PPTX Flashcards
A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?
The span of control is too great
The approach aimed to make employees happy through the provision of benefits, but which fails to motivate employees to produce to their full capacity is called
The Custodial Theory.
In the future, what will define private policing
Contract guards working in public space
A main advantage of emergency lighting is:
Its ability to activate in the event of a power cut.
The recommended night-time illumination level of a self-parking car park is:
1 fc
You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?
Low pressure sodium
A clear zone of how much should separate perimeter fences and internal structures?
50 feet
Which types of sensors are grouped as fixed and rate of rise?
Heat
Which kinds of sensors would not be suitable where there are drafts passing through the detection pattern and nearby railroad tracks?
Ultrasonic
The Theft Triangle depicts which of the following causes of crime?
Opportunity,
Motivation,
Rationalization
Where is an executive most vulnerable?
At home.
According to Kinney, the single biggest deterrent to violence in the workplace is:
Careful hiring and screening
The two types of plastic glazing used in buildings are:
Acrylic and polycarbonate.
What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?
Electronic shuttering
What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?
Automatic gain control
When specifying lighting for indoors precision manual work where good CRI is essential, which of the following will produce the best results?
Incandescent.
Which of the follow relates to Halogen lighting?
Low efficacy; high CRI; instant restrike.
What differentiates public sector COOP (continuity of operations) from private sector BC (business continuity):
COOP entails the movement of critical functions and personnel to an alternate operating site.
When should you use an undercover investigation?
As a last resource
Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?
Microwave
What is the most popular sensor?
PIR
The 3 fundamental components of an intrusion detection system are sensor, annunciator and?
Control unit
What is used to minimize the number of monitors security personnel must watch?
Multiplexers
Which kind of lens is specifically designed to reduce the number of lenses an installer needs to carry?
Varifocal
Oscar Newman
Set out the foundation for CPTED in his work on defensible space
Which of the following limits the number of keys that can be issued?
Master keying
Lighting is a form of
Deterrence
The Psychological Stress Evaluator works on the principle of:
Blood pressure and pulse rate.
Which of the following safes should you recommend to protect encrypted computer back-up media?
150-1
A typical role for the security manager in an emergency management structure is:
The EM Coordinator, responsible for EMPl an maintenance
Logical access control is based on?
Identification;
Authentication;
Authorization;
Accountability
The risk of a hostage coming to sympathize with the abductors’ cause is known as:
The Stockholm Syndrome.
Which of the following would be found in an operating budget?
Maintenance costs for a PPS
What statement is correct with regard to discipline?
All employees require constructive discipline
Which sensors has the lowest NAR?
Dual Tech.
What sensor would you expect to find on windows and doors?
Magnetic switch
What is the purpose of an investigation at the strategic level?
To plan, organize, equip, staff and prepare
For outcomes of corporate investigations
It is advisable to have clear-cut policies on acceptable outcomes.
One IDS installation which makes it more complex for an attacker to disable the entire system is:
Point to point
What is the name given to the risk management strategy of spreading the sites of cash registers in a retail outlet instead of just having one central location?
Risk spreading
Car park employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. Which of the following would be an acceptable alternative?
High pressure sodium or LED
In logical access control, what follows authentication?
Authorisation
Which of the following are recognised search techniques for IEDs?
Occupant, warden, team, high risk
Which of the followings is one of the most effective psychological evaluations in a pre-employment screening program:
MMPI (Minnesota Multiphasic Personality Inventory)
What is the name given to fire sensors that are sensitive to the invisible products of combustion during the early stages of a fire?
Ionisation detectors.
Which kind of evidence degrades with time and temperature?
Organic
What level of lighting is required for a pedestrian entrance?
5 fc
What is the most common kind of sprinkler system?
Wet-pipe system.
What is the most widely used method of controlling physical access:
Locks
Oxycodone is a:
Narcotic
Security managers should
Be as much a business manager as a security specialist
In developing strategy we look:
3-5 years ahead.
The first step in developing a business strategy is:
Understanding the business and where it needs to be in the future.
An organization’s primary resource is its
People
Two common ways of classifying risk, originally coined by the insurance industry, are:
Pure and dynamic
Against what should staffing decisions be made?
A detailed job requirements analysis
The best way to recruit a good candidate is to
Seek internal recommendations
The metrics for evaluating employees should align closely with the organisational strategy.
or example, if the strategy calls for growth, then the metric for mid-level managers may be to grow their business units by a certain percentage.
Realistically, if a company wants to improve margins it has two options. What are they?
Reduce costs or increase price.
Three financial reports or statements have become accepted as standard.
Income statement.
Financial statements are created in accordance with:
GAAP (Generally Accepted Accounting Principles)
What is the underlying equation of the balance sheet?
Assets = liabilities + shareholder equity
Which of the following are considered cash equivalents on the Balance Sheet?
Current assets.
What is the primary limitation in financial statement analysis?
It does not consider changes in market conditions
What is the main purpose of a budget?
To provide a financial tool that estimates costs and revenue.
To provide a variance warning mechanism.
To provide fiscal uniformity for the company
A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services, or processes is known as
Standards.
In ISO, the main committee working on security activities is………………….. The committee has a broad scope, addressing security, business continuity, crisis management, disaster management, and emergency response. The committee examines crisis management and organizational continuity related to all types of disasters and disruptions, including intentional attacks, unintentional accidents, and natural disasters. The committee focuses on what an organization should do before, during, and after an incident. The committee also addresses interaction and interoperability between organizations.
