PPTX Flashcards
A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?
The span of control is too great
The approach aimed to make employees happy through the provision of benefits, but which fails to motivate employees to produce to their full capacity is called
The Custodial Theory.
In the future, what will define private policing
Contract guards working in public space
A main advantage of emergency lighting is:
Its ability to activate in the event of a power cut.
The recommended night-time illumination level of a self-parking car park is:
1 fc
You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?
Low pressure sodium
A clear zone of how much should separate perimeter fences and internal structures?
50 feet
Which types of sensors are grouped as fixed and rate of rise?
Heat
Which kinds of sensors would not be suitable where there are drafts passing through the detection pattern and nearby railroad tracks?
Ultrasonic
The Theft Triangle depicts which of the following causes of crime?
Opportunity,
Motivation,
Rationalization
Where is an executive most vulnerable?
At home.
According to Kinney, the single biggest deterrent to violence in the workplace is:
Careful hiring and screening
The two types of plastic glazing used in buildings are:
Acrylic and polycarbonate.
What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?
Electronic shuttering
What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?
Automatic gain control
When specifying lighting for indoors precision manual work where good CRI is essential, which of the following will produce the best results?
Incandescent.
Which of the follow relates to Halogen lighting?
Low efficacy; high CRI; instant restrike.
What differentiates public sector COOP (continuity of operations) from private sector BC (business continuity):
COOP entails the movement of critical functions and personnel to an alternate operating site.
When should you use an undercover investigation?
As a last resource
Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?
Microwave
What is the most popular sensor?
PIR
The 3 fundamental components of an intrusion detection system are sensor, annunciator and?
Control unit
What is used to minimize the number of monitors security personnel must watch?
Multiplexers
Which kind of lens is specifically designed to reduce the number of lenses an installer needs to carry?
Varifocal
Oscar Newman
Set out the foundation for CPTED in his work on defensible space
Which of the following limits the number of keys that can be issued?
Master keying
Lighting is a form of
Deterrence
The Psychological Stress Evaluator works on the principle of:
Blood pressure and pulse rate.
Which of the following safes should you recommend to protect encrypted computer back-up media?
150-1
A typical role for the security manager in an emergency management structure is:
The EM Coordinator, responsible for EMPl an maintenance
Logical access control is based on?
Identification;
Authentication;
Authorization;
Accountability
The risk of a hostage coming to sympathize with the abductors’ cause is known as:
The Stockholm Syndrome.
Which of the following would be found in an operating budget?
Maintenance costs for a PPS
What statement is correct with regard to discipline?
All employees require constructive discipline
Which sensors has the lowest NAR?
Dual Tech.
What sensor would you expect to find on windows and doors?
Magnetic switch
What is the purpose of an investigation at the strategic level?
To plan, organize, equip, staff and prepare
For outcomes of corporate investigations
It is advisable to have clear-cut policies on acceptable outcomes.
One IDS installation which makes it more complex for an attacker to disable the entire system is:
Point to point
What is the name given to the risk management strategy of spreading the sites of cash registers in a retail outlet instead of just having one central location?
Risk spreading
Car park employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. Which of the following would be an acceptable alternative?
High pressure sodium or LED
In logical access control, what follows authentication?
Authorisation
Which of the following are recognised search techniques for IEDs?
Occupant, warden, team, high risk
Which of the followings is one of the most effective psychological evaluations in a pre-employment screening program:
MMPI (Minnesota Multiphasic Personality Inventory)
What is the name given to fire sensors that are sensitive to the invisible products of combustion during the early stages of a fire?
Ionisation detectors.
Which kind of evidence degrades with time and temperature?
Organic
What level of lighting is required for a pedestrian entrance?
5 fc
What is the most common kind of sprinkler system?
Wet-pipe system.
What is the most widely used method of controlling physical access:
Locks
Oxycodone is a:
Narcotic
Security managers should
Be as much a business manager as a security specialist
In developing strategy we look:
3-5 years ahead.
The first step in developing a business strategy is:
Understanding the business and where it needs to be in the future.
An organization’s primary resource is its
People
Two common ways of classifying risk, originally coined by the insurance industry, are:
Pure and dynamic
Against what should staffing decisions be made?
A detailed job requirements analysis
The best way to recruit a good candidate is to
Seek internal recommendations
The metrics for evaluating employees should align closely with the organisational strategy.
For example, if the strategy calls for growth, then the metric for mid-level managers may be to grow their business units by a certain percentage.
Realistically, if a company wants to improve margins it has two options. What are they?
Reduce costs or increase price.
Three financial reports or statements have become accepted as standard.
Income statement.
Financial statements are created in accordance with:
GAAP (Generally Accepted Accounting Principles)
What is the underlying equation of the balance sheet?
Assets = liabilities + shareholder equity
Which of the following are considered cash equivalents on the Balance Sheet?
Current assets.
What is the primary limitation in financial statement analysis?
It does not consider changes in market conditions
What is the main purpose of a budget?
To provide a financial tool that estimates costs and revenue.
To provide a variance warning mechanism.
To provide fiscal uniformity for the company
A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services, or processes is known as
Standards.
In ISO, the main committee working on security activities is………………….. The committee has a broad scope, addressing security, business continuity, crisis management, disaster management, and emergency response. The committee examines crisis management and organizational continuity related to all types of disasters and disruptions, including intentional attacks, unintentional accidents, and natural disasters. The committee focuses on what an organization should do before, during, and after an incident. The committee also addresses interaction and interoperability between organizations.
ISO/TC 223: Societal Security.
Which is the administrator and coordinator of the US private sector voluntary standardisation system?
American National Standards Institute(ANSI).
What is the operating principle of ISO’s management systems standards?
Plan-Do-Check-Act
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
Those responsible for conducing security awareness programmes for staff should be:
Security personnel in general
The most consistent predictor of theft in all industries:
Is the employee’s perceived chance of being detected
Most fraud perpetrators:
Are influenced by an opportunity to profit.
Which of the following are more likely to be tolerant of internal theft?
Employees with less tenure
Defalcation specifically deals with the misappropriation of trust funds or money entrusted to a:
Fiduciary
Which security system elements will significantly increase the chances of detecting the vulnerabilities and gaps that lead to employee theft and fraud?
Clear organisational policies, procedures and practices.
The Theft Triangle depicts which of the following causes of crime?
Opportunity,
Desire,
Rationalisation
A process for screening job applicants for past trust violations and periodic employee communications that include past case studies are two of many elements in a programme designed to prevent:
Fraud
The greatest on going threat to the survival of a business is:
Internal theft.
What are the most frequent and costly forms of dishonesty the security professional will likely encounter?
Theft and Fraud
An incident reporting system does two things that could not otherwise be done. One is that it provides a history of events occurring to the organization. What is the other?
Provides a basis for professional efforts at asset recapture, recovery or incident reduction or termination.
Many experts agree that the most effective deterrent to internal theft is:
Fear of discovery
The only way an operating function (such as security) can justify continued funding is to:
Demonstrate that the real costs to the enterprise would be greater if the level of support for that activity were reduced
To senior management, what is the primary factor in determining the size or existence of an asset protection programme?
Cost-effectiveness.
Bonds that indemnify an organization in the event of dishonesty on the part of an employee are known as:
Fidelity bonds.
Most insurance policies cover:
Direct loss only.
Insurance is often divided into two categories:
Property and liability
The best-known form of risk transfer is
Insurance.
Whose theory is premised on the belief that the opposite of satisfaction is not dissatisfaction, but simply no satisfaction?
Herzberg.
A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?
The span of control is too great.
The approach aimed to make employees happy through the provision of benefits, but which fails to Motivate employees to produce to their full capacity is called:
The custodial theory.
The job of managing involves 5 basic functions, which are:
Planning,
Organizing,
Directing,
Coordinating,
Controlling.
Success in the management of assets protection depends on the proper balance of three managerial dimensions, which are:
Technical expertise,
Management ability,
The ability to deal with people
The process of scoping out potential loss events is known as:
Loss event profile.
The ultimate responsibility for internal security within a department should rest with:
The department’s line manager
The principle of unity of command may be broken:
During an emergency.
Assets protection is increasingly based on the principle of:
Risk management
Which of the following is an example of an activity that falls within the broad remit of assets protection?
Emergency management
Cash is an example of what kind of asset?
Tangible
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
In the future private policing will be defined by:
Contract guards with proprietary supervisors.
The concept whereby security of an industrial facility is handed by a private contractor is known as
Private substitute
The concept whereby private contractors augment regular police in law and order maintenance in publics areas is known as
Public supplement
Public/private policing partnerships should
Be built around structural and contractual relationships
Whose reports sought to compare the US security industry to public law enforcement quantitatively
Hall crest
What is a significant distinction between public and private policing
Cost
What makes private policing an attractive option
Private policing is inherently proactive
Felson and Cohen postulated that crimes are typically a product of three factor
Motivated offender, a suitable target, the absence of a capable guardian
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue was put forward by
Kelling.
A simplified explanation of why employees steal is:
The theft triangle
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue is more generally known as the:
Broken window theory.
The levels of fear are greatest when there is a concern about both incivility and
Crime
Training for private security officers who provide policing services in public areas should be:
Role/task specific
We find that mental illness
Only rarely plays a key part in assassination behaviours
An executive is most vulnerable
At home
In high risk situations the executive is usually accompanied by
An EP specialist
Five of the key principles that can guide one’s thinking about EP are: realise that anyone can protect anyone; don’t stop to think; keep clients out of trouble; understand the security vs. convenience continuum; rely on brains, not technology. What is the sixth
Prevent and avoid danger
When an EP specialist researches a destination to which an executive is due to travel, this is called
An advance
If a protected executive must travel locally, the ideal arrangement will be to:
Place the executive in a suitable car driven by a trained security driver and accompanied by the EP specialist.
In an EP context, what is meant by the term “sound off”?
In an attack situation, it is the term given when an EP specialist shouts the type of weapon displayed by an adversary and the direction, in relation to the principal, from which it is coming.
Awareness training for executive management should focus on the security programmes benefits and
The reasonableness of the programmes expenses compared to those benefits.
If a supplier is given access to sensitive proprietary information, what should accompany this access
Awareness of security procedures that protect and account for such information
Creating an understanding of the relationship between security and successful business operations is facilitated by
Awareness training for senior management
The value of awareness programs can be demonstrated by
Metrics
We find that most drug users are
Employed
Hashish, marijuana, heroin, and LSD belong to:
Schedule I
What are the names of types of depressant
Methaqualone, Valium (diazepam), Librium
Which of the following drugs causes elevated blood pressure, dilated pupils, increased heart rate, and euphoria
Cocaine
Which of the followings are types of stimulants
Cocaine, amphetamines, methamphetamine,
Methcathinone, methylphenidate (Ritalin),
Which drug is derived from the Peyote cactus
Mescaline
Intervention is the calculated interruption of the destructive behaviour of a substance abuser and those around that person. Which of the following answers best describes the steps that supervisors and managers should take in an intervention
Observe and document performance,
Confront the problem employee,
Interview and discuss,
Document results,
Communicate with upper management,
Follow up.
The condition whereby a user develops an attachment to the use of a substance due to some emotional or personality need of the person is
Psychological dependence
The essential difference between a social drinker and an alcoholic is
A loss of control over time, place and amount of drinking
Drug testing may be carried out pre-employment, on reasonable suspicion, after an accident or injury, randomly, after return to work following a violation, and as a follow-up to treatment. Which type of specimen is analysed most often?
Urine
Which of the following means of preliminary screening of urine analysis is the most common and least expensive
Thin-layer chromatography (TLC)
If the preliminary test discovers a drug or its metabolite, what should then follow?
A confirmatory test should be carried out using a different technology, such as gas chromatography / mass spectrometry (GC/MS)
According to Joseph Kinney, workplace violence includes four broad categories
Threat, harassment, attack, sabotage
According to Kinney, the single biggest deterrent to violence in the workplace is
Careful hiring and screening
An interdisciplinary workplace violence risk assessment and management process is based on
The identification and assessment of individuals so they can be diverted from violence before they act
In relation to workplace violence, complete the following statement: Security programs aim to:
First divert someone from committing an unsafe or harmful act and then, if diversion is unsuccessful, to delay the person’s progress in committing the act until trained individuals are notified and respond to the problem
Business related concerns that a workplace violence programme should address include
Liability.
Productivity.
Workplace morale
Most workplace violence incidents result from
Robberies and similar criminal violence
Only one of the following statements is true. Which is it
Unless psychopaths, aggressors typically go through a process of emotional escalation, selecting targets that give them a sense of control
A comprehensive approach to workplace violence should include the creation of an incident management team (IMT). Which are typically the members of the IMT
A senior management representative,
A senior human resources manager,
A senior security manager, and
A legal representative who is familiar with labor and employment law and litigation
What are the most distinctive and important elements in a violence risk assessment programme
Behavioural recognition,
Notification,
Assessment, and
Intervention by planned disruption.
Complete the following sentence: The long-term solution to each situation of potential workplace violence lies in
Understanding the emotional and mental state of the aggressor and diverting him or her from violence
What should be addressed in a violence risk assessment as, in some cases, they are early warning signs that could lead to violence
Harassment.
Discrimination.
Intimidation
Complete the following sentence: It is essential that the IMT be empowered to
Commit company assets and personnel to resolve an incident
What is the preferred strategy of evacuation
When an aggressor has a firearm on the premises a preferred strategy 360 degrees
A restraining or protective order is an example of
An intervention
The initial interview for a security officer applicant should be with
HR
In non-entry level security staff recruiting the recommended technique is
Blind ad
Security professionals can most effectively convince management of the need for security
By producing a strategic plan that quantifies loss potential
Key to ensuring good relations between security staff and service users is
Training of security officers in expected standards of courtesy, restraint and the use of good judgement
A 24/7 security post at a facility where security officers work 40-hoursweeks requires
4.5 officers
When developing a proprietary or contract security organisation, the first task is to
Perform a job analysis
The required action when dealing with an alcohol-intoxicated employee is to
Bring the person into custody thereby eliminating the immediate danger
The issue of deadly force weapons to security personnel is usually justified……
In a situation where there would be a greater danger to life safety without weapons than with them.
When escorting large amounts of cash:
Firearms may be appropriate
Which of the following is most appropriate to “ranking” security personnel?
To use the terms officer and supervisor for the lower levels, and assistant manager, manager and director for higher levels.
Which of the following models is most often used by security supervisors in their relationship with front-line security officers?
The vertical model.
A model for organisational structure which provides flexibility for one-time needs and for security management to leverage security staff skills for the greater good of the organisation is called:
The network model
The concept of principle-agent is used:
In a hybrid security force in which proprietary supervisors oversee contract front-line officers.
When procuring contract guarding services, which of the following best provides a means of ensuring performance after the contract is awarded?
By developing detailed bid specifications that spell out the requirements, including wages, benefits, and performance expectations.
Which of the following represents a risk of using peace officers in the security team?
Peace officers could be mobilised by the local police chief in the event of a public emergency, thus leaving the site exposed.
Who is first and foremost liable for the individual conduct of security officers
The security officer
Which of the following typically represents the largest cost element in the majority of security operating budgets
Security officers
Managers can better determine post requirements by use of
SOPs
If a security objective requires discrimination among events, persons, circumstances, or physical objects, based on complex and varying criteria, what should be used?
A security officer
Cognitive, psychomotor and affective skills are all aspects that relate to the concept of the:
The necessary human being.
The most important written instructions for the security force are:
Post orders
We find that:
Post orders should be available at each guard post
Which level of security management is the most crucial to front line officer motivation?
Security supervisors
To rectify a situation in which there is poor performance at some guard posts a recommended first action by supervisors is:
To visit each guard post every shift.
To get a full understanding of the requirements of a security post a supervisor should:
Personally provide some post relief when an officer is away.
The process of giving motivational feedback to maintain and improve performance is known as:
Coaching
A continually blank occurrence book is most likely to be an indication of:
Inadequacies in guard training
What is the primary record of significant events affecting facility protection and made contemporaneously by security officers?
A computer-based log into which the security officer types reports into a relational database/Security Log
In any legal proceeding, a security log is
Admissible.
Addressing issues such as low morale, lack of training, poor working conditions and lack of detailed job analysis is intended to lead to:
Vigilant performance
Failure of guards to respond to repeated alarms may be a negative by-product of:
Automation and human monitoring
The theory that emphasises the negative aspects of employee behaviour is:
The McGregor Theory X
Argyris argues that
Traditional organizational principles, structures, and procedures are incompatible with the mental health of employees
Poor air circulation in a guardroom is a problem associated with the
Mechanical environment
In the hiring context, pre-employment screening is fairest and most efficient when it
Uses a detailed list of physical requirements against which the applicant can be measured.
Herzberg’s work motivation theory developed a position that
Motivation comes from work itself and not from those factors such as salary and job security.
