is the purpose of background investigation
To determine an individuals eligibility for a security clearance
Which is not one of the six principles of executive protection (EP)
Rely on technological resources
The best prevention of exposure to workplace violence isβ¦
A preemployment background investigation program
Methamphetamines belong to which category of abused drugs
Stimulants
The practice of a workplace drug dealer retaining a small amount
of product for his own use to compensate for βcreditβ purchases by the buyer is known as:
Pinching
Verification of applicant-provided information constitutesβ¦
A background check
Physiological craving brought on by chemical changes in the body,
both mental and physical, and characterized by withdrawal if not satisfied, is known asβ¦
Chemical dependency
Which of the following is not one of the three most common
discrepancies in resumes?
Salary history
A shortened duration and decreased intensity of a drugβs effect,
leading to the need to consume larger doses for the same effect, is known asβ¦
Tolerance
What are the two most common cases for drug testing?
Random and Preemployment
Which of the following is NOT a distinctive and important
element of a violence risk assessment program?
Random monitoring
Lysergic acid diethylamide (LSD) belongs to which category of
abused drugs
Hallucinogens
With regard to workplace violence, what are the three levels of
assessment for known aggressors?
Initial, threshold, comprehensive
The abduction of a hostage in order to coerce someone else into
committing a crime is known as aβ¦
Tiger kidnapping
An active search for information that uncovers hidden
information constitutesβ¦
A background investigation
Opium, its derivatives, and synthetic substitutes belong to which
category of abused drugs?
Narcotics
When establishing internal and external complaint and grievance procedures, which of the following procedures should to be included? *
Identification of the root causes
In an armed workplace violence incident, the program assumes that an effective response by properly trained personnel will occur if the perpetrator is not diverted. This means that one of the BEST planned responses should be which of the following? *
Response by correctly trained, armed personnel who will handle the situation.
Like a typical security program, a violence risk assessment program employs which of the following tactics as a countermeasure to a workplace violence incident? *
Diversion, delay and response
If an executive from the organization is kidnapped and made incapable of running the company, the organization can expect three types of financial losses, one of these is:
The executiveβs services will be lost either temporarily or permanently, which can be costly.
Which of the following types of investigations is considered the βmost common type of investigation in many business and organizational settingsβ? *
Incident
What is the function of risk management in relation to asset protection
Manage risk, by balancing the costs and benefits of protection measures
The change in asset protection is increasingly based on what
The principle of risk management
A company investment in executive protection pays dividends by protecting a key corporate asset this is
The executiveβs life and his well being
Over reliance on security technology tends to put the executive in what
Vault
As an EPS, what is the most troubling event
Events that have been known to happen but are unexpected
In asset protection the paradigm shift is in the area of technological development and what
Conceptual shift
When a senior management directs a security manager to perform certain functions, what is the relationship called
Functional authority
Which are the areas in asset protection where there are pattern of changes
Scope of security professional duties
Regulatory environment
Integrated security systems
In the security VS convenience continuum the principal and who decides what tradeoffs to make
The agent
According to the pattern of change in asset protection, what has evolved in the last 20years in workplace violence risk assessment in relation to multi-disciplines
An interdisciplinary workplace violence risk assessment and management process that allows for identification and assessment of individuals, so they can be diverted from violence before they act
A violence risk assessment will assist in differentiating what in the workplace
Between individuals who pose a threat and those who solely make threats
What is the only answer for an employee who have surrendered to a substance abuse
Progressive discipline
For a creation of a drug-free workplace, an absolute necessity is
A written policy, which is practical functional and enforceable
What are the essential difference between alcoholics and social drinkers
Loss of control over the time, place and amount of drinking
Modern management has come to the realisation that their best option to manage employee theft and fraud is what
Preventing losses
Which are the stages in the comprehensive model for handling theft and fraud in an organization
Prevention
Investigation
Program testing
The most frequent and costly form of dishonesty the security professional will encounter in the workplace is
Theft and fraud
An intentional deception for the purpose of unlawfully taking anotherβs property is referred to as
Fraud
Security professionals should focus on identifying what percentage of employees that are responsible for 95% of workplace theft
5%
Who determines workplace violence management monitoring or closeout of the incident
The company
Excluding people from an investigative pool of subjects so as to conserve investigative resource defines what technique
Profiling
What is the job of the first responder in a workplace violence incident
Divert
Violence risk assessment can be broken down into levels of assessment, List them
Initial
Threshold
Comprehensive
An EPS discovered that there is a crisis near the venue of a meeting and decided to take the principal through an alternative route, The EPS is doing what by this
Getting the principal out of trouble
The most distinctive and important elements of a violence policy and program are processes to deal with
Behavioural recognition:
Notification: assessment and
Intervention
A violence risk assessment program must address a variety of workplace behaviours, which are early warning sign that can lead to violence these are
Harassments
Intimidation
Discrimination