ISO/TC 223: Societal Security.
Which is the administrator and coordinator of the US private sector voluntary standardisation system?
American National Standards Institute(ANSI).
What is the operating principle of ISO’s management systems standards?
Plan-Do-Check-Act
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
Those responsible for conducing security awareness programmes for staff should be:
Security personnel in general
The most consistent predictor of theft in all industries:
Is the employee’s perceived chance of being detected
Most fraud perpetrators:
Are influenced by an opportunity to profit.
Which of the following are more likely to be tolerant of internal theft?
Employees with less tenure
Defalcation specifically deals with the misappropriation of trust funds or money entrusted to a:
Fiduciary
Which security system elements will significantly increase the chances of detecting the vulnerabilities and gaps that lead to employee theft and fraud?
Clear organisational policies, procedures and practices.
The Theft Triangle depicts which of the following causes of crime?
Opportunity,
Desire,
Rationalisation
A process for screening job applicants for past trust violations and periodic employee communications that include past case studies are two of many elements in a programme designed to prevent:
Fraud
The greatest on going threat to the survival of a business is:
Internal theft.
What are the most frequent and costly forms of dishonesty the security professional will likely encounter?
Theft and Fraud
An incident reporting system does two things that could not otherwise be done. One is that it provides a history of events occurring to the organization. What is the other?
Provides a basis for professional efforts at asset recapture, recovery or incident reduction or termination.
Many experts agree that the most effective deterrent to internal theft is:
Fear of discovery
The only way an operating function (such as security) can justify continued funding is to:
Demonstrate that the real costs to the enterprise would be greater if the level of support for that activity were reduced
To senior management, what is the primary factor in determining the size or existence of an asset protection programme?
Cost-effectiveness.
Bonds that indemnify an organization in the event of dishonesty on the part of an employee are known as:
Fidelity bonds.
Most insurance policies cover:
Direct loss only.
Insurance is often divided into two categories:
Property and liability
The best-known form of risk transfer is
Insurance.
Whose theory is premised on the belief that the opposite of satisfaction is not dissatisfaction, but simply no satisfaction?
Herzberg.
A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?
The span of control is too great.
The approach aimed to make employees happy through the provision of benefits, but which fails to Motivate employees to produce to their full capacity is called:
The custodial theory.
The job of managing involves 5 basic functions, which are:
Planning,
Organizing,
Directing,
Coordinating,
Controlling.
Success in the management of assets protection depends on the proper balance of three managerial dimensions, which are:
Technical expertise,
Management ability,
The ability to deal with people
The process of scoping out potential loss events is known as:
Loss event profile.
The ultimate responsibility for internal security within a department should rest with:
The department’s line manager
The principle of unity of command may be broken:
During an emergency.
Assets protection is increasingly based on the principle of:
Risk management
Which of the following is an example of an activity that falls within the broad remit of assets protection?
Emergency management
Cash is an example of what kind of asset?
Tangible
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
In the future private policing will be defined by:
Contract guards with proprietary supervisors.
The concept whereby security of an industrial facility is handed by a private contractor is known as
Private substitute
The concept whereby private contractors augment regular police in law and order maintenance in publics areas is known as
Public supplement
Public/private policing partnerships should
Be built around structural and contractual relationships
Whose reports sought to compare the US security industry to public law enforcement quantitatively
Hall crest
What is a significant distinction between public and private policing
Cost
What makes private policing an attractive option
Private policing is inherently proactive
Felson and Cohen postulated that crimes are typically a product of three factor
Motivated offender, a suitable target, the absence of a capable guardian
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue was put forward by
Kelling.
A simplified explanation of why employees steal is:
The theft triangle
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue is more generally known as the:
Broken window theory.
The levels of fear are greatest when there is a concern about both incivility and
Crime
Training for private security officers who provide policing services in public areas should be:
Role/task specific
We find that mental illness
Only rarely plays a key part in assassination behaviours
An executive is most vulnerable
At home
In high risk situations the executive is usually accompanied by
An EP specialist
Five of the key principles that can guide one’s thinking about EP are: realise that anyone can protect anyone; don’t stop to think; keep clients out of trouble; understand the security vs. convenience continuum; rely on brains, not technology. What is the sixth
Prevent and avoid danger
When an EP specialist researches a destination to which an executive is due to travel, this is called
An advance
If a protected executive must travel locally, the ideal arrangement will be to:
Place the executive in a suitable car driven by a trained security driver and accompanied by the EP specialist.
In an EP context, what is meant by the term “sound off”?
In an attack situation, it is the term given when an EP specialist shouts the type of weapon displayed by an adversary and the direction, in relation to the principal, from which it is coming.
Awareness training for executive management should focus on the security programmes benefits and
The reasonableness of the programmes expenses compared to those benefits.