When designing a CCTV console, what facet should be incorporated to enhance officer efficiency and maximize the usefulness of the system
Annunciation and delay features, such as the sequential display of several image feeds.
Which is a tool which can help in matching applicants to jobs by examining mental preferences?
Myers-Briggs Type Indicator.
What is the most important aspect of personnel selection?
A face-to-face interview
An effective way to manage security post boredom is to:
Systematically rotate the officers’ duties, at 2 to 4 hour intervals, between fixed posts and roving patrols.
Training for security officers should include addressing the cognitive, affective and psychomotor levels. An example of training at the affective level is:
Understanding the methods and motivations of adversaries
A recommended method of trying to ensure that new employees learn and adopt workplace values is through:
Socialization
Administering discipline is primarily the responsibility of:
The supervisor.
Following pre-assignment training, what method of further development has been found to work well in enhancing security officer performance?
Mentoring.
Personnel costs are generally the largest item in:
An operating (or programme) budget
Three broad criteria that a client should consider when choosing a guarding contractor are i) consistent performance, ii) prompt, efficient and positive response to client concerns, and what else?
Competitive pricing
When engaging contract guarding services, how can disputes concerning acceptable performance best be avoided
By the client producing a clear and precise definition of the scope of work and required standards of performance
Scenario: At Site X, there is a hybrid mix of proprietary and contract security personnel. There is lesser job satisfaction amongst the contract personnel due to the large pay disparities. 99 How should this have been avoided in the initial contract negotiations?
The client should have required the contractor to pay the contract officers a rate equal to the entry wages paid to the proprietary positions
Surgency is related to
Dominance
Smoke detectors are of either the photoelectric or ionization type. The ionization sensor is of particular value for installation in
Areas that might smoulder for a long period, for example electrical equipment in control rooms, switch gear rooms, generator areas, and rooms containing computer systems
If you are looking for new PPS equipment and you know exactly what you want and no detailed design is necessary, the recommended procurement approach is
Invitation for bid
What is the name given to the process of intercepting conversations on a telephone line by capturing the radiating electromagnetic energy which flows in the line, and which does not require a physical connection to the line?
Inductive coupling
Which type of microphone operates as a loudspeaker in reverse, and which is very popular as an eavesdropping device because it requires no power source and is usually quite small, making it relatively difficult to detect
Dynamic microphone
Proprietary information is best defined as:
Intellectual property which, in some special way, relates to the status or activities of the possessor and over which the possessor asserts ownership.
What best describes proprietary information
Information relating to the structure, products, or business methods of the organisation
What is the main cause of proprietary information loss:
Due to the failure to establish and maintain effective control systems
Who, typically, determines the classification level of sensitive information?
The originator of the information
Access to internal information should be restricted:
To company personnel or others who have signed a nondisclosure agreement
What is the name given to the portable microwave transceiver used to locate electronic eavesdropping devices by detecting the semi conductor components—the transistors, diodes, etc.—which comprise their electronic circuits?
Non-linear junction detector
At what stage of a PPS project should the project team begin to develop countermeasures?
During the conceptual design phase of the overall planning and assessment phase
When using in-house resources for TSCM inspections, what best represents the necessary criteria?
At least one qualified employee is dedicated to the task on a full-time basis, and the proper instrumentation for the needs of the organization has been purchased.
In developing an emergency response structure, what is the most consideration?
A totally new organization should not be developed to handle emergencies.
Such problems should be handled by the existing organization, temporarily reconfigured, along with executives responsible for the day-to-day operation of the enterprise
In the event of an emergency, who should be responsible for equipment shutdown
Those familiar with the process
What are the featured of public sector emergency planning?
Mitigation,
Preparedness,
Response, and
Recovery
What are the three words that summarize what to do in the event of an earthquake
Duck, cover and hold
The Weingarten rule
Established the right of a bargaining unit employee to be assisted by a union representative at an investigatory interview to which the employee has been summoned by management, when the employee reasonably believes that disciplinary action may result from the interview
What is the name given to an accusatory meeting between an investigator and a person suspected of committing a crime or act of misconduct?
Interrogation
In general, when investigating which of the following should be interviewed first
Persons who are likely not to be around
Compared to non-abusing employees, employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file how many times as many workers’ compensation claims?
Five
This schedule of drug or substance has a high potential for abuse and currently has no accepted use in medical treatment in the United States. Examples are hashish, marijuana, heroin, and lysergic acid diethylamide(LSD). What schedule is it?
Schedule 1
What types of drug is Methaquadone
A depressant
After alcohol, which is the second most common drug of abuse in the workplace
Marijuana
Drug testing is a scientific examination of a biological specimen for the presence of a specific drug or its metabolite. The type of specimen analysed most often is:
Urine
Under which circumstances would an undercover investigation be prohibited
Unions are agitating and planning industrial action
In the context of undercover investigations, what is meant by the term “coldhire”?
The investigator applies for a position and is processed just like any other applicant
The design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means – a crime prevention theory grounded in environmental criminology – is known as:
Crime Prevention through Environmental Design.
The Big Five model of personality categorises personality traits into one of five types: Surgency Agreeableness, Adjustment ,Conscientiousness and Openness to Experience. Which best describes Surgency?
This refers to leadership and extroversion
The C.I.A. triad is an abbreviation that is used to determine the security requirements of Information Systems (computers). What does the letter A stand for?
Availability
Acoustic glass break detectors can be installed on walls or ceilings. Detection is best when installed:
On a wall opposite the protected glass.
What is the name given to the simple tool that uses detection, delay, response and communication values to determine what the effects are on these values when the physical security parameters are changed?
The EASI (estimate of adversary sequence interruption) Model.
When project managing the implementation of new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment (and models) he/she requires the correct type of specification should be:
Request for Proposal
What is the preferable approach to budgeting?
Top down and bottom up
Where would you expect to find all on going non-salary expenses
Sundry expense budget
In a study by John Clark and Richard Hollinger, it was generally accepted that every employee is tempted to steal from his employer at one time or another during his career, based on:
The opportunity to steal
Emergency management has three primary objectives, as follows:
Minimise probability of a threat or emergency,
Minimise impact,
Recovery and resumption
What is considered the most critical aspect of an investigation?
Interviews.
What is the primary purpose of an internal private sector security investigative organisation?
To protect the interests of the employing enterprise
The primary purpose of a background investigation is to prevent losses and:
Mitigate damages
Explosions may be:
Mechanical, chemical, or nuclear
If you, as an executive protection specialist, are walking with a principal and you encounter a street demonstration ahead, what would be the best action?
Remove the principal from the immediate danger by trying to leave the area in a car.
What is the primary objective of assets protection?
To manage risks by balancing the costs and benefits of protection measures
It takes as little as 45 seconds to batter a 12–15 inch hole through an eight inch, mortar filled concrete block wall with a 10 pound sledge hammer. How long will it take to breach a 5 inch, mortar-filled concrete block wall with one-half inch steel reinforcing rods?
55 seconds
In the event of the device circuitry of an intrusion detection system, opening, shorting or grounding, what should the system be designed to do in response?
Activate an alarm
Which type of sensor is able to detect objects that are either warmer or cooler against (or when compared to) background temperature, and whose effectiveness diminishes as background temperature approaches that of the intruder?
PIR(Passive infrared)
Human beings and dogs have the same basic senses, but some of the dog’s senses are much more acute and developed. Which is the correct list of the senses of a dog in order of importance when used for protection purposes?
Smell, hearing, sight, touch
The greatest protection of corporate assets occurs when the appropriate mix of physical, procedural, and electronic security measures are in place……:
In relation to the value of the assets being protected
Who bears the responsibility to provide the resources needed to enhance the protection of assets?
Senior management
What represent purely intangible assets
Management style,
Worker retention,
Past performance,
Relationships.
What, according to Fennelly, are important tools in crime prevention programmes?
Planning,
Management,
Evaluation.
With generic workplace violence, security programs aim:
First to divert someone from committing an unsafe or harmful act and then,
If diversion is unsuccessful, to delay the person’s progress in committing the act
Until trained individuals are notified and respond to the problem.
For applications in which lighting levels are likely to change throughout the day, which one types of camera lenses would be most suitable?
Auto Iris
What represent the two most important considerations in anew CCTV project, in order of importance?
Camera, lens.
What statements is most accurate with regard to anonymous informants?
Caution needs to be taken with anonymous informants, as they are the most likely to provide false or biased information
When interviewing as part of an investigation, which one of the following is the most important factor of a successful interview?
The ability of the interviewer to establish a favourable rapport with the interviewee.
What are the four elements of physical design?
Territorial definition,
Surveillance,
Building forms,
Compatible building placement
What is the first and most important output of the planning and assessment phase of any security design project?
Basis of design
Which type of light has an extended restrike time?
High intensity discharge(HID Family)
What represents the most appropriate lighting level for cash collection and vehicular access control areas?
5 fc (approx 50 lux).
According to the Reid technique for interviewing, there are at least four objectives of an interview/interrogation. Which are the specific objectives?
To obtain valuable facts
To eliminate the innocent
To identify the guilty
To obtain a confession
The purpose question, the “you” question, the knowledge question, the suspicion question, and the vouch question are all techniques used in the:
Behaviour analysis interview.
In the course of an investigation interview it may be necessary to make a promise to the interviewee. What is the criterion that applies to making promises?
The interviewer must be certain that whatever is promised can be legally performed
What are the characteristics of a post order?
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy-to-understand terms.
Orders are indexed in detail
In the US, there are three classification of evidence that the courts will consider. They are:
Direct,
Real,
Circumstantial.
What is the cyclic operating principle of ISO’s management systems standards?
Plan, do, check, act.
What is the general rule when sending away a computer for forensic examination?
Submit only the central processing units and the internal and external storage media.
What is often the greatest security threat to the flow of commerce?
Theft and fraud.
To what does the following definition refer: Set out in writing by a business unit’s top leadership. It does not focus on day-to-day operations but provides a general direction, and is the fundamental template for decisions that define and support long-term goals:
The organisational strategy
Defining a security problem involves an accurate assessment of three factors, as follows:
The loss event profile,
The probability of those threats becoming actual loss events, and
The effect on the assets or on the enterprise responsible for the assets if the loss occurs.
You have need to interview a retail employee suspected of not ringing up items in a cash register. What kind of interview would you undertake?
Investigatory interview.
In CCTV systems coaxial cable is commonly used and is generally sufficient for analogue cameras transmitting up to a distance of how far without signal amplification?
1000 feet
The most important aspect of a successful interview is:
Rapport
In investigative interviewing, if a suspect uses harsh, realistic words such as steal, rape, kill, rob, or stab, this is often an indication of
Truthfulness.
In general, effective executive protection requires rings of protection. What best conceptualises this?
An outer perimeter,
One or more inner perimeters, and
In some cases a safe room
One personality assessment designed to gain a better understanding of a person’s weaknesses and strengths, and which is based on four sets of mental preferences, is called:
The Myers-Briggs Type Indicator.
What are the underlying concepts in relation to CPTED (Crime Prevention through Environmental Design)?
Improve the quality of life by deterring opportunities for crime and
Reducing the fear of crime. As such,
It also supports an improved security/asset protection
Posture and security awareness for the organization and/or facility where it is implemented.
There are several theories and assumptions which have been made and accepted about human behaviour, motivation and morale. Douglas McGregor’s Theory X and Y are amongst these. Which of the following describes a possible attribute of a Type X person?
No initiative and does not accept responsibility
A basic problem with fully implementing community policing involves there sources and personnel levels associated with these tasks. That challenge may lead public police to:
Transfer tasks to, or supplement their strength with, private security personnel.
Assuming that security officers work 40 hours a week, each post that is staffed 24 hours a day, seven days a week, and compensating for sick, vacation, and holiday leave, requires how many officers?
4.5 officers
A common way of classifying risks (especially in the insurance industry) is by dividing them into pure and dynamic (aka business or speculative) risks. Which of the following is an example of a pure risk?
Labour shortage
The real value of cost-effective data gathering comes in:
Making periodic cumulative reports to senior management
Fences, including gates, constructed entirely of barbed wire intended to discourage human trespassing should not be less than
7 feet in height, plus a top guard.
The most important activity for an undercover operative is:
Learning the job and becoming familiar with surroundings
Ultrasonic sensors are usually limited to indoor applications where types of movements are less varied than those found in
Typical exterior environments
The most popular door sensor is known as a:
Balanced magnetic switch
In the event of a large-scale disaster incapacitating so many board members that a quorum is no longer possible, a suggested method for emergency management is:
For board vacancies to be filled by the remaining board members
In a very sensitive situation, what method is typically used to shield electromagnetic energy from information processing devices from interception?
Faraday cage
In developing an organisational strategy, what is the first step?
To understand what the business currently entails and where it needs to be in the future
After employees, which is the second most valuable resource?
Corporate knowledge
The efficiency of the security force depends primarily on the:
Adequacy and skill of its supervisors
What is the most effective management style for a supervisor?
To acknowledge credit for good performance and be objective when noting deficiencies.
Insurance is often divided into two general categories:
Property and liability.
Barriers are commonly used to discourage three types of penetration
By accident,
By force, and
By stealth.
Perhaps the most common shortcoming in the security industry is
Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisory training)
For a security professional, which of the following demonstrates a recommended way to calculate the Return on Investment (ROI)?
Avoided losses plus recoveries made, divided by the cost of the security programme
Who should be responsible for escorting visitors on site?
Whoever invited the visitor.
The management practice that separates the ultimate and the operating responsibility for accomplishing tasks is known as:
Delegation of authority.
The manifestation of an ability of intent to affect an asset adversely is defined as a:
Threat
The employee theft formula includes:
Motivation
Opportunity
Rationalization
The number of subordinates that can be effectively managed by one manager is known as the
Span of control
Estimate of investments needed in property, buildings, and major equipment
Capital expenditure
The lighting levels for an open area car park and an employee entrance, respectively, are:
2 FC and 5 FC
The job of managing involves 5 basic functions. They are
Planning
Organising
Directing
Coordinating
Controlling.
Another term for a capacitance sensor used to protect a perimeter fence is:
Electric Field
Which kind of lock finds continued application in such varying situations as desk, cabinet and locker installations, bank safe deposit boxes and U.S. mail boxes?
Lever lock
Which wall fabrics is the most resistant to bomb blast?
Thick, reinforced concrete walls
What is the minimum thickness of a 4-hour fire resistive vault with reinforced concrete walls?
8 inches
Vaults which are designed to protect large amounts of negotiable, valuable or sensitive information against forced entry should have reinforced concrete walls of what thickness?
12 inches or thicker
Which classes of safe is specifically designed to protect its contents against attack using cutting torches, but not explosives?
TRTL-30
Which classes of safe is suitable for the protection of magnetic media against fire?
125-4
Which types of lamp has a typical re-strike time of 10-20 minutes?
Mercury vapour
This kind of sensor may be utilized in outdoor applications as well as indoors because it is not generally affected by heavy fog, rain, snow, sleet, air turbulence, drafts, noise, temperature extremes or atmospheric disturbances. When utilized for area protection, the wave pattern is designed to flood a room or area being protected. When used for perimeter protection, a narrow beam is directed around the area or zone to be protected. What is it called?
Microwave
This type of sensor is a large electrical condenser that radiates energy and detects change in the capacitive coupling between an antenna and the ground. In a typical installation, a sensor wire is connected to an object to be protected, such as a safe or file cabinet. What is it?
Capacitance
What are the benefits of a business impact analysis
Identifying legal, regulatory, and contractual requirements for the organization’s activities and resources
Identifying the potential impacts over time of disruptions resulting from uncontrolled, non specific events on the organization activities and resources
Evaluating resource requirements, activity, and external interdependencies to resume operations within the recovery timescales identified
What is the name given to glass which is heat-treated to resist breakage and can be utilized for both safety and security purposes, but which is not as resistive, however, as laminated glass?
Tempered glass
What is the name given to a plastic or polyester film available in a variety of shades, that is applied to the interior surface of glass, and which has a life up to 10 years and does not deteriorate significantly?
Cement on plastic
What abused drug in large doses intensifies the user’s high but may also lead to bizarre, erratic, or violent behaviour, along with tremors, vertigo, muscle twitches, paranoia, or a toxic reaction, with some users reporting restlessness, irritability, and anxiety?
Cocaine
If somebody suffers changes in perception, thought, and mood, experiences physiological effects including elevated heart rate, increased blood pressure, and dilated pupils, with sensory effects that include perceptual distortions and psychic effects that include disorders of thought associated with time and space, what type of drug is most likely being abused?
Hallucinogen
Insurance is a form of risk
Transfer
What is the name given to the drug which comes from the peyote cactus, and certain mushrooms?