Business related concerns to be addressed by violence risk assessment are
Liability
Workplace moral
Productivity
What is considered as the greatest economic cost to an organisation for acts of violence on the workplace
Loss of morale and productivity
Which are the members of an incident management team (IMT) in the comprehensive approach to workplace violence
A senior management representative
A senior security professional
A senior human resource manager
A legal representative who is familiar with labour and employment law
Which are the last elements of violence risk assessment program, which is like a typical security program
Diversion
Delay
Response
What is a major problem attributed to alarm response by the police
High rate of false alarm
In executive protection when the adversary strikes salvation lies where
EPS conditioned response
The long-term solution to each situation of potential workplace violence lies in
Understanding the emotional and mental state of the aggressor and diverting him from violence
Valid violence risk assessment require a depth of information available only for which
Known subject
Rings of protection by EPS are
Outer ring
One or two inner ring
A safe room
In considering the level of outside support that an organization can tap into its violence risk assessment and management program, which of the following is not a problem that the organization should be ready to contend with
Limited law enforcement resources to respond to potential violence in workplace
Limited but growing legal experience in workplace violence management
Limited numbers security service providers that understand their limits or role and capability for providing the board spectrum of resources necessary
Limited number of defensible experts in the psychopathologies and behaviours with violence
What is the responsibility of the background investigator
Validate the truthfulness of applicantβs statements
What is a recommended recruitment method for non-entry technical/managerial positions
Blind-ad
An employer dealing in spare parts is concerned about looses by robbery, burglary and theft of his parts by employees what type of insurance would you recommend
Crime cover
The most important function of the executive protection specialist is
Prevent and avoid danger or dangerous places
The most visible component of executive protection is
Physical acumen
When an executive is travelling abroad what key function should the EPS perform
Learn local social customs
In the U.S the age discrimination in employment act of 1967, protects which age bracket of individuals from employment based on their age
40 years
Which is a major reason why an employer should approach the use of internet information for hiring decision with caution
An employer can potentially face allegations of unlawful discrimination if the online research reveals information that may not be used directly or indirectly or indirectly to limit a personβs employment opportunities
If in front of a venue where the principal was to deliver a paper becomes rowdy and the EPS has to turn back and take an alternative route, this
Avoiding dangerous persons and conditions
The primary source of concern for business in terms of workplace violence incident is
Cost of be proven liable for negligence
Where is the executive most vulnerable
At home
In the future improvement what will lead to a greater understanding of the behavioural cues that signal impending violence behaviour
Assessment
Intervention
Monitoring
For security practitioners which is the most effective means of preventing workplace violence
Early detection
ββThe best predictor of future behaviour is past behaviourββ is in which context
Workplace violence
What cover would you recommend for a facility with high incidents of break-ins resulting in theft and loss of equipmentβs
Crime policy
In an organization were series of missing items are being reported, where do you advice key records of item movement controls can be adequately sourced from
Well developed database
What level of employees would be more concerned with implementation of organizational policies
First line managers
Typically director of security in an organization should report to whom
Senior or executive management (VP)
As a corporate security manager your knowledge that an asset protection program considers not only the major incident cost avoidance, but also assets, or value recoveries that occur in the asset protection operations, will enable you achieve what
Cost-effectiveness
How would an asset protection manager justify request for additional funds for his programs from senior management
Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced
What would be the key components of alternative service providers
Order maintenance operations
When planning for security what should the professional always consider
Culture of the organization
The primary goal of intervention and resolution in a workplace violence incident is
The short-term and ideally long term safety of the identified target or targets
Whose responsibility is it for helping to protect organizational assets
All employees
One major obstacle in the implementation of an effective security awareness program is
Creating employee & management buy-in
A standard of measurement using quantitative, statistical and mathematical analysis is
Metrics
A first line manager is
Supervisor
At what level of violence risk assessment is it determined whether there is an immediate risk of harm for emergency procedures to be activated
Initial assessment
Which level of violence risk assessment provides the basis for the design and implementation of a non-immediate emergency resolution plan
Comprehensive
The security of an organization rest squarely on the practices of who
Employees
One of the most important mission of a security awareness program is
Familiarise employees with the organization policies and procedures
In executive protection program the person who walks, rides and files with the principal providing personal protection is usually referred to as
EP specialist
In the corporate sphere, the best approach to adopt during the pre-planning stage of the executive program
Establish a crisis management team
The choreograph used by the EP specialist to physically move about with the subject is called
Working the principal
An efficient supervisor that is having problem supervising his staff is faced with what problem
Delegation/span of control
The primary purpose of a security awareness program is