If a supplier is given access to sensitive proprietary information, what should accompany this access
Awareness of security procedures that protect and account for such information
Creating an understanding of the relationship between security and successful business operations is facilitated by
Awareness training for senior management
The value of awareness programs can be demonstrated by
Metrics
We find that most drug users are
Employed
Hashish, marijuana, heroin, and LSD belong to:
Schedule I
What are the names of types of depressant
Methaqualone, Valium (diazepam), Librium
Which of the following drugs causes elevated blood pressure, dilated pupils, increased heart rate, and euphoria
Cocaine
Which of the followings are types of stimulants
Cocaine, amphetamines, methamphetamine,
Methcathinone, methylphenidate (Ritalin),
Which drug is derived from the Peyote cactus
Mescaline
Intervention is the calculated interruption of the destructive behaviour of a substance abuser and those around that person. Which of the following answers best describes the steps that supervisors and managers should take in an intervention
Observe and document performance,
Confront the problem employee,
Interview and discuss,
Document results,
Communicate with upper management,
Follow up.
The condition whereby a user develops an attachment to the use of a substance due to some emotional or personality need of the person is
Psychological dependence
The essential difference between a social drinker and an alcoholic is
A loss of control over time, place and amount of drinking
Drug testing may be carried out pre-employment, on reasonable suspicion, after an accident or injury, randomly, after return to work following a violation, and as a follow-up to treatment. Which type of specimen is analysed most often?
Urine
Which of the following means of preliminary screening of urine analysis is the most common and least expensive
Thin-layer chromatography (TLC)
If the preliminary test discovers a drug or its metabolite, what should then follow?
A confirmatory test should be carried out using a different technology, such as gas chromatography / mass spectrometry (GC/MS)
According to Joseph Kinney, workplace violence includes four broad categories
Threat, harassment, attack, sabotage
According to Kinney, the single biggest deterrent to violence in the workplace is
Careful hiring and screening
An interdisciplinary workplace violence risk assessment and management process is based on
The identification and assessment of individuals so they can be diverted from violence before they act
In relation to workplace violence, complete the following statement: Security programs aim to:
First divert someone from committing an unsafe or harmful act and then, if diversion is unsuccessful, to delay the person’s progress in committing the act until trained individuals are notified and respond to the problem
Business related concerns that a workplace violence programme should address include
Liability.
Productivity.
Workplace morale
Most workplace violence incidents result from
Robberies and similar criminal violence
Only one of the following statements is true. Which is it
Unless psychopaths, aggressors typically go through a process of emotional escalation, selecting targets that give them a sense of control
A comprehensive approach to workplace violence should include the creation of an incident management team (IMT). Which are typically the members of the IMT
A senior management representative,
A senior human resources manager,
A senior security manager, and
A legal representative who is familiar with labor and employment law and litigation
What are the most distinctive and important elements in a violence risk assessment programme
Behavioural recognition,
Notification,
Assessment, and
Intervention by planned disruption.
Complete the following sentence: The long-term solution to each situation of potential workplace violence lies in
Understanding the emotional and mental state of the aggressor and diverting him or her from violence
What should be addressed in a violence risk assessment as, in some cases, they are early warning signs that could lead to violence
Harassment.
Discrimination.
Intimidation
Complete the following sentence: It is essential that the IMT be empowered to
Commit company assets and personnel to resolve an incident
What is the preferred strategy of evacuation
When an aggressor has a firearm on the premises a preferred strategy 360 degrees
A restraining or protective order is an example of
An intervention
The initial interview for a security officer applicant should be with
HR
In non-entry level security staff recruiting the recommended technique is
Blind ad
Security professionals can most effectively convince management of the need for security
By producing a strategic plan that quantifies loss potential
Key to ensuring good relations between security staff and service users is
Training of security officers in expected standards of courtesy, restraint and the use of good judgement
A 24/7 security post at a facility where security officers work 40-hoursweeks requires
4.5 officers
When developing a proprietary or contract security organisation, the first task is to
Perform a job analysis
The required action when dealing with an alcohol-intoxicated employee is to
Bring the person into custody thereby eliminating the immediate danger
The issue of deadly force weapons to security personnel is usually justified……
In a situation where there would be a greater danger to life safety without weapons than with them.
When escorting large amounts of cash:
Firearms may be appropriate
Which of the following is most appropriate to “ranking” security personnel?
To use the terms officer and supervisor for the lower levels, and assistant manager, manager and director for higher levels.
Which of the following models is most often used by security supervisors in their relationship with front-line security officers?
The vertical model.
A model for organisational structure which provides flexibility for one-time needs and for security management to leverage security staff skills for the greater good of the organisation is called:
The network model
The concept of principle-agent is used:
In a hybrid security force in which proprietary supervisors oversee contract front-line officers.
When procuring contract guarding services, which of the following best provides a means of ensuring performance after the contract is awarded?
By developing detailed bid specifications that spell out the requirements, including wages, benefits, and performance expectations.
Which of the following represents a risk of using peace officers in the security team?
Peace officers could be mobilised by the local police chief in the event of a public emergency, thus leaving the site exposed.
Who is first and foremost liable for the individual conduct of security officers
The security officer
Which of the following typically represents the largest cost element in the majority of security operating budgets
Security officers
Managers can better determine post requirements by use of
SOPs
If a security objective requires discrimination among events, persons, circumstances, or physical objects, based on complex and varying criteria, what should be used?
A security officer
Cognitive, psychomotor and affective skills are all aspects that relate to the concept of the:
The necessary human being.
The most important written instructions for the security force are:
Post orders
We find that:
Post orders should be available at each guard post
Which level of security management is the most crucial to front line officer motivation?