Mescaline
What is the name given to the unusual condition whereby kidnap victims form an emotional or sympathetic bond with their abductors?
The Stockholm Syndrome
The way to detect individuals who are destabilized and seeking control is to:
Assess their mental and emotional levels along a continuum of violent behaviour and then develop a plan to divert them from violence through a case-specific use of
Communication,
Company resources,
Community resources, and
The legal system
Policies and programs dealing with inappropriate workplace conduct, including harassment, intimidation, and discrimination, should be seen as:
Related to the violence risk assessment program because in some cases such behaviours are early warning signs that can lead to violence
When is a vulnerability assessment performed?
After the threats and assets are defined
What should be specifically developed during an advance?
Law enforcement contacts
To what does the following definition refer? Used to detect lying during the course of an investigation. A device used as a lie detector. It records voice stress as questions are asked. It has no hook-up, so can be used covertly.
Psychological Stress Evaluator.
When reviewing applications for employment, all gaps in employment or life history of more than what duration should be investigated?
1 Month
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system.
Argvris
This theory holds that two worker models can be contrasted. Theory X contends that workers are inherently lazy and tend to avoid work. They lack creative ambition, must be goaded, require constant supervision, and are motivated by fear. Theory Y states that workers are naturally motivated and want to work hard and do a good job. It assumes that workers are thoughtful, eager to perform well, and willing to be guided and taught. Whose theory is it?
McGregor
What is the name given to the document that is composed of three elements: functions of a job, responsibility and authority vested in the job, and relationships of the job?
Job Description
In the course of an investigation, what is profiling used for?
It is used to exclude people from an investigative pool of subjects so as to conserve investigative resources
When recruiting, to deal with the many resumes that may be submitted in response to a public listing, staff must filter the resumes and invite only the most viable candidates for an interview. One recommended way to reduce this labour is:
To hire external recruiters.
Staffing decisions should be measured against a detailed:
Job requirements analysis
What type of advertisement is recommended for hiring skilled, technical and managerial (non entry-level) personnel?
Blind ad.
Fill in the missing word(s). ………………. are based on standard operating procedures (SOPs),which should be site-specific. The SOPs are a compendium of procedures for the security group to follow in day-to-day operations. They may also include emergency response procedures
Post orders.
What is the primary limitation of financial statement analysis?
It does not directly consider changes in market conditions.
This statement summarizes an organization’s investing and financing. The report’s underlying equation is as follows: assets = liabilities + shareholder equity. What is it called?
Balance sheet.
Strategy is management’s effort to focus resources on specific targets that lead to business success through proper planning. A financial strategy is:
Management’s financial approach to determining the expected returns of its investments (including its departments and operations) and estimating and managing the relevant risks.
Complete the following sentence: The time has come to:
Institutionalize coordination and cooperation between security and police personnel through structural and contractual relationships
According to the formula by astronomer Marquis de Laplace, when events are independent of each other, the probability of their simultaneous occurrence is the product of their separate probabilities. Which of the following sentences best illustrates this?
The probability of one detection system in the security system being circumvented is high, but the probability of all the detectors and barriers in an in-depth or redundant security scheme being compromised is very low.
What is the most important measure for loss impact (or criticality)
DOLLAR
A security countermeasure should be planned if the loss event will produce an actual loss, measurable in some standard medium such as dollars; and:
The loss is not speculative in the sense that non-occurrence of the event would result in a gain.
Which type of bond requires that an employee(s) be investigated to limit the risk of dishonesty for the insured?
Fidelity Bond
What is the name given to the crime prevention strategy that uses psychology, architecture, and other measures to encourage desirable behaviour and discourage undesirable behaviour?
CPTED
The most consistent predictor of employee theft is?
Employee’s perceived chance of being detected
Oscar Newman argued that physical construction of a residential environment could elicit from residents behaviour that would, itself, contribute in a major way toward their security. What did he call this concept?
Defensible Space.
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system
Argvris
In an emergency which answer best describes the person responsible for initial implementation of the plan?
The senior manager present on site
One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers. Liability is obvious when the weapons are issued to:
Proprietary officers.
Which terms best describes: “To prevent confusion during an organised effort, no subordinate should report to more than one supervisor”?
Unity of Command
Employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. What would be an acceptable alternative?
LED
Which of the following is correct in relation to lighting levels?
Detection 0.5 fc
Recognition 1.0 fc
Identification 2.0 fc
When specifying lighting for indoor precision manual work where good CRI is essential, which of the following will produce the best results?
Incandescent.
Lighting is a form of:
Detection
What gives the greatest reflectance?
Glass
You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?
Low pressure sodium
Coaxial cable is limited to transmitting analogue video signals over distances of:
Less than 1,000 feet.
Which kind of lens reduces the number of different kinds of lenses an installer needs to carry?
Varifocal.
What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?
Electronic shuttering
What is used to minimise the number of monitors security personnel must watch?
Multiplexers
What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?
Automatic gain control
In a CCTV system, for subject identification to be effective, what percentage of the screen should the subject occupy?
At least 20% of the scene’s width.
Which lens has become the standard for camera and lens design?
The DC/LC lens
Which has the greatest impact on CCTV system performance?
Lighting
If a camera is mounted on the side of a building, 40 ft. from the ground, and the center of the scene is 30 ft. from the building, what is the distance between the camera and the scene?
50 ft
Scenario: You are required to protect a safe during daytime in a room in which there is a limited degree of human movement, although not in the immediate vicinity of the safe. Which sensors would be appropriate?
A capacitance sensor
Which kinds of sensors would not be suitable where there are draughts passing through the detection pattern and nearby railroad tracks?
Ultrasonic
Which types of sensors are grouped as fixed and rate of rise?
Heat
In PIR sensors, detection is based on the difference in temperature between the intruder and the background. This difference is called:
The minimum resolvable temperature
The most common intrusion sensor is:
PIR
The most common type of sensor used to detect intrusion through doors is a:
Simple mechanical switch, using a magnetic reed.
What is considered an advantage of volumetric motion sensors?
They will detect an intruder moving in the detection zone regardless of the point of entry into the zone
Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?
Microwave
Two ways to reduce nuisance alarms on fence-mounted sensors are i) the use of rigid fence posts and tight fence fabric, and:
Installing the sensors on the inner fence of a two-fence system.
Which perimeter sensor types would likely generate nuisance alarms if deployed close to a creek (stream)
Ported coaxial cable.
The 3 fundamental components of an intrusion detection system are sensor, annunciator and
Control unit
Which sensors has the lowest NAR?
Dual tech
Complete the following statement: When a high PD is required at all times and under all expected weather conditions…
The use of multiple sensors is recommended
The three main characteristics of intrusion sensor performance are:
Probability of detection
nuisance alarm rate
vulnerability to defeat.
The 3 core concepts (first principles) of CPTED are:
Natural access control
Natural surveillance
Natural territorial reinforcement
Shipping and receiving areas should be
Separated to the extent possible.
Which crime prevention theory has as its theoretical framework the Rational Choice Theory?
Situational crime prevention
Which crime prevention theory, influenced by CPTED, seeks to reduce crime opportunities in all behavioural contexts, not just buildings and other spaces?
Situational crime prevention
Which concept, developed by Oscar Newman, became the foundation for CPTED?
Defensible space.
What is the name given to the design approach that seeks to reduce crime opportunity and fear of crime through natural, mechanical and procedural means?
Crime prevention through environmental design.
The use of a feature criteria approach to PPS design:
Should generally be avoided
Having more than one cash register in a retail site is an example of:
Risk spreading
A well-engineered PPS exhibits the following characteristics:
Protection in depth,
Minimum consequences of component failure,
Balanced protection.
Why would a compliance-based vulnerability analysis process be inappropriate for assets which are exposed to a high probability of malevolent adversary action and which have a high consequence of loss?
Because in this process the measure of system effectiveness is based on the presence or absence of components, and not the ideal of performance
Measures of effectiveness for an entry control system are
Throughput,
False acceptance rate,
False rejection rate
Key measures of the effectiveness for the detection function are: i) The probability of sensing adversary action, and:
The time required for reporting and assessing the alarm
The major part of a vulnerability assessment is the
Facility characterization
The key factor that differentiates a security risk from a safety risk is:
Malevolence
In considering the adversary threat type, tactics, mode of operations, capabilities, threat level and likelihood of occurrence we arrive at the…
Design basis threat.
What is the name given to the process that establishes a baseline of PPS effectiveness in meeting goals and objectives?
Vulnerability assessment.
The building blocks of a PPS are:
People,
Procedures,
Technology
Threat many be defined as:
The combination of adversary capabilities, equipment, motivation or intent, and likelihood of attack
Asymmetric encryption
Is a method of communicating in a network using two different but related keys-one to encrypt and the other to decrypt
The function of probability and consequence magnitude and imminence is known as:
Risk
Measures the consistency with which the countermeasure achieves its functional objective.
Validity
Recommended actions of a security manager in the departmental meeting are
Set the directions
Establish professional setting
Establish open exchange of information with
subordinates
The fundamental idea behind an information security management system is
Continual improvement
Oscar Newman’s theory is commonly referred to as
CPTED
Primary resource of an organization
People/Employees
Factors responsible for response time to alarm by police
Increasing numbers of alarm users
From a remote location security officer should report to whom
Security manager at the Headquarters
The major reasons for the use of locks and key are
Deter entry
Reduce numbers of guards
Restrict unauthorized access
Prevent surreptitious entry
The difference between interview and interrogation is
The person being interviewed
Advantages of contract security over police are
More flexible use of labour
Richer array of incentive and penalties
More precise allocation of accountability
Less constraint on process more focused on
results
How would an investigation unit get management support for funding
Demonstrate the unit pays for itself
On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility, is what type of alarm transmission
Central alarm
Who uses PCI-DSS
All companies involved in credit card issuance
The general factors to be considered in setting up a perimeter detection involves what
Uniform detection
Combination of sensors
Use of multiple lines of detection
Complementary detection
Continuous line of detection
The cyclic operating principle of ISO management system standard is
Plan-do-check-act
When an executive is travelling abroad the EPS main role is
Learn the key points of local social custom
Budget=capital, salaries and what else
Operational
Main task of the EPS is
Prevent and avoid danger and dangerous places
Why short down during emergency
Speed-up recovery process
The percentage of the total capital system construction cost that is for maintenance and warranty cost is
11%
Individuals who don’t know themselves wanting to conduct secure transactions through a non-trusted channel would use what
Certificate
Which terms are used to describe assets on the balance sheet
Inventory
Accounts receivable
Prepaid accounts
Accumulated depreciation
Cash
Property ,plant, equipment
Another name for business ethics is
Applied ethics
Validity
A verification that a PPS component is able to do what is expected to do and is suitable for the use it is being selected to do
If a light burns for 15,000 hrs. the lumen per watt is its efficacy
150 watts
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
Two types of metal detectors are
Passive and Active
Passing through a sensor’s normal detection Zone without generating an alarm is
Spoofing
There is serious threat to security and fear of attack in a college, the security measure that would be most appropriate to address this situation is
Utilize the spaces and playgrounds in the college and surroundings areas to establish ownership of space
HIPS is
Host intrusion protection system
Reason for conducting pre-employment and back-ground screening is
Prevent loses and mitigate damages
COOP is used by
U.S federal government
A first line manager is
Supervisor
Evidence of truthfulness relates to which specific words
Reference to:
Rape,
Kill,
Steal
The primary limitation of financial statement is
It does not consider changes in market conditions
A sensor that achieves absolute alarm confirmation by combining two technologies is
Dual technology
The general purpose of undertaking of a vulnerability assessment is
To establish a baseline of the PPS effectiveness in meeting goals and objectives
The light that is good for video surveillance is
Incandescent
Accessing a computer remotely by placing malware on it, perhaps while the use is visiting a website is
Hacking
A building generally becomes a ‘‘high rise’’ at what point
Higher that the maximum reach of available firefighting equipment approximately 23 meters to 100 feet
Maslow first hierarchy of needs is
Physiological
In the development of the business continuity (BC) and continuity of operation plan, the most time critical factor of the plan is
To resume critical functions as quickly as possible
The time period when a formal audit of the emergency plan is done is
Annually
The second level UL fire resistant safe will resist fire for what duration
2 hrs
Dynamic element in leadership communication tool in an emergency management program is
Changing of leaders telephone and pager numbers when any of the members is changed
A major resource for pre-employment screening is
Application
Disguising information as to make it unintelligible to protect proprietary information is
Scrambling
The percentage of employees responsible for 95% of workplace theft that requires identification and focus by a security manager is
5%
An information communication attacking agent is
Trojan horse
‘‘VSAT’’ is
Vulnerability self assessment tool
Modern management have come to realize that the most cost-effective way to deal with fraud in the work-place is
Preventing it
A technique of excluding people from an investigative pool of subject, so as to conserve investigation resources is
Profiling
The main advantage of smart card is
Has large memory and high degree of resistance to compromise
The job of the first responders in a workplace
violence incident is
Divert
The time period a switcher automatically switches from camera to camera is
Dwell-time
For each threat, the remaining potential risk after all ISS countermeasures are applied is
Residual threat risk
Business related concerns to be addressed by a violence risk assessment are
Liability
Workplace morale
Productivity
Associated costs
An organization is constantly experiencing break-ins with most occurring at night times , which sensors would be most appropriately use to address this situation
Vibration sensors
The most important in information security is
Management buy-in
The culture of a corporate organization is
A pattern of shared basic assumptions that a group learned to solve its problems
A critical consensus that must be made when operating a JTF from the onset is
Defining critical information
Going after a system by accessing it via normal channels, by exploiting vulnerabilities is
Direct attack
A major interior constituent for a record safe is
Moisture
Inducing a person to commit a crime is
Entrapment
Resolution of a digital camera is measured in terms of
Common intermediate format
A technique adopted in information security that prevents individuals access to the actual data is
Cryptography
What are the assessment levels of a workplace violence risk assessment
Initial
Comprehensive
Threshold
Initiating a general discussion with an interviewee, before direct questioning in order to accomplish rapport can be achieved by using
Hidden persuaders
This is fueling commercial technology theft in many organization
Continued fierce global economic competition
The worldwide internet standard for communication over which network PPS communicate is
TCP/IP
A business specifies its type of product or services and level of quality in a more concrete statement called
Mission
A significant area of vulnerability for U.S national security is constituted by who
Insiders
The use of information system to commit crime is
Cyber crime
When there is an emergency and a company allows others to have access to its facility, this action is
Rapid entry system
The most misunderstood form of investigation is
Undercover
How do you protect most valuable information
Encryption
Professional ethics is meant to serve
Relate to employees in humanistic manner
The type of questioning most appropriate at the primary phase of an interview is
Narrative questions
To aid the security professional to better be positioned to measure his departments effectiveness and report back to senior management is achieved by
An incident reporting system
The second most important decision in the application of CCTV program is
Choice of lens
The broad classification into which information systems countermeasures are divided are
Administrative controls,
technical controls,
physical controls
A popular method of obtaining information from a phone line by eavesdroppers
Inductive/direct coupling
A alarm as a result of equipment failure is
False alarm
The theft triangle consist of
Desire(Needs or want)
Rationalization(Motive)
Opportunity
Removing all the cash from the register in the night to eliminate the opportunity of robbery is an example of
Risk avoidance
The de-facto standard communication mechanism in the corporate arena is
E-mails
The sensor that activates an alarm when an intruder is made to go either towards or away from the field of detection is
Microwave
When developing security incident response plan, the most important element is
The policy document
The best way to reduce internal theft in an organization is
Hire employees with integrity
When planning for security, the security professional should always consider
Culture of the organization
The advantage stored image has over manual photo I.D system is
Difficult to tamper with stored image as its comparable to badge exchange
An interview with an employee who has defrauded the company of a large sum of money is
Interrogation
‘‘Vision’’
Specific description of where the business will be in the long term
The first and most crucial question in defining business purpose and mission is
Who is the customer
‘‘Quality’’
Conformance to customer’s requirement
In emergency plan review, what are considered dynamic information whose review must be accurately
Floor plans
Contact numbers
Key assets
Key personnel
The three ‘‘I’ S’’ that are referred to as the tools of the investigator are
Information,
Interrogation,
Instrumentation
A comprehensive analysis of a business risk and pure risk in the insurance world is
Portfolio theory
The key distinction between safety and security is
Their causes
The performing of an analysis of the potential areas of loss is the first step in good security planning is
Profile
Sensors most appropriate for deployment in an environment with explosive vapour materials are
Passive
Forecasting individual loss event that may occur is the first step in dealing with
Risk assessment
In designing a CCTV application, the security manager should keep what in mind
CCTV is a visual tool of security and should be applied accordingly
The application should dictate the equipment
No matter what, the equipment of the system will become obsolete
If the system is obsolete but still performing, it is because the original application was correctly designed
A driver who will be in haulage handling would require which pre-employment testing
Integrity test
In risk analysis, reducing consequences given the event is
Mitigation
Another name for the shift-supervisor is
First line manager
What are considered as second factor authentications
Biometrics
OTP
Encryption
If a camera is mounted on the side of a building 40ft from the ground and the centre of scene to be watched is 30ft from the building the distance from the camera to the scene would be
50ft
What is the most effective installation parameter for a glass break sensor
Installed directly opposite the protected glass
What is another name for capacitance sensor
Proximity sensor
A test that verifies that a PPS device is on and performing as expected is
Functional testing
Barriers that are always in place and are fail secure is
Passive barriers
The term given to the type of operational access control in a high rise described below is ‘‘An hour or two before and after business hours and possibly Saturday the building main entrance door remains unlocked but tenants are scrutinized closely’
Intermediate
The magnetic stripe medium mostly used in security credential application is
2,500-4000 Oersted
To protect its employees from customers who claims to incur losses and mental negligent injury to them by the employees an organization requires what coverage
Liability insurance
The basic steps in report writing are
Gather the facts
Record the facts
Organize the facts
Write the report
Edit if necessary
The quantity of light emitted by a household bulb rated 100 watts is
1700 lumen
The fundamental template for direction that defines and supports the long-term goal of an organization is
Strategy
The best light for security lighting is
Halogen
The classifications of evidence are
Documentary
Physical
Oral
If a witness sees a driver in an automobile pass through a red light and strike another automobile that had the right of way. The type of evidence this witness will give in a trial is
Direct evidence
The first step in assuring life safety in a high-rise is
Comply with applicable local building and fire codes
A report written in the cause of an investigation that gives the investigator updates and detail leads is
Progress report
The levels of building occupancy in a high-rise are, what
Open buildings
Closed buildings
Hybrid building
. Security lightings serves three main purposes these are
Support the video subsystem
Acts as deterrent for criminal activities
Provide life-safety as lighting pathway
The Human perception of the amount of light that reaches the eye is
Brightness
The extinguisher most appropriate for restaurants hood, ducts, looking appliances in kitchens and cafeteria areas is
Dry/wet chemical
Any delay before detection serves primarily as
Deterrence
An asset protection manager can justify request for additional funds for his programs from senior management by
Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced
The key components of alternative services provider would be
Order maintenance operations
During an interview if the interviewee makes a specific denial this is an indication of
Deception
The quality of an investigation that shows the depth of work done is
Thoroughness
A negative variance between the book count and actual count of various items in inventory in a retail investigation is
Shrinkage
The cornerstone of any investigative decision is
Evidence
The major responsibility of a frontline officer on, duty is
Access control
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
The biggest mistake made when conducting a vulnerability assessment is
Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level.