Educate employees on how to help protect the companyβs assets and reduce losses
The first action of the IMT if a violent behaviour of an employee was reported
Initiate an initial assessment
What is best described as the implementation of standards and principles that when constantly applied control loss
Security
Modern management have come to realise that the most cost-effective way to deal with fraud in the workplace is
Preventing it
The opportunity for fraud is generally created by
Absence or weakness of internal controls
A coverage intended to guarantee the performance of some obligation by an individual
Surety bond
The management practice that separates the ultimate and operating responsibility for accomplishing task is called
Delegation
The recommended evacuation strategy for an aggressor with firearms in a workplace violence situation is
360 Degrees
What percentage of illicit drug users in the U.S are employed according to a 2006 survey
8.8%
A staff was recognised by his executive of an end of year dinner party, whose theory is being expressed
Herzberg
A strategy in intervention that involves an interview of an aggressor on his own property is
ββKnock and talkββ
A pre-emptive strike against confusion and exposure in executive protection is called
Advance
After ascertaining that there is no immediate danger/harm in a workplace violence risk assessment, what is the next stage
Threshold
What are secondary elements of a workplace violence risk assessment
Diversion
Delay
Response
The most consistent predictor of theft in all industries is what
Employees perceived chance of being detected
Before the paradigm shift early security training and awareness programs were based upon what
Top-down management directive
Passive compliance
An attitude of ββwe do it this way because the book says soββ
What would be necessary to create a job position for a proprietary security officer
Job description
A security director giving direct instruction and receiving same is called
Functional authority
The specific opportunity security awareness program brings to employees in an orientation program is
Explain security obligation for all employees
How can an employer protect against dishonesty of his employee who will handle cash transactions
Fidelity bond
Which are the ample means developed by security professionals to deal with criminal acts in the workplace
Timed safes
Bandits barriers
Lightings
The most distinctive and important elements in a violence risk assessment are
Behavioural recognition
Notification
Assessment
In asset protection the period between major paradigm shifts has been
Decreasing
Management options to handle employees substance abuse problems includes what
Intervention
Progressive discipline
Referral to EAP
A formal social device for reducing risk by transferring the risk of several entities to a single entity is
Insurance
To increase or decrease the coverage of the standard policy is the major purpose of what
Endorsement
What are the elements of most economic crimes
Motive
Ability
Opportunity
The portfolio theory in insurance involves a comprehensive analysis of
Business risk and pure risk
Modern workforce differs from old workforce in the paradigm shift in what ways
Sophisticated
Highly educated
Independent
An employee trust in relation to insurance is referred to as
Fidelity bond
One way to aid a security professional to gain support to start and continue a security awareness effort in the organization is
Use of metrics
Which risk management tool is either proactive or reactive
Insurance
An organizations primary resources is what
People
The best way to recruit a good candidate is
Internal recommendation
Staffing decisions should be made against
Detailed job requirement analysis
In developing a security approach to the asset protection program, what should be the first objective
Deter
Most insurance policies cover only
Direct loss
Insurance is divided in two categories namely
Personal and property
A security system element that will significantly increase the chances of detecting the vulnerabilities and gaps that leads to employee theft and fraud is
Clear organizational policies procedures and practices
Most fraud perpetrators are influenced by what
An opportunity to profit
An EPS by selecting hotels with proven safety reports and plotting for fire escape routes and packing smoke mask wants to achieve what
Preventing and avoiding danger
One way to get support for a security awareness programme is through the use of a standard of measurement using quantitative and mathematical analysis which are examples of potential measurements
Company losses before and after the security awareness program was implemented Number of recoveries and restitution before and after awareness program was implemented
Numbers of persons briefed and the number of briefings per period
Cost of briefings per employee
What is a correct statement about drug users and employment
Most drug users are employed
What is a correct statement about aggressors behaviour in a workplace violence
Unless psychopaths, aggressors typically go through a process of emotional escalation selecting targets that gives them sense of control
The long term solution to each situation of potential workplace violence lies inββ
Understanding the emotional and mental state of the aggressor and diverting him or her from violence
What is essential that the IMT be empowered to do
Commit company assets and personnel to resolve violence incidents
In a workplace violence risk assessment, a restraining or protective order is an example of what
Intervention
The best known form of risk transfer is
Insurance
The theory that premised on the belief that the opposite of satisfaction is not dissatisfaction but simply no satisfaction is promulgated by who
Herzberg
Which are the elements that must occur be present before a fraud or similar crime can occur in the workplace
Perception of a non-shareable problem
Opportunity for a trust violation
A series of rationalization that allows the individual to justify his behaviour as appropriate for the situation
The pocketing of small amounts of incoming invoice payments and the missing cash from previous invoice is
Lapping
Where is the greatest problem and pitfall for private policing (security) industry
Public/supplement
In a conceptual perspective of the security industry, which area focuses on supplementary and enhancing the public safety already provided by public policing agencies
Private/supplement
Public/supplement