Security supervisors
To rectify a situation in which there is poor performance at some guard posts a recommended first action by supervisors is:
To visit each guard post every shift.
To get a full understanding of the requirements of a security post a supervisor should:
Personally provide some post relief when an officer is away.
The process of giving motivational feedback to maintain and improve performance is known as:
Coaching
A continually blank occurrence book is most likely to be an indication of:
Inadequacies in guard training
What is the primary record of significant events affecting facility protection and made contemporaneously by security officers?
A computer-based log into which the security officer types reports into a relational database/Security Log
In any legal proceeding, a security log is
Admissible.
Addressing issues such as low morale, lack of training, poor working conditions and lack of detailed job analysis is intended to lead to:
Vigilant performance
Failure of guards to respond to repeated alarms may be a negative by-product of:
Automation and human monitoring
The theory that emphasises the negative aspects of employee behaviour is:
The McGregor Theory X
Argyris argues that
Traditional organizational principles, structures, and procedures are incompatible with the mental health of employees
Poor air circulation in a guardroom is a problem associated with the
Mechanical environment
In the hiring context, pre-employment screening is fairest and most efficient when it
Uses a detailed list of physical requirements against which the applicant can be measured.
Herzberg’s work motivation theory developed a position that
Motivation comes from work itself and not from those factors such as salary and job security.
When designing a CCTV console, what facet should be incorporated to enhance officer efficiency and maximize the usefulness of the system
Annunciation and delay features, such as the sequential display of several image feeds.
Which is a tool which can help in matching applicants to jobs by examining mental preferences?
Myers-Briggs Type Indicator.
What is the most important aspect of personnel selection?
A face-to-face interview
An effective way to manage security post boredom is to:
Systematically rotate the officers’ duties, at 2 to 4 hour intervals, between fixed posts and roving patrols.
Training for security officers should include addressing the cognitive, affective and psychomotor levels. An example of training at the affective level is:
Understanding the methods and motivations of adversaries
A recommended method of trying to ensure that new employees learn and adopt workplace values is through:
Socialization
Administering discipline is primarily the responsibility of:
The supervisor.
Following pre-assignment training, what method of further development has been found to work well in enhancing security officer performance?
Mentoring.
Personnel costs are generally the largest item in:
An operating (or programme) budget
Three broad criteria that a client should consider when choosing a guarding contractor are i) consistent performance, ii) prompt, efficient and positive response to client concerns, and what else?
Competitive pricing
When engaging contract guarding services, how can disputes concerning acceptable performance best be avoided
By the client producing a clear and precise definition of the scope of work and required standards of performance
Scenario: At Site X, there is a hybrid mix of proprietary and contract security personnel. There is lesser job satisfaction amongst the contract personnel due to the large pay disparities. 99 How should this have been avoided in the initial contract negotiations?
The client should have required the contractor to pay the contract officers a rate equal to the entry wages paid to the proprietary positions
Surgency is related to
Dominance
Smoke detectors are of either the photoelectric or ionization type. The ionization sensor is of particular value for installation in
Areas that might smoulder for a long period, for example electrical equipment in control rooms, switch gear rooms, generator areas, and rooms containing computer systems
If you are looking for new PPS equipment and you know exactly what you want and no detailed design is necessary, the recommended procurement approach is
Invitation for bid
What is the name given to the process of intercepting conversations on a telephone line by capturing the radiating electromagnetic energy which flows in the line, and which does not require a physical connection to the line?
Inductive coupling
Which type of microphone operates as a loudspeaker in reverse, and which is very popular as an eavesdropping device because it requires no power source and is usually quite small, making it relatively difficult to detect
Dynamic microphone
Proprietary information is best defined as:
Intellectual property which, in some special way, relates to the status or activities of the possessor and over which the possessor asserts ownership.
What best describes proprietary information
Information relating to the structure, products, or business methods of the organisation
What is the main cause of proprietary information loss:
Due to the failure to establish and maintain effective control systems
Who, typically, determines the classification level of sensitive information?
The originator of the information
Access to internal information should be restricted:
To company personnel or others who have signed a nondisclosure agreement
What is the name given to the portable microwave transceiver used to locate electronic eavesdropping devices by detecting the semi conductor components—the transistors, diodes, etc.—which comprise their electronic circuits?
Non-linear junction detector
At what stage of a PPS project should the project team begin to develop countermeasures?
During the conceptual design phase of the overall planning and assessment phase
When using in-house resources for TSCM inspections, what best represents the necessary criteria?
At least one qualified employee is dedicated to the task on a full-time basis, and the proper instrumentation for the needs of the organization has been purchased.
In developing an emergency response structure, what is the most consideration?
A totally new organization should not be developed to handle emergencies.
Such problems should be handled by the existing organization, temporarily reconfigured, along with executives responsible for the day-to-day operation of the enterprise
In the event of an emergency, who should be responsible for equipment shutdown
Those familiar with the process
What are the featured of public sector emergency planning?
Mitigation,
Preparedness,
Response, and
Recovery
What are the three words that summarize what to do in the event of an earthquake
Duck, cover and hold
The Weingarten rule
Established the right of a bargaining unit employee to be assisted by a union representative at an investigatory interview to which the employee has been summoned by management, when the employee reasonably believes that disciplinary action may result from the interview
What is the name given to an accusatory meeting between an investigator and a person suspected of committing a crime or act of misconduct?