The advantage of private policing over public police is
Cost of service delivery
This will trigger the destruction of information but will not multiply itself refers to
Trojan Horse
A person who has vision, idealist, and more interested in future and timeless is exhibiting a mental preference of
Intuitionist
In risk analysis, reducing consequences given the event is
Mitigation
In drawing up an awareness training a consideration to make is
Organization business
Every employer’s nemesis is
Time theft
A major enemy of training is
Budgetary limitation
When kidnapped victims form an emotional bond with their abuductors this is
Stockholm syndrome
A four digits pin will allow a trial combination of
10,000
Measures a potential adversary perceives as too difficult to defeats are called
Deterrence
Categories of emergencies are natural and what else
Accidental
Man-made
Natural
The characteristics of old terrorism are
Show discretion and moderation in both selections of targets and means of attack
Organizational structures are predictable
Have political motivation, use violence as a didactic tool
Have traditional motivation
The standard that applies to all organization that hold, process and exchange card holder information is
PCI-DSS
An interviewee who uses very definitive statements during an interview is a sign of
Truthfulness
Important factors in the design of an integrated security system to pin point the best solution are
Anticipated threat/vulnerability
Needs of the facility
Constraints
A protective system is evaluated on the performance and cost-effectiveness of individual measures in doing what
Countering threats
Reducing vulnerabilities
Decreasing risk exposure
What is the most used sensor for intrusion detection
Line/boundary sensor
In an emergency, where the response is by multiple agencies, the incident commander is
Senior representative of the lead agency
The two most common communication frequencies are sound waves and what else
Microwaves /Radio waves
The business impact analysis involves which actions
Identify the organization critical functions
Assess the impact of disaster or emergency on these critical functions over time
Determine other elements of the business on which these critical functions depends
Develop and prioritize recovery strategies
An appropriate approach to create a job position for proprietary security is
Job description
If a large scale disaster incapacitates so many board members a most desirable approach is
The vacancies can be filled by the remaining members of the board
Alarm systems may be communicated on which of the following type of medium
Unshielded pair of direct current (DC)
Arrangement for storing vital records should be integrated into the BC and COOP planning list the indispensable vital records
Engineering data
Customer data
Payroll and personnel data policy
Manufacturing process data
The most important step when preparing to conduct a security survey is
Planning
Measures of return-on-investment are
Time saved
Increased productivity
Reduced employee turnover
Lower liability
Greater customer satisfaction
Gathering information on the layout of a site, the location of key assets, site operations and production capability and the types of PPS components locations by the VA team is called
Facility characterization
The appropriate person to trigger emergency rescue operation if the disaster is on a large scale is
Incident commander
Concerns to an enterprise to be addressed by a violence risk assessment which are business related are all the following except
Liability
Associated cost
Workplace morale
Productivity
A standard that is voluntary and compulsory is
Mixed standard
If an attack is within the reach of the EPS, the action most appropriate is
Cover and evacuate
The objectives of an interview are
To obtain valuable facts
To obtain a confession
To identify the guilty
To eliminate the innocent
In an organization where series of missing items are been reported, a key record of item movement and control can be adequately sourced from
Well developed security incident data base
To measure the effectiveness of the security countermeasures as to show a long-range cost saving to the company’s senior management, a manager should apply what
Efficiency vs cost
An appropriate structure to handle an incident that involves multiple agencies from multiple jurisdictions is
Unified command
In asset protection the period between major paradigm shift has been
Decreasing
In absolute number a High-rise is
23-30 meters
75-100 feet
7-10 stories
Legislation that governs the process of background screening in the U.S is
Fair credit reporting act
Workplace violence management, monitoring or closeout of the incident is determined by
The company
Which information is found in the balance sheet
Company’s operation, financing and investment
Company’s use of profit to increase shareholder equity
Assets and liability mix and how it relates to shareholder equity
The most considered in the planning stage of an emergency management program is
Identifying the key assets of the organization that need protecting
Measures of margins are
Gross profit margin
Operating margin
Net profit margin
If a large scale disaster requires a public safety response, the incident commander is usually
A senior member of the responding agency
This entails the movement of critical function and personnel to an alternative operating site in accordance with a pre-established plan
COOP plan
Modern management has come to the realization that their best option to manage employee theft and fraud is
Preventing looses
An insurance cover most appropriate for a facility with high incident of break-ins resulting in theft, embezzlement, loss of equipment
Crime coverage
An EPS initial reaction to a sudden violence attempt on the principal is
Evacuation
In asset protection the paradigm shift is in the area of technological development and what else
Conceptual shift
The major reason for installing light at the perimeter fence is
Deterrence
A hybrid budget technique is which of the following
Top-down, bottom-up
A type of budgeting technique more likely to be accepted by lower level managers is
Bottom-up
This plan is modified annually, but under what other condition can it be modified before annually
Emergency
Valid violence risk assessment requires depth of information available only for what
Known subject
Financial statements are created in accordance with
GAAP
A management financial approach to determine the expected return on its investment is
Financial strategy
The level of violence risk assessment which determines whether there is an immediate risk of harm for emergency procedures to be activated is
Initial
State the equation of the balance sheet
Assets = Liabilities + Shareholder’s Equity
The primary function of the EPS is
Avoiding dangerous persons and conditions
Evidence of truthfulness refers to what specific words
Steal,
Kill,
Rape
In the most basic sense, the purpose of an interview is
Aid an investigation into the truth
A lighting equipment most appropriate to illuminate a potential intruder while leaving the security personnel concealed is
Fresnel
A lighting source that is least efficient, most expensive and have a short life span is
Incandescent
This is neither an asset nor a liability in the balance sheet
Shareholders’ equity
Which surface have the highest reflectance
Snow
An all important but often missed form of identification in a CCTV program is
Scene identification
The first key concept that must be understood by the asset protection professional, to be able to design a PPS that will meet identified goals and objectives is
System
The most valuable asset of the EP specialist is
Physical acumen
The minimum pounds of force required to separate an electromagnetic lock is
500 Ibs
The first step in risk assessment process is
Data gathering
The theoretical maximum combination for a four-number combination lock is
100,000,000
An exception to a hearsay evidence are
Dying declaration
Res gestae
Banking record
A sensor technology that reduces false alarm rate and detection sensitivity is
Dual technology
When suspicious activity is suspected by an intrusion detection system, a lighting system most appropriate to deploy is
Standby lighting
After the VA is conducted and the VA report is written and analyzed a key principle off this analysis
An initial baseline is established
If you move form a lawn tennis court where the light is bright to a covering or underpass, which lighting source should be applied
Induction lighting
An analysis most appropriate for assets with lower consequences of loss is
Qualitative
A complete collection and range of uncertainties that affect an organization’s future is
Risk portfolio
An analysis of past security incidence and their patterns is called
Trends
Who is more concerned with the implementation of the organization’s policies and procedures
First line manager
A spoken statement regarding a person’s knowledge, which may be direct or indirect and gained through any manner is
Oral evidence
Categories of physical evidence are and what else
Corpus delicti,
Identifying
Associative
Trace,
Tracing
How is residual risk calculated
Threat X vulnerability ÷ countermeasures
Who has the primary responsibility of determining the classification level for information
The owner
What does a retina scan biometrics system do
Examines the pattern of blood vessels at the back of the eye
Most computer-related documents are categorized as which types of evidence
Hearsay evidence
What best describes the ALE calculation
It estimates the loss potential from a threat in a one-year time span
In the PPS what may serve as a first line of defense
Deterrence
When is a security guard best choice for a physical access control
When discriminating judgment is required
List what are considered delaying mechanism
Passive barriers
Redundant scheme
Dispensable barriers
Access controls
Security officers
The choreography for the EPS is called
Working the Principal
The distance of the perimeter to the building inside, if it does not form part of the building is
50 feet
If an earthquake strikes, what to do if inside the building
Stay under a sturdy material
The sensor that emits human energy
PIR
Which sensors are also known as proximity sensors
Capacitance/Pressure mat
The quick ratio is also known as what
Acid test
What you are, what you have, and what you know refers to
Personnel Entry control
Distance required for bomb evacuation
300 Meters/328 yards
Which sensor can detect the presence of a suspected arsonist
PIR
Which are the HID family of lights
High Pressure Sodium
Mercury Vapour
Metal Halide
The first step of an investigator is
Establish rapport
What is the function of the budget in management
Planning
Main function of the EPS
Preventing harm and dangerous conditions
The weight of a safe that require anchoring on the structure is
750 Ibs
The temperature for paper in a safe against fire
350 Deg F
The major interior constituent of a safe resistant to fire
Moisture
The primary purpose of a private sector investigator is
Protect the interest of the employing agency
A first line Manager is
Supervisor
The main motive for intrusion detection deployment
Early warning
What is the cause of the cry wolf syndromes
Nuisance alarms
Which sensor is good for preventing burglary incident
Vibration
What is the secondary function of the physical protection system
Deterrence
Which documents should be kept as separate from the emergency management plan
BC and COOP
Applied ethic is for which in the society
Humanity
Which glass type is strongest against blast
Polycarbonate
The percentage of the scene width for action identification is
20%
What substance acts on the central nervous system and also serves as a sleep inducer or depressant
Alcohol
Which drug is also referred to as ‘‘ICE‘‘
Methamphetamine
What substance drastically alters the user mood, sensory perception and ability to reason
Hallucinogens
PCP (Phencycledine) is often called what
Angel dust
What is the most common drug of abuse in the workplace
Alcohol
The most common prescription drugs of abuse sold at the workplace belongs to which family of drugs
Benzodiazepines
An employee who appears to be more alert, eager to work and productive is a suspect of which family of drugs
Stimulants
Which drug acts on the central nervous system that results in dilated pupils, elevated blood pressure and increased heart rate
Cocaine
An employee who experiences frequent severe mood swings and has trouble getting along with others and thus. Become difficult to manage is a victim of which family of drugs
Stimulants
An uncontrollable repeated use of a drug by an employee is called
Addiction
Overreliance on security technology tends to place the principal in what
Vault
A theory that suggests that the presence of a capable guardian may deter crime is
Routine activity theory
What does the most critical stage of PDCA entail
Identifying and analyzing the organization’s problems
What is perhaps the most frequently overlooked and most difficult to identify and evaluate threats
Inadvertent threats
Which lights are none HID family of lights
Incandescent
Florescent
Halogen
What is the second most commonly used drug in the workplace
Marijuana
Which substance tend to relieve malaise and increase alertness when used in moderation
Stimulant
The retinal scan which uses low intensity light to scan the eyes measures what
Blood vessels patterns
The two types of explosive detection are
Passive/Active
Which substance acts on the central nervous system and also serves as a sleep inducer
Alcohol
What action is taken by an organization to prevent an employee who just gained employment into a competitor’s firm from disclosing proprietary information to his new employer
Non-competitive covenant
What is described as a practical document that is shared with all relevant unit and fairly enforced
Information security policy
What is fundamental to the protection of information
CIA triad
Which sensor will be imparted if the temperature in a room rises by 370C at 11 am in the morning to 550C by 6pm
PIR
Which sensors are best to provide early warning of a forced entry
Vibration sensors
What sensors are best to measure temperature changes in a room caused by the human presence
PIR
Which sensor are best suited for protecting metal cabinets and safes
Capacitance
Which lights have instant re-strike time
Fluorescent
Halogen
Incandescent
Which lights has the highest re-strike time
Mercury vapour
Metal Halide
High Pressure Sodium
What is the first step an interviewer should take to ensure a good session is achieved
Establish rapport
Which measures are covered by a security manager using CPTED
Mechanical measures
Organizational measures
Natural measures
A building considered a high rise would be exposed to which kinds of risk
Fire
Explosion
Contamination of life support system
What is considered the most important aspect of personnel selection
Interview
Which theory believes that punishment or threat of punishment motivates a worker
McGregor’s theory X
Which are the important tools in crime prevention
Management
Evaluation
Planning
What device can be place between the internet and the system one wants to protect
Firewalls
Which kind of attack makes several direct attempts at the password of a system with the intention of compromising it
Brute-force attack
Which lock has the longest delay
Pin tumbler lock
What factor can adversely affect the response time by police to alarms
Increase in the numbers of alarm users
When a company allows another to make use of its warehouse during an emergency, what is in play
Mutual Aid
What does a fire safe rating imply
Ability to maintain a certain internal temperature for the specified period
What model appears to be the future of security management
Proprietary staff supervising contract staff
Which groups of lights are classified as outside lightings
Emergency light
Continuous
Controlled
Standby
Portable
Glare projection
What are the types of locks
Mechanical/Electromechanical
The process of an EP specialist moving around with the principal is
Working the principal
What can be considered as the major cost of workplace violence to a company
Loss of productivity and morale
Which record has in it a documentation of every major security incident on the premises
Security log
What are the major types of line connections
Loop
Point-to-Point
Multiplex
What is the major difference between HIPS and IDS
HIPS is like an IDS except that it operates on a host and protects it from antivirus
What are the types of explosion
Chemical
Mechanical
Nuclear
All gaps in employment history if more than what period should be investigated
30 days (1 mth)
What tool is appropriate to ascertain the reason for an incident, so as to prevent same from reoccurring
Root cause analysis
What tool is appropriate to determine what steps might need to be taken for organization’s capacity to conduct risk assessment to move from current state
Gap analysis
Budget the equivalent of pro-forma invoice, projects future cost and what else
Revenue for a defined period
List what are dispensable barrier
Chemical fogs
Smokes
Irritants
Foams
What are the characteristics of a post order
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple easy-to understand terms
Orders are indexed in detail.
A company investigator who checks the financial records of another company and their history ahead of a planned acquisition is doing what
Due diligence investigation
Difference between a social drinker and an alcoholics
A loss of control over the time, place and amount of drinking
High-rise buildings are generally divided into public Access, Rented Spaces and what
Maintenance space
With whom does ultimate responsibility for shutting down a facility be in an emergency
Those trained/familiar for that responsibility
Which sensors would be affected by the Doppler principle
Microwave
Ultrasonic
The members of the incident management team are
A senior Human resource manager
A senior management representative
A senior security manager
A legal representative familiar with labour and employment laws
The primary elements of violence risk assessment program are
Behavioral recognition
Notification
Assessment
Intervention through
Planned disruption
What are the stages of a behavioral dynamics of workplace violence
First the determination of violence as an acceptance means to establish control and re-establish control
Next selection of targets and location for violence
Then the act of violence can occur
What are the illegal means to acquiring information about a competitor without directly stealing it
Directing an agent to establish a fake business arrangement with a company to learn details of its manufacturing process.