Interrogation
In general, when investigating which of the following should be interviewed first
Persons who are likely not to be around
Compared to non-abusing employees, employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file how many times as many workers’ compensation claims?
Five
This schedule of drug or substance has a high potential for abuse and currently has no accepted use in medical treatment in the United States. Examples are hashish, marijuana, heroin, and lysergic acid diethylamide(LSD). What schedule is it?
Schedule 1
What types of drug is Methaquadone
A depressant
After alcohol, which is the second most common drug of abuse in the workplace
Marijuana
Drug testing is a scientific examination of a biological specimen for the presence of a specific drug or its metabolite. The type of specimen analysed most often is:
Urine
Under which circumstances would an undercover investigation be prohibited
Unions are agitating and planning industrial action
In the context of undercover investigations, what is meant by the term “coldhire”?
The investigator applies for a position and is processed just like any other applicant
The design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means – a crime prevention theory grounded in environmental criminology – is known as:
Crime Prevention through Environmental Design.
The Big Five model of personality categorises personality traits into one of five types: Surgency Agreeableness, Adjustment ,Conscientiousness and Openness to Experience. Which best describes Surgency?
This refers to leadership and extroversion
The C.I.A. triad is an abbreviation that is used to determine the security requirements of Information Systems (computers). What does the letter A stand for?
Availability
Acoustic glass break detectors can be installed on walls or ceilings. Detection is best when installed:
On a wall opposite the protected glass.
What is the name given to the simple tool that uses detection, delay, response and communication values to determine what the effects are on these values when the physical security parameters are changed?
The EASI (estimate of adversary sequence interruption) Model.
When project managing the implementation of new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment (and models) he/she requires the correct type of specification should be:
Request for Proposal
What is the preferable approach to budgeting?
Top down and bottom up
Where would you expect to find all on going non-salary expenses
Sundry expense budget
In a study by John Clark and Richard Hollinger, it was generally accepted that every employee is tempted to steal from his employer at one time or another during his career, based on:
The opportunity to steal
Emergency management has three primary objectives, as follows:
Minimise probability of a threat or emergency,
Minimise impact,
Recovery and resumption
What is considered the most critical aspect of an investigation?
Interviews.
What is the primary purpose of an internal private sector security investigative organisation?
To protect the interests of the employing enterprise
The primary purpose of a background investigation is to prevent losses and:
Mitigate damages
Explosions may be:
Mechanical, chemical, or nuclear
If you, as an executive protection specialist, are walking with a principal and you encounter a street demonstration ahead, what would be the best action?
Remove the principal from the immediate danger by trying to leave the area in a car.
What is the primary objective of assets protection?
To manage risks by balancing the costs and benefits of protection measures
It takes as little as 45 seconds to batter a 12–15 inch hole through an eight inch, mortar filled concrete block wall with a 10 pound sledge hammer. How long will it take to breach a 5 inch, mortar-filled concrete block wall with one-half inch steel reinforcing rods?
55 seconds
In the event of the device circuitry of an intrusion detection system, opening, shorting or grounding, what should the system be designed to do in response?
Activate an alarm
Which type of sensor is able to detect objects that are either warmer or cooler against (or when compared to) background temperature, and whose effectiveness diminishes as background temperature approaches that of the intruder?
PIR(Passive infrared)
Human beings and dogs have the same basic senses, but some of the dog’s senses are much more acute and developed. Which is the correct list of the senses of a dog in order of importance when used for protection purposes?
Smell, hearing, sight, touch
The greatest protection of corporate assets occurs when the appropriate mix of physical, procedural, and electronic security measures are in place……:
In relation to the value of the assets being protected
Who bears the responsibility to provide the resources needed to enhance the protection of assets?
Senior management
What represent purely intangible assets
Management style,
Worker retention,
Past performance,
Relationships.
What, according to Fennelly, are important tools in crime prevention programmes?
Planning,
Management,
Evaluation.
With generic workplace violence, security programs aim:
First to divert someone from committing an unsafe or harmful act and then,
If diversion is unsuccessful, to delay the person’s progress in committing the act
Until trained individuals are notified and respond to the problem.
For applications in which lighting levels are likely to change throughout the day, which one types of camera lenses would be most suitable?
Auto Iris
What represent the two most important considerations in anew CCTV project, in order of importance?
Camera, lens.
What statements is most accurate with regard to anonymous informants?
Caution needs to be taken with anonymous informants, as they are the most likely to provide false or biased information
When interviewing as part of an investigation, which one of the following is the most important factor of a successful interview?
The ability of the interviewer to establish a favourable rapport with the interviewee.
What are the four elements of physical design?
Territorial definition,
Surveillance,
Building forms,
Compatible building placement
What is the first and most important output of the planning and assessment phase of any security design project?
Basis of design
Which type of light has an extended restrike time?
High intensity discharge(HID Family)
What represents the most appropriate lighting level for cash collection and vehicular access control areas?
5 fc (approx 50 lux).
According to the Reid technique for interviewing, there are at least four objectives of an interview/interrogation. Which are the specific objectives?
To obtain valuable facts
To eliminate the innocent
To identify the guilty
To obtain a confession
The purpose question, the “you” question, the knowledge question, the suspicion question, and the vouch question are all techniques used in the:
Behaviour analysis interview.
In the course of an investigation interview it may be necessary to make a promise to the interviewee. What is the criterion that applies to making promises?
The interviewer must be certain that whatever is promised can be legally performed
What are the characteristics of a post order?
Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy-to-understand terms.
Orders are indexed in detail
In the US, there are three classification of evidence that the courts will consider. They are:
Direct,
Real,
Circumstantial.
What is the cyclic operating principle of ISO’s management systems standards?
Plan, do, check, act.
What is the general rule when sending away a computer for forensic examination?
Submit only the central processing units and the internal and external storage media.
What is often the greatest security threat to the flow of commerce?
Theft and fraud.
To what does the following definition refer: Set out in writing by a business unit’s top leadership. It does not focus on day-to-day operations but provides a general direction, and is the fundamental template for decisions that define and support long-term goals:
The organisational strategy
Defining a security problem involves an accurate assessment of three factors, as follows:
he loss event profile,
The probability of those threats becoming actual loss events, and
The effect on the assets or on the enterprise responsible for the assets if the loss occurs.
You have need to interview a retail employee suspected of not ringing up items in a cash register. What kind of interview would you undertake?
Investigatory interview.
In CCTV systems coaxial cable is commonly used and is generally sufficient for analogue cameras transmitting up to a distance of how far without signal amplification?
1000 feet
The most important aspect of a successful interview is:
Rapport
In investigative interviewing, if a suspect uses harsh, realistic words such as steal, rape, kill, rob, or stab, this is often an indication of
Truthfulness.
In general, effective executive protection requires rings of protection. What best conceptualises this?
An outer perimeter,
One or more inner perimeters, and
In some cases a safe room
One personality assessment designed to gain a better understanding of a person’s weaknesses and strengths, and which is based on four sets of mental preferences, is called:
The Myers-Briggs Type Indicator.
What are the underlying concepts in relation to CPTED (Crime Prevention through Environmental Design)?
Improve the quality of life by deterring opportunities for crime and
Reducing the fear of crime. As such,
It also supports an improved security/asset protection
Posture and security awareness for the organization and/or facility where it is implemented.
There are several theories and assumptions which have been made and accepted about human behaviour, motivation and morale. Douglas McGregor’s Theory X and Y are amongst these. Which of the following describes a possible attribute of a Type X person?
No initiative and does not accept responsibility
A basic problem with fully implementing community policing involves there sources and personnel levels associated with these tasks. That challenge may lead public police to:
Transfer tasks to, or supplement their strength with, private security personnel.
Assuming that security officers work 40 hours a week, each post that is staffed 24 hours a day, seven days a week, and compensating for sick, vacation, and holiday leave, requires how many officers?
4.5 officers
A common way of classifying risks (especially in the insurance industry) is by dividing them into pure and dynamic (aka business or speculative) risks. Which of the following is an example of a pure risk?
Labour shortage
The real value of cost-effective data gathering comes in:
Making periodic cumulative reports to senior management
Fences, including gates, constructed entirely of barbed wire intended to discourage human trespassing should not be less than
7 feet in height, plus a top guard.
The most important activity for an undercover operative is:
Learning the job and becoming familiar with surroundings
Ultrasonic sensors are usually limited to indoor applications where types of movements are less varied than those found in
Typical exterior environments
The most popular door sensor is known as a:
Balanced magnetic switch
In the event of a large-scale disaster incapacitating so many board members that a quorum is no longer possible, a suggested method for emergency management is:
For board vacancies to be filled by the remaining board members
In a very sensitive situation, what method is typically used to shield electromagnetic energy from information processing devices from interception?
Faraday cage
In developing an organisational strategy, what is the first step?
To understand what the business currently entails and where it needs to be in the future
After employees, which is the second most valuable resource?
Corporate knowledge
The efficiency of the security force depends primarily on the:
Adequacy and skill of its supervisors
What is the most effective management style for a supervisor?
To acknowledge credit for good performance and be objective when noting deficiencies.
Insurance is often divided into two general categories:
Property and liability.
Barriers are commonly used to discourage three types of penetration
By accident,
By force, and
By stealth.
Perhaps the most common shortcoming in the security industry is
Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisory training)
For a security professional, which of the following demonstrates a recommended way to calculate the Return on Investment (ROI)?
Avoided losses plus recoveries made, divided by the cost of the security programme
Who should be responsible for escorting visitors on site?
Whoever invited the visitor.
The management practice that separates the ultimate and the operating responsibility for accomplishing tasks is known as:
Delegation of authority.
The manifestation of an ability of intent to affect an asset adversely is defined as a:
Threat
The employee theft formula includes:
Motivation
Opportunity
Rationalization
The number of subordinates that can be effectively managed by one manager is known as the
Span of control
Estimate of investments needed in property, buildings, and major equipment
Capital expenditure
The lighting levels for an open area car park and an employee entrance, respectively, are:
2 FC and 5 FC
The job of managing involves 5 basic functions. They are
Planning
Organising
Directing
Coordinating
Controlling.
Another term for a capacitance sensor used to protect a perimeter fence is:
Electric Field
Which kind of lock finds continued application in such varying situations as desk, cabinet and locker installations, bank safe deposit boxes and U.S. mail boxes?
Lever lock
Which wall fabrics is the most resistant to bomb blast?
Thick, reinforced concrete walls
What is the minimum thickness of a 4-hour fire resistive vault with reinforced concrete walls?