Conduct fake job interviews
Directing an agent to befriend employees of such a company to collect information on proprietary manufacturing processes.
Recruiting an employee of the company to provide information on manufacturing processes.
Performing reverse engineering.
Who would be regarded to use the incident command system
Private and public agencies
What are the elements of the incident command system
Command
Operations
Logistics
Planning
Finance and
Administration
Errors are discovered after an interviewee has given his written statement, what action should an investigator take to address this
It should be initialed with an ‘‘OK’’ written in the margin by the suspect
A balanced system should have what in addition to detection and assessment
Communication/deployment
In the plan-Do-Check-Act operating principle, the check stage involves what
Examination of devised solution to address a company problems
An organization who decides keeping important assets at a separate location is doing what
Risk spreading
Fastening bookshelves and file cabinets to the walls to keep them from falling during an earthquake is
Mitigation
In a high-rise which access type requires credentialing
Closed building
What are the verbal behaviors of a truthful person
Offers unqualified direct, answers
Makes a sweeping denials
Gives spontaneous answers
Offers unqualified answers
Responds to questions in a rational and clear tone of voice
What are the verbal behaviors of a deceptive person
Exhibits an unusually poor, selective, or remarkable memory
Avoids realistic words
Makes seemingly irrelevant comments
Gives delayed, evasive, or vague answers
Offers a specific denial
Whose theory is based on the premise that the opposite of satisfaction is not dissatisfaction but simply no satisfaction
Herzberg
Criticality in an emergency is measure in terms of what of
Financial loss
A,B and C were pooled together from logistics, security and HR for a project and then disbanded, what is this practice
Network Model
What type budgeting technique is when funds are placed only to the extent that planned expenditures are justified in detail
Zero-based
What type of budgeting technique is when the top management appropriates and allocates money to the security department
Top-down budgeting
Testing after installation or upgrade of the PPS is
Functional testing
The only answer for an employee who has surrendered to substance abuse is
Progressive discipline
The space between an asset and an explosive threat is
Stand-off-distance
Protection from a bomb is achieved through what
Distance and cover
A major factor in the design and implementation of security systems and programs is
Organization’s culture
A maintenance that corrects faults and returns the system to operating capacity
Remedial maintenance
What should be developed to ensure that preventive maintenance tasks are performed adequately
Checklist
To ensure that security systems operate at its optimum capability with minimum downtime, is what major goal
Service level agreement
Layers in an asset’s safe guide in relation to protection-in-depth is referred to what
Redundant scheme
What is the greatest exposure to a corporation in terms of loose
Employee misconduct
A chief executive praised a staff performance in an end of year party whose theory is being projected
Herzberg
A colour rendition of 70 to 80 percent is considered what
Good
A coverage intended to guarantee the performance of some obligation by an individual is
Surety coverage
A process that is used to identify an entity’s critical function as to identify the effect of a disaster on those function is
Business impact analysis
A coverage to protect an employer from the dishonesty of employees
Fidelity coverage
What are the components of a mechanical lock
Key/Unlocking device
Tumbler array/Revolving Device
Bolt or Latch
What provides a definitive certification guidance for an organization information assets
ISO 27001/2
The centre piece of ISO 27001 is
ISMS
Which employee would be more appropriate to deploy for a crowd control function and to ensure order in a crowded environment
Extroversive
A scheduled activity to keep the system in good operating condition is
Preventive maintenance
This associates the immediate image capture with a sensor alarm to determine response
Assessment system
A level of violence risk assessment that provides the basis for the design and implementation of a non-immediate emergency resolution plan is
Comprehensive
An illegal acquisition of a competitor patent information is
Industrial espionage
Words, names, symbols or images applied to products to identify their source is
Trademark
Computers on the internet communicate via a protocol called
TCP/IP
An alarm connected by a telephone line to the police/fire station is
Auxiliary alarm
When a supervisor is having problem supervising officers under him is due to what
Span of control
What constitutes cost of goods sold
Cost of creating a product and service
A required guarantee from a contractor to response to site to handle a maintenance is
2 to 4 hours
A property right granted an inventor to exclude others, from making, offering for sale the invention for a limited time refers to what
Patent
What communicates a business functionality and operational methods
Mission
The adaptive capacity of an organization in a complex and changing environment is
Organizational resilience
After assessment of vulnerability and the implementation of countermeasures what is next
Review of effectiveness
Outsourcing of the production of a major component to company X due to security issues and then buying the component from company X is what
Risk avoidance
When access control into a facility is impossible due to bomb threat, what is recommended
Control access to critical assets
In an account department the best practice to ensure proper accounting practice is
Separation of responsibilities
The manipulation of people to get them to do something that weakens their security on the network is
Social engineering
When a drug abuser agrees that they cannot help himself out of the situation an employer best approach is
Referral to EAP
Most common specimen used for drug test in the workplace
Urine
Whose support should the security manager get involved in the final protection measures in a high-rise structure
Owner and
Tenants
A security design program is implemented by who
Security manager
A code used for electro-mechanical locks using timer is
Switch code
A sensor that is activated when the passage of air from the body of a person crosses the line of the protected area is
PIR
A type of advert most appropriate for non-entry technical/professional person’s is
Blind-ad
When presenting information to decision makers with limited time, the security manager can convey his key points in what way
Graphical display
The type of evidence that links a person to a scene of crime is
Associative evidence
Protective barriers against bomb-blast is
Thick reinforced concrete
The historical origin of mug photo shots is
Private agency
A device that record the calls/caller number in a telephone is
Pen register
An analysis more appropriate for assets with unacceptable consequences of loss is
Quantitative analysis
In a facility, when the primary power source becomes non-functional, and the secondary source is utilized, some lamps takes long time to reach full brightness, the best light suited to handle this situation is
Halogen /Incandescent
In an alarm system, contact device means
An alarm is triggered when the contact is broken
The correct sequence of choosing a camera is
ANS
Sensitivity,
Resolution,
Features
An organization that sends an e-mail to an outside organization requires what to protect the e-mail
VPN
If a building wall is made of gypsum plastic, or plywood, the sensor most inappropriate is
Microwave
After analyzing the facility data and conducting a vulnerability assessment and the VA report is written, the next appropriate response should be
Determine baseline risk
If a loose would have a noticeable impact on earnings, the rating recommended is
Moderately serious
To handle frequent reports of stolen haulage item in a distant location, a security manager should apply what
Use intrusion detection system
What are the characteristics of policies in an organization
Policies provide a board description of how operations will be conducted
Policies cover items that organization monitors
Not all policies requires written procedures
Some policies are driven by government regulations
The financial reports that have become accepted as standard are
Income statement
Balance sheet
Statement of cash flow
A wife who continuous to stay in a abusive relationship because of what
Economic assistance
Action taken by a business before, during or after an emergency to minimize the emergency negative impact on the organization’s operation is encompassed in what
Business continuity
The recommended spacing distance between pillars in a chain link fencing is
10 feet
When a grandmaster key is lost, re-keying should start where
From the perimeter to the interior
A report that is often concise, well written and interesting to read is
Structured narrative
An analysis approach that depends on for conformance to specific policies and regulations is
Compliance based
The distance of the outer perimeter fence to the structure inside, if the building itself is not part of the perimeter
50 feet
The greatest problem in an investigation is
Objectivity
When two sensors are logically combined, the probability of detection of the combined detectors is
Less than the probability of detection of the individual detectors
This test measures the numerical perception of a job applicant
Aptitude test
This process should be cost-effective and the most experience component should be conducted last is
Policy on a comprehensive pre-employment screening program
In a simple case…………………report may be the final and opening report
Initial report
The maximum delay time for an emergency exit is
15 Secs
When preparing an initial budget, the percentage of the final bid price, generally allowed as a margin of error is
15-20%
The technique of transmitting several messages simultaneously on the same medium is
Multiplexing
The distance of the outer perimeter to the structure inside if the building itself forms part of the perimeter
2 inch
A report that documents events observed by an undercover operative other than the normal happening in the course of the investigation is
Special report
The alarm that operates from residential location with guards in charge is
Proprietary alarm
The best approach to adopt during the pre-planning stage of an executive protection program
Crisis management team
The percentage of illicit drug users in the U.S that are on full time employment is
8.8% (approximately 9%)
When it is difficult and time consuming to test the entire system at one time, a recommended test is
Limited scope testing
The cornerstone of any construction project is
Drawings
A lighting system that duplicates other lighting systems but depends on an alternative power source is
Emergency lighting
The most valuable asset of the EPS is
Physical acumen
The identification of different components of the PPS and their functionality is
Vulnerability assessment
To mitigate against tailgating in access control, an appropriate measure is
Turnstile
Fire resistant safes will keep the documents inside it safe under a burning fire at a temperature of
350 Degf
Sensors are generally classified into two major categories namely
Passive and active
For resolution that is clearer and can see larger range of colours and high sensitivity, the best recommended for observation or assessment is
Digital camera
Giving motivational feedback to improve performance is
Coaching
What are the secondary elements of the violence risk assessment
Diversion
Delay
Response
When a senior management directs a security manager to perform certain functions, this relationship is
Functional authority
What are the early warning signs that can lead to violence
Harassment
Intimidation
Discrimination
For security professionals, CPTED is a set of management tools targeting what components
Places
Behavior
Design and use of space
A detailed-in-depth examination of all revealing security defences and defensive activity, measured against current and projected risk is
Security survey
Dividing of video images into grid sections is
Masking
For each threat, the remaining potential risk after all ISS countermeasures are applied is
Residual threat risk
The most visible sign of a PPS when you approach a facility is
Uniformed security officer operation
Response force personnel if deployed in a fixed and well protected position are considered elements of the PPS
Delay
The decision to shut the plant in an anticipated bomb attack is taken by
Threat evaluation team leader
The components of a good PPS are
People
Procedure
Technology
In executive protection, when an adversary strikes salvation lies in
Agents conditioned response
A lock recommended for safety and security on an emergency exit is
Electromagnetic lock
A logical method of problem solving in which a comprehensive solution is developed in relation to a problem having several dimension is
System approach
A fully integrated security program blends what into a flexible responsive elements
Architectural
Technological
Operational
An easy going entry control card technology is
Proximity card
The theft triangle concept is
An explanation of why people steal
The function of a guard on patrol duties is
Observation
Applied ethics is to serve
Humanity
The backbone of a security survey is
Checklist
A line transmission technique in which the installation is connected directly to a control by a pair of wires is called
Point-to-point
Sensors are generally categorized into classes of
Perimeter,
Space,
Object
The type of lighting that would best serve for video surveillance if colour rendition is a major consideration is
Metal halide
Using the following scenario, answer questions 845 - 847
A security manager for company X has been asked to oversee the installation of a fire suppression sprinkler system as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization assets. The sprinkler systems is designed to reduce the impact of the fire on the company
In this scenario, fire is considered what
Threat
In this scenario, the sprinkler system is considered what
Countermeasure
In this scenario, the likelihood and damage potential of a fire is considered what
Risk
What volume of sales is required by a company with net profit of 5% to offset a loss of $50
1,000
What will make better chain of custody for an evidence
Evidence collected and marked with a permanent ink by the same
person
A situation where your body cells adjust to the presence of a drug is
Dependency
Lock with the highest delay
Pin Tumbler
What part of the pin tumbler is called the revolving device
The tumbler array or revolving device
What kind of video Camera can be installed at a Jetty bay to monitor activities
Standard lens camera
Perimeter lighting should be installed to face where
Down and away from the protected area
The relationship between private security and public policing offers what advantage
Cooperation
A drug that works on the central nervous system but can also be used as a sedative in little dose is called
Benzodiazepines/Depressant
The type of light used in residence
Incandescent
Type of sensor that emits an electrical energy around the protected object is
Capacitance
Classification of smoke sensors are
Photoelectric and Ionization sensors
What training should be given to workers to help them from contracting infections from body fluids and blood borne pathogens
Disease control/Concept of Universal Precaution
What is the process of evacuation during earthquake
Duck under a sturdy material
Types of spaces in High rise are
Public or Common areas
Rented or assigned space
Maintenance space
This communicates business functionality and operational methods
Mission
Distance between perimeter wall and building if the building is part of it.
2 inch
Margins are
Gross profit,
Operating and
Net profit
Personal entry control is what you have, what you know and what else
What you are
What are based on past performance and projected future performance
Financial decisions
What sensor can detect even outside a gypsum wall
Microwave
CCTV design considers what
Camera,
cable,
monitors
What light is best used for CCTV for good colour rendition index
Metal Halide
A drug that attacks central nervous system and sleepy
Narcotics
Security light that is turned on when suspicious activity is detected is
Standby
Two types of infrared sensors are
Passive/Active
Sensor to protect safe is
Capacitance
Percentage of scene width for action identification is
20%
What temperature would a paper endure in a record safe before it is charred
350 Degf
How do you pick a spent cartridge at a crime scene
Pick it up by the open end using tweezers so as not to destroy any partial fingerprint or other evidence that may be on the outside of the cartridge
The principal was going to a function and en-route there was a crisis and an alternative route was taken, who was responsible for this decision
EP, Specialist
Who is responsible for the implementation of program after design and installation
Security Manager/ safety
The most common mistake of inexperience investigator is
Failure to corroborate evidence
An illumination device deployed in a series that maintain uniform lighting during the hours of darkness is
Continuous
An employee misassembled a device and caused harm to a customer is covered by
Liability insurance
Types of explosive products are
Blast,
Fragmentation and
Heat
Private system in place to guide the implementation of SOX is
An integral reporting system that is non-retaliatory so employee can report suspected violations/Employee Hotline/Compliance Investigation
What is the second greatest threat to an organization in terms of loss
Employees’ theft and fraud
This uses a plain-text mechanism and connects with a control panel, what is
Magnetic stripe card
Types of glass used in security are
Acrylic and Poly Carbonate
A drug test that turns positive when the drug is not present is
False positive
Why is functional Authority only allowed for one step below
To Maintain the Unity of Command
For a woman that runs a restaurant how does she hide her secret sauce recipe and what can her secret sauce recipe be referred to
Trade secret
Which aspect of the Plan –Do- Check –Act deals with total quality control
Check
What are considered account payable
These are accounts on which an organization owes money, e.g. utilities or services acquired under informal agreements
An organization greatest threat in terms of loss is
Competition/Industrial espionage
Questioning approach most appropriate at the primary phase of an interview is
Open-ended or Narrative questions
The use of private security personnel to provide services within public areas is
Public safety policing
How well a company uses financed assets to generate income is
Return on Equity
What is recovery time objective(RTO
The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days
A relationship for an institutionalized coordination and cooperation between security and police personnel should be through what framework
Structural and Contractual
The purpose of a security audit/survey is for
A thorough physical examination of a facility and its system and procedure conducted to assess
The current level of security
Locate deficiencies
Gauge the degree of protection needed
List exterior security lightings
Continuous,
Standby
Controlled,
Portable,
Emergency
Glare Projection
What is the purpose of a vulnerability assessment in a disaster recovery plan
To establish/ identify weaknesses at the facility before the emergency occurs
What is the most common form of workplace embezzlement and what can be done to stem it
Cash disbursement
A separation of duties so that an accounts payable clerk doesn’t have access to add names or delete names to the master vendor files
The second most valuable resource of an organization is
Corporate knowledge
What are considered account receivable
The amount due by customers for goods and services already delivered
A significant loss event occurring thus resulting in a planned activity not achieving its expected outcome will result in what analysis
Root cause Analysis
Borrowing capital to purchase asset that can increase revenue is
Leveraging
A search following a bomb threat most suited for offices and manufacturing sites with little public access is
Occupant Search
What is the required clear zone between the outer environment and the perimeter fence
20 ft
Risk ratios are
Current,
Quick and
Equity
Practices that provides analysis and decision tools that allows businesses to monitor the financial operations is
Financial Management
An evaluation of the suitability of the current process in assessing risk and its sufficiency to manage risk is
Gap Analysis
What is recovery point objective is (RPO)
The point in time to which an organizational activities in a known integral state can be restored from
An employee whose continued performance shortcoming due to drug policy violation should attract what, explain the sequence
Documented progressive discipline such as
Oral warning,
Written warnings,
Suspension and ultimately
Termination
What are work place violence spectrum
Behavioral recognition
Notification
Assessment
Intervention by planned disruption
What are work place violence spectrum
Behavioral recognition
Notification
Assessment
Intervention by planned disruption
Which kind of sprinkler is positioned at the centre of a building against fire out break
Wet pipe sprinkler
How is the brightness of light measured
Lumen
What is the most essential part of the CCTV project
Camera
Security is moving towards the use of hybrid security, what does this entail
Proprietary supervisors (first line managers)
oversee contract front -line officers (Guards)
Security is moving towards the use of hybrid security, what does this entail
Proprietary supervisors (first line managers oversee contract front -line officers)
What kind of lightening have a high re strike time
High intensity discharge family of lamps
What is the problem faced by security department in an organization
Low credibility
The security of an organization rest squarely on who
The practices of employees
The most expensive fee in design is
Projected system construction costs
What is international standard for ISO 27001 and ISO 27002
FOR Management of information security and other information technology
An alarm that sound within a compound
Local alarm
What is the most essential job requirement for a person loading a dock in a shipping company
Direct requirement
An undercover investigator wrote in his report ‘I saw the suspect passed some parcels; containing white substance suspected to be heroine to an employee’ What is wrong with the report
Name of suspect not clearly mentioned
Time of exchange not mentioned
Substance exchange has no validation
Who are the first line of defense in the recruitment and selection of quality and risk-free applicant for the organization
Human Resource Personnel
At what point would you withdraw an undercover agent
When the investigation, has yielded enough information to allow the operative to be removed
This provides a method for evaluating and comparing the value and cost of risk treatment options
Cost-Benefit Analysis
The role of the security investigator in pre-employment screening
Verification of all information provided by the applicant in his signed application
What has historically been associated with reactive, rearwards-looking reviews situations
The use of RCA (Root cause analysis)
How many days period between pre-adverse action and adverse action
60 Days
What is the best cover to adopt when disengaging an undercover operative
When the operative has been named as an offender
If named as a co-offender by enough interviewees
Who developed the concept ‘‘Eyes on the street’’
Jane Jacob’s
What is another name for the cause and effect analysis diagram
Fishbone diagram or Ishikawa Programming
How should the shipping, receiving and warehouse departments be designed
They should be separated as much as possible to minimize collusion and pilferage opportunities
What theory suggest that unmaintained space can lead to the impression of abandonment and increase crime opportunity as no capable guardian is observed
The ‘‘Broken Window’’ theory
To align specific actions with specific risks as a means of leveraging or overcoming existing dependencies, what tool is required
Force field analysis and influence diagrams
What process assess the likelihood and consequences to determine the level of risk and prioritize risk treatments
Risk Analysis
An evaluation of the suitability of the current process for assessing risk and its sufficiency of the current process for assessing risk and its sufficiency to manage risks is
Gap Analysis
What is designed to pictorially show how relative strength of the risk can impact each other
Force Field Analysis
A provision that once an employer obtains consent, consumer report may be procured at anytime during the employee’s tenure without tenure without having to obtain another consent
‘‘Evergreen clause’’ or ‘‘Blanket’’ Authorization
The longest period of time that a critical process can be disrupted before recovery becomes unlikely is
Maximum Downtime
A visualization tool for categorizing the potential causes of a problem in order to identify its root cause is called
Fishbone Diagram
A two-dimensional means of representing the risk level using a matrix showing risk events, defining likelihood and consequences is called
Heat Map
How many days period between adverse and pre-adverse response
3 Days
The Fishbone diagram or Ishikawa Programming is also known as what
The cause and effect analysis diagram
Words, phrase, and graphic symbols are used for protection as what
Trade Mark
You are the team leader of a search team you discovered a computer unit during search, how would you go about it
Isolate
Photograph and
Document the computer system
A type of light to be used when one is coming out of a tunnel is
Induction lamps
What type of cabling is regarded to be used when installing a camera with a distance of 1000ft
Coaxial Cable
A key principle of PPS analysis is
An initial baseline must first be established, upgrades are then considered if the baseline shows the PPS does not meet goals and objective
A budget that generates revenue is
Zero-Based budgeting
When installing a camera with distance of 2,500ft to the control room what type of cable is recommended
Fibre Optics / Type RG-11
Tank fire extinguisher is used for which type of fire
Class B Fire
The process for planning and allocation of money to be used for the year is
Budgeting
How should the undercover report be written
Third Person
What is the most expensive and last stage of the employment process
Back grounding
A key element of an information asset protection risk assessment model is
A thorough study of existing and projected threat
Water pump is best to extinguish which type of fire source
Wood, Papers, Fibers (Class ‘A’ Fires)
Emergencies are categorized as
Natural,
Human and
Accidental Threats
The fire extinguisher used in restaurants is
Dry Chemicals and Wet Chemicals
The process for planning and allocation of money o be used for a year is
Budget
Intent of damage or an indication of something impending is
Threat
An ordered series of actions against a facility which if completed, results in a successful malevolent outcome is
An adversary path or fault tree
What is the primary objective of the logical network access control
To preserve, and protect the;
Confidentiality,
Integrity and
Availability of information system
A technique used to identify the conditions that initiate the occurrence of an undesired activity is
Root Cause Analysis
Deliberately and knowingly making a false and damaging statement about the subject of an investigation is called
Tort of Slander
When considering entries to be used during strike, what parameter should guide this decision
They should be situated so that loss of control by police would produce a public traffic control problem to facilitate the application of more law enforcement pressure promptly
Altering and encoding information in a way that it can only be decoded by whom it is intended is
Encryption
High-rise facility is associated with space challenges in which areas
Public access or common areas
Rented or assigned occupancies
Maintenance spaces
A very expensive type of light with very short life span is
Incandescent light
The possibility of loss resulting from threat event or incident is
Risk
Dry powder is best to extinguish which type of fire source
Gasoline Fire or Class B Fire
How should communication with the press be handled during an emergency situation
Through prepared press releases and oral briefings through a single source in the organization
A type of budget where senior management dictates the figures is
Top-down budget
How should the undercover narrative report be written
Third Person
The duration of a failsafe lock on an emergency doors of High-rise building is
15 To 30 Seconds
When can an emergency door be locked
To practice the use of alternate exits during drills.
The most important consideration in the budget of CCTV installation is
It is best to design the application before establishing a budget
After the design is completed, the cost can be calculated
The lumens of incandescent light is
1700 Lumens
Tank fire extinguisher is used for which type of fire
Class B Fire fuelled by gasoline, flammable liquids
An important aspect of internal human relations as well as public relation during an emergency is
The handling of information concerning casualties
A crime scene investigation is what measure in an investigative activity
Reactive Measure
The investigation report that can be either initial or final is used when
In a simple case
The appropriate time to withdraw an undercover operative is
When He/She has been named as a co-offender or
Before the operation is compromised.
What is a requirement for release of names of those who have been killed or injured during an emergency
Relatives must be informed before such information can be released to the public
What should the undercover keep record of and how often
Make daily reports on his observation and experiences, after each shift
What is the major function of CEO as regards SOX laws
To personally certify financial reports that are released to the public
What is also referred to as a ’’Risk Universe’’
Risk Portfolio
What is the purpose of the undercover operatives report
They are ultimately used to make decisions.
Serves as the basis for post investigation administrative action
List what are considered hard cost due to high number nuisance fire alarms In an organization
Lost productivity for employees evacuating the building
Cost of fire department fines
The investigative capabilities of the public sector is frequently measured in what term
Numbers of arrests and convictions
A company’s effectiveness in using financed assets to generate income is called
Return on Equity
What type of risk method is keeping money in the bank
Risk Transfer
Primary resources of a business is
Its people/Employees
What are the primary elements of incident management system
Command
Operatives
Planning
Logistics
Finance and administration
Avoiding answering questions from the press with the phrase ‘’ No Comments’’ will result to what
Leads to the propagation of rumors, conjecture and speculation from sources with little or no information
What are considered soft costs due to high rate of nuisance fire alarms in an organization
Wear and tear on building mechanical system when alarms activate
Tendency for employees to learn to ignore alarms thereby placing themselves in jeopardy
The potential for staff injuries during evacuation
The frustration of the organizations staff and fire department personnel due to the high number of alarms
In a series of robberies occurring in an environment list two strategies that can be adopted by the public sector investigation
Proactive strategy – Surveillance
Reactive Strategy – Assigning more manpower to solve cases
Which organization model consists of third party suppliers who has been chosen for their expertise and ability to provide quality service to the organization
Shamrock Model
What are the characteristics principles involved in internal theft
Diversion
Conversion
Disguise
Divergence
The expected first step of an executive protection program is
Establishing a Crisis Management Team
The Sarbanes-Oxley Act (SOX) is officially known as what
The public company accounting reform and investor protection Act of 2002
In an organization, these highlights specific goals that the organization wants units to achieve
Objectives
What is the best cover to adopt when disengaging an undercover operatives
When named as co-offender by enough interviewees
Elements of a post order are
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy-to understand terms
Orders are indexed in details
The commonest type of loss in any organization is
Employee theft/Internal Loss
List what records are admissible in legal proceedings as entries made in the regular course of business and are therefore an exceptions to the evidentiary rules against hearsay
Security Logs and Reports
The most outstanding quality of an investigator is
The ability to obtain information from individuals through questioning
Method of recruiting non-entry level staff is
Blind -ad
The most costly item in an security department budget is
Security Officer (Personnel)
What conveys a general understanding of the business, its culture and its future goals
Vision
What is the required time period to inform an applicant about an investigative consumer report on him by the employer
3 Days
Type of light recommended for a residence is
Incandescent/ Halogen
During strike action the standard is to have how many entries
The fewest entries possible consistent with the realistically estimated operating status preferably 2 entries (One-in One Out)
For security professionals planning for a strike should start when
The commencement of the 60days as effective notice of the possibility of a strike
When a receiving dock personnel counts a shipment without knowledge of the stated quantity this is called
Blind-Tallies
In an organization what states objectives and business goals
Vision
The first notice of an intended decision not to hire an individual based in whole or part on a consumer report before it is taken is called
Notice of pre-adverse action
What is designed according to an entity’s risk appetite, risk tolerance, timeframe and return objectives
Risk Portfolio
The longest period of time that a critical process can be disrupted before recovery becomes unlikely is
Maximum Downtime
What serves as the basis for post-investigation administrative action
The Investigation Report
When an abductor develops interest in the victim, this is
Lima Syndrome
The process of removing data on a storage medium before the medium is reused is
Sanitizing
An organization most valuable resource is
Employees
When is a strike by employees considered illegal
The absence of a ‘’60 days’’ notice of intent to modify the collective bargaining agreement
Magnetically erasing a storage medium such as a Hard Drive is called
Degaussing
If an investigator makes a racial statement about individuals involved in a case under investigation what is the recommended
It may be best for another investigator to conductor the interview with the individuals
The potential that a given threat will exploit vulnerabilities to cause loss or damage is
Risk
A complete collection and range of uncertainties that affects an organization’s future is
Risk Portfolio
A person to whom sensitive company information is entrusted is called
Fiduciary
Open/ closed questions @ the beginning of interviews is to do what
To put interviewees at ease
What tool is used to determine how a particular undesired event may occur
Logic diagrams
What is the first step required of an investigator in a due diligence investigation
Examine the issue at hand,
Better still look at the question at hand and determine what is important for the particular problem
What is the critical element in an interview
Ability of the interviewer to establish favorable rapport with the interviewee
To trace an initiating event through a sequence with different possible outcomes, what tool is required
Event trees
What is the key to a due diligence investigation
Understanding the needs of the client and the transaction at hand
The most outstanding quality of an investigator is
The ability to obtain information from individuals through questioning
A search for discarded intellectual property or prototypes from a waste bin is called
Dumpster diving
When should undercover investigation be used
When no other alternatives are available
When the company can reasonably expect return on the investment
You have been appointed as the new security manager of a storage facility where high theft rate is recorded, what is the first step you would take
Setting up shipping, receiving and warehousing as individual departments (SMM 151)
Shipping and receiving areas of the loading dock should be physically separated (PSM 64)
Separate the two functions of shipping and receiving to minimize collusion and pilferage opportunities
List what are sources information asset threat
International threats
Natural threats and
Inadvertent threats
A tool used to determine the basic causes events is
Fault trees
What is the greatest exposure to a corporation in terms of threat outside competition
Employees theft and fraud
An employer failure to conduct pre-employment screening is liable for negligent hiring and
Discrimination
How would foreign competitors criminally seek economic intelligence from U.S industries
Establishing, seemingly innocent business relationships between foreign companies and U.S Companies to gather economic intelligence including trade secrets
What is the second greatest cost in an internal investigation unit
Overhead cost
Types of emergency are natural, accidental and what else
Man-Made
In analog view what percentage of the overall scene width does a subject occupy at the point of recording
20 Percent
What measures can be changed without the tedious review from management before it can be implemented
Procedures
The advantage of private policing over public policing is
The objective of service delivery
What best describes a post order
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple easy-to understand terms
The members of the incident management team are; (1) A senior human resource manager (2) A senior management representative (3) A senior security manager and who else
A legal representative familiar with labor and employment laws
How do you pick a spent cartridge at a crime scene
At the open end using tweezers
Planning for emergency preparedness need to be documented and what
Ensure recovery from business interruption and to protect the profitability of the enterprise
Reviewed and updated regularly
What is the main objective of executive protection
Preventing and avoiding trouble/danger
What has broader scope in the recruitment process
Background investigation or screening/pre-employment screening
Who in the event of high impact emergency is needed to establish the incident management system
Public and private agencies
When should an interviewer observe non-verbal response
Throughout the interview process
How does multiple sensors experience nuisance alarms
Decrease pattern
How is fire resistant safes rated
To indicate the hour of protection and the temperature of the inside of the container can withstand
What is essential in any emergency response
Communication
One company experience theft with low loss but high frequency, another company experience high loss low frequency what type of assessment should be conducted
Qualitative risk assessment
What is field of view
The height or width of the area being viewed, which determines the appropriate focal length of the lens.
What human factors make people commit industrial espionage
Social engineering
What type of questions limits the amount or scope of information that the witness can provide
Closed-ended questions
After the threat and assets are defined, a vulnerability assessment is generally performed to achieve what
Establish a baseline of PPS effectiveness in meeting goals and objectives
What sensor is affected by Doppler principle
Microwave
What insurance should be purchased to protect employees for injury incurred to customers for not properly assembling products
Liability endorsement/liability policy
Typically to whom should the security director report to
Directly to senior or executive management (CEO)
What best describes a strategy
The fundamental template for direction that defines and supports long-term goals
How will management support funding of the investigative unit
If the unit shows value to the organization and demonstrate that the unit pays for itself
What measures tends to remain in place for an extended time once established as it is aligned with the overall business objectives of the organization
Policy
How will the investigative units significantly improve response from management for its funding request
By carefully tracking and managing operational and over head costs
The most common tool for controlling the brightness of an image focused onto a chip is called
Auto-Iris Lens
List deceptive actions exhibited by an interviewee
Significant posture change grooming gesture and cosmetic adjustment supportive gesture
A person who likes to be in large crowd, socialize, like to be in charge
Extrovert
What concept is when a member of the crisis management team is vacant, there will be someone to take over
Alternate designate or member
What does ISO standard propagate
Voluntary standard
What is the two classification of bomb
Incendiary and explosive
During an interview, what responses from a witness tends to be more accurate and promote more effective listening on the part of the investigator
Open-ended response
What is a fundamental tool to most security officers positions
Keys
Who in the organization is most concerned with security activities as its effects performance
First-line supervisor/managers
To access a computer what is essentially needed
What you know (password)
What you have (access card)
What you are (biometrics)
To increase information security IAP awareness what must be done
Develop,
Promulgate and enforce practical policies for IAP
Conduct security awareness and training
When employees are given emergency response training, this training must be
Reinforced and tested with periodic drills and exercise
If an incident of concern is received, the threat management team will first do what?
Evaluate the risk
Threat and vulnerability are sometimes interchanged with what word
Risk
Two types of maintenance are
Preventive and remedial maintenance
Right design and less crime is synonymous with what concept
CPTED (Crime prevention through environmental design)
Vulnerability to defeat involves what
Bypass and spoofing
Absolute alarm confirmation is ideally achieved by combining two technologies, each with a high probability of detection and no shared susceptibilities to nuisance alarms, what sensor replicates this features
Dual technology
Assurance of the management that their partner-company, during emergency will back them up is called
Mutual Aid
Right design of perimeter security
Consistency in detection
The adversary against which the facility must be protected is referred to as
Design basis threat
What are open-ended question
This allows for an unlimited response from witness, in his or her own words, thereby generating a greater amount of unsolicited information
What are the three general methods for valuing assets
Monetary value,
Consequence criteria,
Policy
What is the optimal relationship between police and private security
Institutionalized coordination and cooperation through structural and contractual relationships
What three questions should a risk assessment answer
What can go wrong?
What is the likelihood it could go wrong?