8 inches
Vaults which are designed to protect large amounts of negotiable, valuable or sensitive information against forced entry should have reinforced concrete walls of what thickness?
12 inches or thicker
Which classes of safe is specifically designed to protect its contents against attack using cutting torches, but not explosives?
TRTL-30
Which classes of safe is suitable for the protection of magnetic media against fire?
125-4
Which types of lamp has a typical re-strike time of 10-20 minutes?
Mercury vapour
This kind of sensor may be utilized in outdoor applications as well as indoors because it is not generally affected by heavy fog, rain, snow, sleet, air turbulence, drafts, noise, temperature extremes or atmospheric disturbances. When utilized for area protection, the wave pattern is designed to flood a room or area being protected. When used for perimeter protection, a narrow beam is directed around the area or zone to be protected. What is it called?
Microwave
This type of sensor is a large electrical condenser that radiates energy and detects change in the capacitive coupling between an antenna and the ground. In a typical installation, a sensor wire is connected to an object to be protected, such as a safe or file cabinet. What is it?
Capacitance
What are the benefits of a business impact analysis
Identifying legal, regulatory, and contractual requirements for the organization’s activities and resources
Identifying the potential impacts over time of disruptions resulting from uncontrolled, non specific events on the organization activities and resources
Evaluating resource requirements, activity, and external interdependencies to resume operations within the recovery timescales identified
What is the name given to glass which is heat-treated to resist breakage and can be utilized for both safety and security purposes, but which is not as resistive, however, as laminated glass?
Tempered glass
What is the name given to a plastic or polyester film available in a variety of shades, that is applied to the interior surface of glass, and which has a life up to 10 years and does not deteriorate significantly?
Cement on plastic
What abused drug in large doses intensifies the user’s high but may also lead to bizarre, erratic, or violent behaviour, along with tremors, vertigo, muscle twitches, paranoia, or a toxic reaction, with some users reporting restlessness, irritability, and anxiety?
Cocaine
If somebody suffers changes in perception, thought, and mood, experiences physiological effects including elevated heart rate, increased blood pressure, and dilated pupils, with sensory effects that include perceptual distortions and psychic effects that include disorders of thought associated with time and space, what type of drug is most likely being abused?
Hallucinogen
Insurance is a form of risk
Transfer
What is the name given to the drug which comes from the peyote cactus, and certain mushrooms?
Mescaline
What is the name given to the unusual condition whereby kidnap victims form an emotional or sympathetic bond with their abductors?
The Stockholm Syndrome
The way to detect individuals who are destabilized and seeking control is to:
Assess their mental and emotional levels along a continuum of violent behaviour and then develop a plan to divert them from violence through a case-specific use of
Communication,
Company resources,
Community resources, and
The legal system
Policies and programs dealing with inappropriate workplace conduct, including harassment, intimidation, and discrimination, should be seen as:
Related to the violence risk assessment program because in some cases such behaviours are early warning signs that can lead to violence
When is a vulnerability assessment performed?
After the threats and assets are defined
What should be specifically developed during an advance?
Law enforcement contacts
To what does the following definition refer? Used to detect lying during the course of an investigation. A device used as a lie detector. It records voice stress as questions are asked. It has no hook-up, so can be used covertly.
Psychological Stress Evaluator.
When reviewing applications for employment, all gaps in employment or life history of more than what duration should be investigated?
1 Month
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system.
Argvris
This theory holds that two worker models can be contrasted. Theory X contends that workers are inherently lazy and tend to avoid work. They lack creative ambition, must be goaded, require constant supervision, and are motivated by fear. Theory Y states that workers are naturally motivated and want to work hard and do a good job. It assumes that workers are thoughtful, eager to perform well, and willing to be guided and taught. Whose theory is it?
McGregor
What is the name given to the document that is composed of three elements: functions of a job, responsibility and authority vested in the job, and relationships of the job?
Job Description
In the course of an investigation, what is profiling used for?
It is used to exclude people from an investigative pool of subjects so as to conserve investigative resources
When recruiting, to deal with the many resumes that may be submitted in response to a public listing, staff must filter the resumes and invite only the most viable candidates for an interview. One recommended way to reduce this labour is:
To hire external recruiters.
Staffing decisions should be measured against a detailed:
Job requirements analysis
What type of advertisement is recommended for hiring skilled, technical and managerial (non entry-level) personnel?
Blind ad.
Fill in the missing word(s). ………………. are based on standard operating procedures (SOPs),which should be site-specific. The SOPs are a compendium of procedures for the security group to follow in day-to-day operations. They may also include emergency response procedures
Post orders.
What is the primary limitation of financial statement analysis?
It does not directly consider changes in market conditions.
This statement summarizes an organization’s investing and financing. The report’s underlying equation is as follows: assets = liabilities + shareholder equity. What is it called?
Balance sheet.
Strategy is management’s effort to focus resources on specific targets that lead to business success through proper planning. A financial strategy is:
Management’s financial approach to determining the expected returns of its investments (including its departments and operations) and estimating and managing the relevant risks.
Complete the following sentence: The time has come to:
Institutionalize coordination and cooperation between security and police personnel through structural and contractual relationships
According to the formula by astronomer Marquis de Laplace, when events are independent of each other, the probability of their simultaneous occurrence is the product of their separate probabilities. Which of the following sentences best illustrates this?