What are the consequences?
Who should be involved in developing a standard
A broad group of stakeholders and interested parties, working collaboratively
What type of specimen is analyzed most often in drug tests?
Urine
Which stakeholder group drives the ANSI standards development process?
Standards users
In Pastor’s public/private, substitute/ supplement model of policing, which cell represents the rarest scenario?
Public/Substitute
What is the principal value of security awareness to executive management?
Awareness of the security program’s financial contribution to the bottom line
What are the elements of a systems approach to developing a physical protection system
Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness
What are the four main strategies of second generation CPTED (Four C’s)?
Cohesion,
Capacity threshold (tipping point),
Community culture,
Connectivity
At what size and how far above the ground should an opening in a building’s shell be protected?
96 square inches and under 18 feet above the ground
What two values describe sensor effectiveness
Probability of detection and confidence level
What are the three ways to measure profit margins
Gross profit margin = (revenue – cost of goods sold – general and administrative costs)/ revenue
Operating margin = EBITA (earnings before interest, taxes, and amortization)/revenue
Net profit margin = net income/revenue
What is the major exterior application of bistatic microwave sensors
Detecting a human being crawling or rolling on the ground
What is the most accurate confirmatory drug test?
Gas chromatography/mass spectrometry
What determines the appropriate focal length for a CCTV lens
The field of view
What are the five pillars of ISO standards
Equal footing of members market need consensus voluntary participation and application worldwide applicability
The first step in the risk assessment process is
Data gathering
What kind of lens has become the standard for camera and lens design
DC/LC (Direct circuit, logic control)
Which two types of lamps take the most time to restart after a power outage
Metal halide and
Mercury vapor
What are the general rules of thumb for lighting levels for detection, recognition, and identification?
Detection – 0.5 fc
Recognition 1.0fc
Identification – 2.0fc
What is the biggest vulnerability of a loop system?
All the detectors in an area could be disabled by interrupting the loop at the proper location
What are the shortcomings of magnetometers
They only detect ferromagnetic materials, so they don’t detect metals such as:
Copper,
Aluminum, and
Zinc.
What bulk explosives detection technology uses pulsed low energy radio waves to determine the presence of nitrogen-rich materials?
Quadruple resonance
What is an effective way of setting the value of line items in a budget
Look at each budget expense as an investment and calculate the expected return on that investment
What technology is considered the gold standard of trace explosives detection but is hampered by high costs, high maintenance requirements, and the need for expert operators?
Mass spectrometry
To be fire resistant, what are the minimum wall thicknesses for 4-hour vaults and 6-hour vaults
4-hour vaults: 12 inches of brick or 8 inches of reinforced concrete
6-hour vaults: 12 inches of brick or 10 inches of reinforced concrete
Above what weight should safes be anchored, according to UL
750 s
What are the three steps in creating an adversary sequence diagram
Describe facility by separating it into adjacent physical areas
Define protection layers and path elements between adjacent areas
Record detection and delay values for each path element
In which type of procurement process is it usual for prospective contractors to submit sealed bids that are publicly opened
Invitation for Bid
In EP, what is an advance?
The process of researching a destination before the principal arrives
What is the range of light sensitivity for standard analog CCD cameras
.005 lux to 10 lux
What is “working the principal”?
The choreography used by an executive protection specialist to physically move about with the principal
What are the three basic stages of addiction
Craving,
Loss of control,
Physical dependence,
Tolerance
What are the four symptoms of alcohol dependence
Increased tolerance to the drug Increases in rationalization, lying Obsession
What is the most accurate preliminary drug test?
Radioimmunoassay (RIA)
How does situational crime prevention differ from CPTED and defensible space
Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.
What business-related concerns should a workplace violence program address
Liability,
Productivity,
Workplace morale,
Associated costs
What is “the second injury?”
Emotional harm to employees caused by unconcerned or callous management in the wake of a workplace violence incident
What is the name for the process by which an employer verifies the experience and qualifications presented by a job candidate?
Credentialing
What are the most challenging problems in international investigations?
Cultural differences
What is one of the most common errors in “friendly” due diligence investigations?
Relying on information provided by the target
What is typically the initial question in an interview?
A request for the subject to relate the events in the matter under investigation
How should obsolete prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reverse engineered
The three methods of sanitizing electronic media
Overwriting,
Degaussing,
Physical destruction
What are the two primary aspects of recovery after an information loss?
Return to normal business operations ASAP and implement measures to prevent a recurrence
What is the difference between embedded and host-based systems
Embedded systems are typically programmed at the manufacturer and run proprietary or nonstandard operating systems, e.g. cameras, card readers, and video converters.
Host-based systems run on more standard operating systems such as Windows and Linux and are easier to change
What is the “A triad” of information security with regard to access con
Authentication,
Authorization,
Auditing/accountability
What are the three types of emergency operation plans?
All hazards,
Standalone (different for each emergency),
Combination of all hazards/standalone
Who should be assigned the role of an organization’s emergency coordinator
Someone regularly responsible for handling emergencies, such as the head of security or engineering
What security measures can help prevent or limit the effect of bombings if sufficient standoff distance is impossible?
CCTV,
Security patrols
When conducting risk identification, what should be consulted as a key impute
The business SWOT analysis
An organization that sends and e-mail to an outside organization requires what to protect the e-mail
Virtual private network (VPN)
What is a collaborative technique for building consensus involving independent analysis and voting by experts
Delphi methodology or facilitated workshops
What is the key question in a bomb threat assessment
Whether the threatener could have done what was claimed
What is the most important and most difficult phase of bomb threat evaluation
The review phase
What is the primary cause of nuisance alarms for bistatic microwave sensors
Standing water
What are the two goals when dealing with possible chem-bio mail attacks?
Limit distribution of the material, look after any staff who have been exposed
What does a balance sheet show
A summary of an organization’s investing and financing
What should a full set of PPS procurement documents (contract documents) contain?
Contractual details,
Construction specifications,
Construction drawings
What three elements are depicted in a cash flow statement
Net operating cash flow,
Net investing cash flow,
Financing cash flow
Which two ratios show how an organization has done in making money during a reporting period?
Return on assets = net income/total assets
Return on equity = net income/shareholder equity
When should fiber optic cable replace coax cable in video systems
For distances greater than 1,000 feet.
What is used to conduct threat analysis
Threat tree analysis
Should the deliberations of a threat evaluation team be recorded
Yes, to assist with subsequent investigations, to justify actions taken, and to provide a basis for future training and process reviews
What is the quick ratio
A measure of an organization’s ability to cover current liabilities with current assets that can be quickly converted to cash
Quick ratio = (cash + securities + accounts receivable)/current liabilities
What is generally the most practical approach to budget development
Top-down bottom-up
In a security services contract, what should the scope of work specify
Security tasks,
Days and hours of performance,
Total number of hours to be worked
When conducting risk identification, what should be consulted as a key impute
The business SWOT analysis
What is the first criterion in evaluating bids for security services
Complying with the submission deadline
For executive protection, the decision for using of vehicle should be based on what
Risk Assessment
In establishing financial strategy what benefit does it provides to the organization
It identify expected margins the businesses generally make
What is dependent on the risk control measures deployed to manage the risk events
Vulnerability
When numerical data is inadequate, uncertain or unavailable to properly describe a given risk, which analysis approach is most suitable
Qualitative analysis
What is the current ratio
A measure of a company’s ability to cover short-term obligations
Current ratio = current assets/current liabilities
A threat to impartially that arises from complacency or over familiarity with the context of operating conditions is
Habituation
Who assumes that workers are thoughtful, eager to perform well and willing to guide
Mc Gregor’s Theory
What is EOC
Emergency operation centers
What in an organization specifies type of products, and level of quality
Mission
Informing an emergency management what does a management analysis to partner a supply chain to provide the emergency assistance
Mutual Aid
What should provide a structure for the various assessment activities
Checklist
Where is the executive most vulnerable
At home
What is the most important consideration when developing emergency management plan
Management involvement in the identification and evaluation of key assets of the organization that need to be protected
What drives the findings and conclusions of any investigation
Information and evidence gathered
What best describes the performance measurement and training in a job requirement analysis
This is to aid employee development and retention through review and reward of performance and provide training mechanism for employee growth
A data gathering process that uses descriptive models to ascertain and analyze possible events that may occur in the future and their potential outcomes is called
Scenario analysis
In case of destruction of the EOC, what is necessary
Designation of an alternate building location outside the building of the primary EOC
During the preplanning stage of the EP program, what is the best approach
Establish a crisis management team
Analysis of vulnerability involves what
Analyzing the attributes of the event and assets, services and activities
What does timely response, resumption of critical business function and recovery show in the business continuity
BIA (Business Impact Analysis)
What conveys the general understanding of the business, culture and future goals
Vision
Which form of test is used to determine reaction to different situation through a form of stimulation
Stress analysis test
What best describes the financial strategy
A management financial approach to determining the expected return of its investment
For continuity of operation what should an EOC must have
Should have back-up power and an independent supply of potable water,
Sanitary arrangement that are not dependent on the normal water supply must also be considered
In which financial statement is EBITA clearing shown that is earnings before interest, taxes, and amortization
Income statement
What are technical controls in information security
Network log-ins and passwords,
Firewalls audit logs,
Encryption,
Antivirus and
Spam filters.
Standards that are binding under the law and can be enforced by formal authorities
Statutory standard/regulatory standard
What does Gap analysis mean
A technique that can be used to determine what steps might need to be taken to improve the organization capacity to conduct a risk assessment to move from current state to a desired future state
What should a security manager do to maximize cost-effectiveness
Ensure that operations are conducted in the least expensive, but cost effective way
Maintain the lowest cost consistent with required operational results
Ensure that the amount of money spent generates higher return
One of the most important ingredients in effectively managing an emergency event is what
Communication
In what analysis should the staffing decision be measured in a detailed job analysis
Job requirement analysis
The range of threats to a principals safety and well-being are vast, what is perhaps the most troubling event
Events that have been known to occur but are unexpected
What metrics shows when assessing employees overall contribution to the company
Extra sales, extra hours, work on several projects
Work on task outside the position requirements
Contribution towards improvements in the business process
Leadership
Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk
Sensitivity analysis
Information on how much money an organization generates (Revenue) how much it spends (Expenses) and the difference between those figures (Net income) is obtained where
Income statements
What is an integral part of the business continuity
Business Impact Analysis
What threats to impartiality arises from complacency or over-familiarity with the context of operating condition
Habituation
After the emergency the plan should given priority to what
Facility structure
What elements are required for a successful bombing
Motive
Knowledge
Materials
Opportunity
An indication of the effectiveness of incident prevention effort is
Quick and accurate reporting of suspected incidents
Which consultant does the investigation, identification and collection of evidence, identification of vulnerabilities in an assessment
Forensic security consultants
A simple technique for prioritizing possible changes by identifying the problems that will be resolved by making these changes is
Pareto analysis
In financial decision, what does financial analysis considers
Profitability measurement and business risks
What specifics does the vision gives to an organization
Description of where the business will be in the long term
In a risk assessment, how is risk ranks measured
Low,
Moderate
High
Critical
When does an EPS need to do the advance in executive protection
Before the principal arrives
What training may promote innovative approaches to work tasks
External training
In designing primary and alternative EOC/CMC what should be the primary consideration
They should be able to accommodate the CMT and should provide redundant communication capabilities
Which method of data collection involves observations, interviews, checklist and reviews of historical data
Evidence-based methods
The category of security consultants that form the largest group within the consultant profession is
Security management consultants
Gap analysis consists of three steps list them
Noting currently available factors
Listing success factors needed to achieve future desired objectives
Highlighting the gaps
What does the most visible component of the EP program involved
Physical acumen
What provides a basis for making decision in the context of the different conditions and outcomes
Scenario analysis
What is a requirement to arrive at an appropriate threat level for a particular executive
EP risk assessment
What is the purpose of mutual aid association
An agreement of business and organization to assist each other by providing materials, equipment and personnel’s for disaster control during emergency
What is the most effective means of preventing workplace violence for security professional
Early detection
What will provide an insight into how the defined alternative differ from one another and provides a basis for considering new and improved alternatives
Decision analysis
In the balance sheet what value is neither an asset or liability
Shareholders’ equity
Which two ratios demonstrate how well a firm has done in making money for a reporting period?
Return on assets = net income/total assets
Return on equity = net income/shareholder equity
What encourages the employee to reporting incidents
Fostering a culture of integrity and honesty
Who decides on the security vs convenience continuum where the executive should be and what trade off to make
The principal and the agent
What is the goal of a risk assessment program
To review the risk management controls and system as well as identify opportunities for improvement
What helps employees to do their job better
Internal training
List three risk assessment approaches/methods
Operational risk assessment
Strategic risk assessment
Project risk assessment
An organization that sends and e-mail to an outside organization requires what to protect the e-mail
Virtual private network (VPN)
What do investigators often find is a precursor to an organization’s theft problem
A substance abuse problem
Which risk assessment method is limited to uncertainties associated with existing assets, people, processes and systems-in-place
Operational risk assessment
The risk of an organization is ready to bear after the risk treatment is
Risk tolerance
Which sampling method requires sample selection process to be based on probability theory
Statistical sampling
When evaluating the potential for intentional threats, consideration should be given to what
Presence and proximity of ‘‘hard’’ and ‘‘soft’’ targets
What descriptive terms are used to describe potential likelihood and consequences of risk events during qualitative analysis
‘‘Minor’’
‘‘Moderate’’
‘‘Major’’
‘‘Critical’’
Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk is called
Sensitivity analysis
Which theory believes that punishment or threat of punishment motivates a worker
McGregor’s theory x
What is recovery time objective (RTO)
The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days
What should be established at the beginning of the risk assessment process
Risk criteria
Which kind of attacks makes several direct attempts at the password of a system with the intention of compromising it
Brute force attack
A non-statistical sampling method wherein samples are selected based on convenience but preferably should still be chosen as randomly as possible is
Haphazard sampling
A helpful tool in evaluating the vulnerability of an asset is
Event tree
When scenario analysis and event tree logic diagrams are used in data collection, what technique is being applied
Inductive reasoning technique
What is the key task of the person planning and conducting the risk assessment program
To develop an understanding of the organization to be assessed.
What are the main two categories of sensors
Active
Passive
What are less conventional and more difficult to define nature of modern day threat
Asymmetric Threats
Security director should report to whom
A Key Senior Management Level Executive
Criticality is measured in terms of what
Financial Cost/Currency
The most important in pre-employment process is
Employer Application Form
Types of techniques of communication transmission
Point-to-point,
Loop,
Multiplex
What is common about workplace violence and drug abuse behavior
Although the rate illicit drug use is highest amongst unemployed, most drug users are employed
The new task of first-line supervisor
Mentoring and advising
What does it mean to divide video images to grid section
Masking
Another word for business ethics
Applied Ethics
Reason for non-entry technical/professional person
Blind – ad, its designed for career people
What rule has been violated if a security officer is reporting to two superiors
Unity of command
A person who likes to be with people, acts rather than rationalize is
Extrovert or Extroversion
Which light the least re-strike time
Incandescent
Halogen
Florescent
Lock with the highest delay
Pin Tumbler Lock
Perimeter lighting should be installed to face where
Down and away from the protected area
Type of space in High-Rise are
“Open” building,
“Closed” building
“Hybrid” building
What to do during earthquake
Take cover under a desk, or table or sit or stand against an inside wall
Types of light used in residence
Incandescent/Halogen
Types of smoke detector
Photoelectric detector
Ionization detector
Personal entry control is
What you have,
what you know,
what you are
What does plan in the PDCA implies
To define and analyze a problem and identity the root cause
What is the greatest threat to an organization
Industrial espionage
What determines the use of a car and driver in an EP program
Risk assessment
Verifying the experience and qualification that are presented by an applicant is
Credentialing
How do you handle a spent cartridge
Pick it up by the open end using tweezers
Two classifications of bombs is
Explosive
Incendiary
Difference between safety and security is
Unintentional or natural abnormal events vs malevolent intentional human caused event
The three primary products of explosion are what
Heat
Forms of explosions are what
Mechanical
Chemical
Nuclear
An illegal means of obtaining information about a competitor outside stealing it from him is
Performing reversed engineering
Directing an agent to gain employment with a suspected company under false pretenses.
Directing an agent to befriend employees of such company to collect information on proprietary manufacturing process.
Recruiting an employee of the company to provide information in manufacturing process.
Fake job interviews
A key element of the ISS risk assessment model is
A thorough study of existing and projected threats
What ensures there is no gap in plan maintenance of the emergency management structure
An alternate designate, for the designated organization’s emergency coordinator
A glazing material composed of two sheets of ordinary glass bonded in a middle layer of plastic sheeting materials thus mitigate against blast force
Laminated glass
What is based on the risk assessment and should consider both tangible and intangible assets
Cost benefit analysis
Security risk control and counter measures should be measured using what
Effectiveness and efficiency
What is the greatest mistake of an inexperienced investigator when interrogating a suspect
Neglecting the skill of listening
What type of questions can investigator ask an interviewee that will make him continue to talk more
Open-ended questions/narrative type questioning
What light is good for clearer and colourful video surveillance system (VSS)
Metal halide
Taking your money to the bank is what kind of risk measure
Risk Transfer
Surveillance, undercover and misconduct are what investigation
Constructive incident investigation
Function of “check” in PDCA is
Confirm outcomes against plan; identify deviation and issues, (quality control)
What information is contained in account payment
Account on which an organization owns money
EPS Choreography is
“Working the principal”
The principal and agent must agree on what
Where on the continuum the executive should be and what tradeoff to make
The most important task of an EPS
Preventing and avoid danger
The relationship between public and private policing should be
Structural and contractual/institutionalize, coordination and cooperation
Why the response to alarm by police is reduced
Increase in the number of alarm users
Security manager should report
A key senior level executive of the organisation
List key success factors of a security manager
Ability to build sustainable competitive advantage
Demonstrated integrity and ability to maintain principles under internal and/or pressure
High-quality analytical skills, management experience
Exceptional relationship management competence
Qualitative experience in strategic planning and policy development.
What provides a behavior based protection to the computer or server
Host intrusion protection system (HIPS)
What device operates on a computer or server to be able to look at both signature and behavior to protect the machine
Host intrusion protection system (HIPS)
List statements made by a deceptive person
Offers specific denials
Avoids realistic words
Qualifies answers
Uses religion or oaths to support statements
Gives delayed and evasive or vague answers
When a company lose $50, and makes a 5% profit margin, what amount of sales in dollar will be required to write off the stolen amount
: $1000 i.e 𝟓𝟎/𝟓 -: 5/100 = 50/1 x 100/5
= = $1000
Why employ employees with integrity
Best way to reduce internal theft in an organization
Taking your money to the bank is what kind of risk measure
Transfer
What is personified in the hard-driving authoritarian manager
Theory x
Security officer should be managed by who
Asset protection management and not placed as the sub-operation of another department
Giving responsibility with commensurate authority and holding the employee fully accountable for the use of the authority is
Delegation
Security manager assigned operational responsibility to a security officer is what
Delegating authority to see how he handles responsible decision making and security oversight
Gaps in employment history of more than what period should be investigated
One-month/30 days
In collecting which evidence/exhibits would you use tweezers
Spent cartridge
What is the most common in security function in modern time
Access control
Surveillance is
An overt monitoring to prevent a crime or misconduct
VSS (Video surveillance system) at the Harbor is
Standard lens (black and white)
A common characteristics of an inexperienced investigative Interviewer is
Impatient
What will help the CCTV function better
Operator’s capability
When conducting an interview what is the initial thing to do
Establish favorable rapport
The future of policing is
Proprietary supervisor oversee contract front-line officer
A manager that gives a task to someone immediately under him did so because he wants to do what
Motivate his subordinate
Which sensor is passive, covert, and can detect a change in electrostatic field when someone touches the protected object
Capacitance
The behavior spectrum of workplace violence
Harassment
Intimidation
Discrimination
For effective security measure of critical information, which security is best
Operation security
What security measure do you provide for an investigator
Operational security
How can a security manager convince management to approve his security
Talk about return on investment measurable in financial terms
In Investigating embezzlement, where to check the transaction of inflow and outflow over a period of time
The account payable and account receivable
Before conducting a security program what must you check
The organization strategy and goal
What the difference between vulnerability and risk assessment
Vulnerability assessment is the process of identifying and quantifying weaknesses.
Which pattern can give the best insight to an investigation
Asking for the interviewee’s understanding of the reason for the interviews
Which is the action of inexperienced investigator
Neglecting the skill of listening when interviewing suspects
How does an organization determine on whether to outsource an investigative unit
Cost benefit analysis
Statements of a deceptive person
Offers specific denials
Avoids realistic words
Makes seemingly irrelevant comments,
Gives delayed, evasive or vague answers
Qualifies answers or uses religion or oaths
An organization that has an alternative business location is called what
Hot Sites
When you put your item in a locker of a bank before going in, could be described as
Risk Avoidance
Which type of risk is achieved when EPS diverts The principal from riot scene
Risk avoidance
The threat that directly attacks password and also lure system user to reveal their Credential are what and what
Social Engineering/Brute force attack
What best describes asymmetric threats control
This is the bypass/sabotage of a victim Strengths while targeting their vulnerabilities
CPTED is aimed at achieving what
Deterring
Detecting and
Delaying likely offenders
Why should a Security manager decides to hire an insurance broker
Reduce risk by transferring the risk to the insurer
When an organization put in place protection in-depth in concentric layers, this could also be described as
Redundant schemes
Strategic planning, provision of resources, policy emplacement is a responsibility of
Managerial task/actions
A personnel is being considered for a supervisory and managerial role which should be factors to consider
Work on several projects,
Work on task outside position requirements,
Contribution towards improvement in the business process,
Leadership
A personnel has more than two superiors to report to which rule has been violated
Unity of Command
A supervisor has over 30 personnel’s to supervise, what are the challenges with this?
Span of Control
What motivates a worker to keep his work despite unfavorable working condition and whose theory
Job Content (motivators) Herzberg’s Motivation - Hygiene theory
The recommended way to pick a bullet Shell is
Picking it up by open end using tweezers
The last stage of the recruitment exercise
Back grounding
Who should be interviewed last
The offender or offending group
Concentric layers of security is also known as what
Protection - in-depth/Redundant Scheme
Types of exterior lightings are
Streetlights,
Searchlights,
Floodlights,
Fresnel and
High mast-lightening’s
Best light for residence
Incandescent/Halogen
The interior of a safe to control temperature requires
Moisture
How much sales is required to cover a loss of 5% on a profit of $50
𝟓/𝟏𝟎𝟎 X 𝟓𝟎/𝟏 = 𝟏𝟎𝟎/𝟓 X 𝟓𝟎/𝟏
= 100 X 10 = $1000
EPS that noticed riot and takes another route is doing what
Avoiding danger
The construction of container to store sensitive information should be based on
General Service Administration (GSA) Approval
Why lower management prefer bottom-up budget
They had a stake in developing it/they had an input in its development
When management generates an expenditure and allocates money to lower management what type of budgeting practice is described as
Top-down budgeting
In a technical surveillance situation, what should the security manager consider
Offices, meeting rooms be inspected for technical surveillance vulnerabilities
He should also obtain floor plans and details the sites telecommunication and audiovisual infrastructure
Most effective protection approach for a IT environment is
Integrating physical, procedural and logical protection measures in a layered approach
A building with wooden structure without windows experiencing temperature changes in the morning and evening all through the summer, which sensor detection will be most affected when applied
Passive infrared (PIR)
When is a victim most likely to be kidnapped?
On transit/when travelling
The decision to outsource and outsourcing approach of the investigative unit should be based on what
Cost benefit analysis and projected overall investigative needs
Who should be interviewed first during investigation
Persons who are not likely to be readily available later
Putting sensitive documents in a safety deposit box of a bank is which form of risk option
Risk transfer
The most cost-effective emergency management response drill
Tabletop exercise
Minimum time for lock delay during emergency is
15 – 30 second
Why is the facility shutdown during emergency
Speed the recovery operation
What cable is used for CCTV connection of 2,200m
Fiber optics
Criticality is measured in
Financial terms/Currency/Money
A means of proactively managing risk before they can affect planned objective is
Root Cause Analysis
To identify what failure mode gave rise to the loss event to support future preventive actions describes what
Root Cause Analysis
Words, phrases, logo or graphic symbols to distinguish products describes
Trade Mark
A property right in an original work of authorship giving the holder the exclusive right to reproduce, adapt and display the work defines
Copyright
What is used to identify the condition that initiate the occurrence of an undesired activity
Root Cause Analysis
Information that has the government grant of a right to exclude others from making an invention for a specified period describes what
Patent
Which CPTED solution is also known as target hardening
Mechanical measures
Removing data on a storage medium before it is reused describes
Sanitizing
When body cells adjust to the presence of drugs is
Chemical dependency
Tapping into a communication line is
Inductive coupling/Direct coupling
Best source of information for employment screening
Application form
When the adversary strikes, removing the principal from harm’s way is based on
EPS conditioned response
Definitive statements proves what
Truthfulness
Family of drugs for opium and cocaine is
Schedule II/Narcotics
Initiating a general discussion before direct questioning to accomplish rapport uses
Hidden persuaders
Who implements disciplinary action after an investigation in an organization
Organizations decision maker/Human resources
How do you get management support for an investigation
Show value to the organization and demonstrate that the unit pays for itself
Why a woman stays in an abusive relationship
Economic assistance
A written coverage to protect the employer from the dishonesty of the employees describes what
Fidelity coverage
To guarantee the performance of some obligation by an individual requires
Surety coverage
What is meant by chain of custody in evidence collection
All persons who came in contact with the evidence from collection to storage
When employees are manipulated to give up important information and when the system is remotely accessed without authorization is known as
Hacking/Social engineering
The most expensive part of an investigation process
Cost of personnel and outside services
Why do you inform the applicant that you want to conduct a credit check during background screening
Encourages applicants to be honest because they know that the information they provide will be scrutinized
Difference between covert surveillance and overt surveillance
Covert surveillance is hidden/unknown method of gathering intelligence unknown to the subject.
Overt surveillance is open method of preventing crime or misconduct.
Whose theory connects job motivators to work conditions
Herzberg
What are the characteristics of post orders
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy to understand terms.
Orders are indexed in details
Which sensor works with Doppler principle
Microwave
HIPS is different from IDS, how?
HIPS operates on the host system such as computer or server
The qualities of a security manager
Business process enabler
Creative problem solver
Subject matter expert
Risk manager
Strategist
Relationship manager
Executive management
leadership
Governance and
Team member
Giving responsibility with commensurate authority and holding the employee fully accountable for the use of that authority describes what
Delegation of authority
The crisis management team should be as part of the emergency planning do what else
Review, update and test the plan regularly
In setting up a proprietary investigative unit, the most important aspect to consider is
Selecting professional personnel’s
A technique used to disguise digital data during transmission is
Encryption
Copies of investigative report should be distributed to whom
Only to those with a need-to-know
A critical onsite examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excess in determining the protection needed to make recommendation to improve overall security is the definition of
Security survey
Between the perimeter barrier and the exterior structure should be a clear zone of
20 feet
The intrusion detection system that is used on safes, desk, vaults is
Capacitance
The least in counter measure in terms of expense
Procedure
A barrier considered the most resistant to a blast explosion
Reinforced concrete
The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives of behavior is known as
Maslow theory
The difference in the physical stock of products and the number recorded in the book is called
Shrinkage
Many experts agree that the most important deterrent to internal theft is
Employees perceived chance of being detected or fear of discovery
According to estimates, about one third of all business failures are caused by
Theft from employees
Store inventory shortage are mainly caused by
Employee theft
Outsourcing of investigation unit is for what
Cost benefit analysis
Projected overall investigative need
The possibility of loss resulting from a threat is
Risk
A model for analyzing proposed organizational project is
SWOT
How would you demonstrate cost effectiveness to senior management
Show return on investment measurable in financial terms
Risk ratios are
Current
Quick
Equity
The three main categories of expenditures when developing security budget are
Salaries
Operational
Capital
What the business currently entails and where its needs to be in the future is the first step in developing what
Organizational Strategy
The only way the security operating function can justify continued funding from senior management is
Demonstrate that the real cost to the enterprise would be greater if the level of the support for the security operation is reduced
The second most valuable resource of an organization is
Corporate knowledge
Early warning signs that can lead to violence are
Harassment
Intimidation
Discrimination
The department that promulgates corporate policies and procedures is
Human Resource
A coverage provide only for losses that are reported during the period the policy is in force is
Claim-made form
The first and most crucial question in defining business purpose and mission is
Who is the customer
The most valuable corporate resource is
Employees
What are legal approach to asset protection
Copyrighting
Trademarks
Patenting
Facility characterization is done during
Risk analysis
Assess-protect-confirm-improve model is more generally known as
PLAN-DO-CHECK-ACT
When recruiting, skill that will increase the candidates likelihood of success are referred to as
Indirect skills
The most frequent and costly forms of dishonesty the security professional will likely encounter is
Theft and fraud
A mechanism that will significantly increase the chances of detecting the vulnerabilities that leads to employee theft and fraud is
Clear organizational policies,
Procedures and
Practices
The best way to recruit a good candidate is
Internal recommendation
The most consistent predictor of theft in all industries is
Employee’s perceived chance of being detected
An advantage of which budgeting forces a manager to consider alternative ways of getting the job done
Zero-based
The type of risk occurrence that can only result in loss is
Pure risk
In bottom-up budgeting where does the broad base of information come from
Front-line managers
To impose performance goals on lower management, which Budgeting approach is recommended
Top-down
The ISO committee responsible for societal security is
ISO/TC 223
Most management systems are based on what model
Plan-Do-Check-Act
The fundamental template for decision that define and support an enterprise long term goal is
Organizational strategy
What is the vulnerability concern about critical infrastructure
Natural and intentional attack
The process of performing an analysis of potential areas of loss, their probability and their impact to the corporations is
Risk analysis
In the insurance world ‘‘The cause of a possible loss’’
Peril
Losses covered by insurance policies are
Direct loss
Loss-of-use
Extra-expense-losses
Making sure the human and non-human resources are put into place is which basic function of managing
Organizing
What kind of litigation has exploded in the security field
Liability
Important factors related to the conduct of security officer are
Courtesy
Restraint
Interest
The document/Process that supports long term goals is
Organizational Strategy
A private system in place to guide the implementation of SOX
Hotline
Services acquired under informal agreements for which money is owed by an organization is
Accounts payable
Integration of traditional and IT security functions is
Convergence
This covers items that the organization monitors and expects employees to conform to
Policies
What are performance characteristic of intrusion sensors
Probability of detection
Nuisance alarm rate
Vulnerability to defeat
This communicates business functionality and operational methods
Mission
A closed loop around an area that needs protection is
Perimeter area
Which are the integral parts of a mechanical lock
Revolving device
Dead Bolt/Latch
Unlocking device
If a security supervisor is confused because he is being told to do one thing by one supervisor and another by a security manager, which basic principle is probably being, violated
Unity of command
To put an interviewee at ease, at the beginning of the interview, the type of questions should be
Close-ended
If a security supervisor is having problems coordinating the activities of his 30 subordinates, which basic principle is being violated
Span of control
The goal of an interview is
Get truthful information
When actual work practice need to be compared with required state but routine auditing is not possible requires which time of investigation
Undercover investigation
Setting up a business as a front where stolen goods are bought and sold is
Sting operation
A simple and systematic method of employing safeguards to protect critical information is
Operation security
Apart from the basic skills, an investigator should have which other skill
Maths skill
A responsibility that is often neglected but is important to the operation of the investigation unit is
Setting objectives and monitoring
What are the components of risk
Threat
Consequence
Vulnerability
Passive sensors typically respond to which types of energy
Vibration
Infrared energy
Acoustic activity
Another name for password cracker is
Brute-force
A key principle of the vulnerability assessment is
Establish initial baseline
To protect an interior space against breakthrough of a defined point such as skylight, sensor most appropriate is
Boundary sensor
The building blocks of a PPS
People
Software
Hardware
A card that contains a sets of wires in a unique formation is
Wiegand card
What elements combine to create functional integration
Detection
Delay
Response
The simplest form of line-supervision is end-of-line
Resistor
What is the most important factor in CCTV camera choice
Sensitivity
Staffing decisions should be made against what
Detailed job requirement analysis
A class of sensor best suited to protecting an internal environment with multiple points of possible entry is
Volumetric sensor
This uses a plain-text mechanism and connects with a control panel
Magnetic strip
Examples of smoke sensors are
Photoelectric/Ionization
A common method of evaluating how well the PPS meets its goals and objective is
Vulnerability analysis
Defalcation specifically deals with the misappropriation of trust funds entrusted to whom
Fiduciary
Verifying system performance against defined threat is the basis of what
Vulnerability assessment
A situation where your body cells adjust to the presence of a drugs is
Dependency
What drugs causes hyperactivity, dilated pupils, suppresses sleep and appetite
Amphetamines’
What are classes of adversaries
Outsider
Insider
Outsider in collusion with insider
What are steps that characterize a system approach in a security context
Assessment of vulnerability
Implementation of countermeasure
Review of effectiveness
What should be done last in the employment process
Back grounding
Workplace IMT includes who
Senior management representative
Senior human resource manager
Legal representative who is familiar with labour laws
Senior asset protection manager