The probability of one detection system in the security system being circumvented is high, but the probability of all the detectors and barriers in an in-depth or redundant security scheme being compromised is very low.
What is the most important measure for loss impact (or criticality)
DOLLAR
A security countermeasure should be planned if the loss event will produce an actual loss, measurable in some standard medium such as dollars; and:
The loss is not speculative in the sense that non-occurrence of the event would result in a gain.
Which type of bond requires that an employee(s) be investigated to limit the risk of dishonesty for the insured?
Fidelity Bond
What is the name given to the crime prevention strategy that uses psychology, architecture, and other measures to encourage desirable behaviour and discourage undesirable behaviour?
CPTED
The most consistent predictor of employee theft is?
Employee’s perceived chance of being detected
Oscar Newman argued that physical construction of a residential environment could elicit from residents behaviour that would, itself, contribute in a major way toward their security. What did he call this concept?
Defensible Space.
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system
Argvris
In an emergency which answer best describes the person responsible for initial implementation of the plan?
The senior manager present on site
One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers. Liability is obvious when the weapons are issued to:
Proprietary officers.
Which terms best describes: “To prevent confusion during an organised effort, no subordinate should report to more than one supervisor”?
Unity of Command
Employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. What would be an acceptable alternative?
LED
Which of the following is correct in relation to lighting levels?
Detection 0.5 fc
Recognition 1.0 fc
Identification 2.0 fc
When specifying lighting for indoor precision manual work where good CRI is essential, which of the following will produce the best results?
Incandescent.
Lighting is a form of:
Detection
What gives the greatest reflectance?
Grass.
You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?
Low pressure sodium
Coaxial cable is limited to transmitting analogue video signals over distances of:
Less than 1,000 feet.
Which kind of lens reduces the number of different kinds of lenses an installer needs to carry?
Varifocal.
What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?
Electronic shuttering
What is used to minimise the number of monitors security personnel must watch?
Multiplexers
What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?
Automatic gain control
In a CCTV system, for subject identification to be effective, what percentage of the screen should the subject occupy?
At least 20% of the scene’s width.
Which lens has become the standard for camera and lens design?
The DC/LC lens
Which has the greatest impact on CCTV system performance?
Lighting
If a camera is mounted on the side of a building, 40 ft. from the ground, and the center of the scene is 30 ft. from the building, what is the distance between the camera and the scene?
50 ft
Scenario: You are required to protect a safe during daytime in a room in which there is a limited degree of human movement, although not in the immediate vicinity of the safe. Which sensors would be appropriate?
A capacitance sensor
Which kinds of sensors would not be suitable where there are draughts passing through the detection pattern and nearby railroad tracks?
Ultrasonic
Which types of sensors are grouped as fixed and rate of rise?
Heat
In PIR sensors, detection is based on the difference in temperature between the intruder and the background. This difference is called:
The minimum resolvable temperature
The most common intrusion sensor is:
PIR
The most common type of sensor used to detect intrusion through doors is a:
Simple mechanical switch, using a magnetic reed.
What is considered an advantage of volumetric motion sensors?
They will detect an intruder moving in the detection zone regardless of the point of entry into the zone
Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?
Microwave
Two ways to reduce nuisance alarms on fence-mounted sensors are i) the use of rigid fence posts and tight fence fabric, and:
Installing the sensors on the inner fence of a two-fence system.
Which perimeter sensor types would likely generate nuisance alarms if deployed close to a creek (stream)
Ported coaxial cable.
The 3 fundamental components of an intrusion detection system are sensor, annunciator and
Control unit
Which sensors has the lowest NAR?
Dual tech
Complete the following statement: When a high PD is required at all times and under all expected weather conditions…
The use of multiple sensors is recommended
The three main characteristics of intrusion sensor performance are:
Probability of detection
nuisance alarm rate
vulnerability to defeat.
The 3 core concepts (first principles) of CPTED are:
Natural access control
Natural surveillance
Natural territorial reinforcement
Shipping and receiving areas should be
Separated to the extent possible.
Which crime prevention theory has as its theoretical framework the Rational Choice Theory?
Situational crime prevention
Which crime prevention theory, influenced by CPTED, seeks to reduce crime opportunities in all behavioural contexts, not just buildings and other spaces?
Situational crime prevention
Which concept, developed by Oscar Newman, became the foundation for CPTED?
Defensible space.
What is the name given to the design approach that seeks to reduce crime opportunity and fear of crime through natural, mechanical and procedural means?
Crime prevention through environmental design.
The use of a feature criteria approach to PPS design:
Should generally be avoided
Having more than one cash register in a retail site is an example of:
Risk spreading
A well-engineered PPS exhibits the following characteristics:
Protection in depth,
Minimum consequences of component failure,
Balanced protection.
Why would a compliance-based vulnerability analysis process be inappropriate for assets which are exposed to a high probability of malevolent adversary action and which have a high consequence of loss?
Because in this process the measure of system effectiveness is based on the presence or absence of components, and not the ideal of performance
Measures of effectiveness for an entry control system are
Throughput,
False acceptance rate,
False rejection rate
Key measures of the effectiveness for the detection function are: i) The probability of sensing adversary action, and:
The time required for reporting and assessing the alarm
The major part of a vulnerability assessment is the
Facility characterization
The key factor that differentiates a security risk from a safety risk is:
Malevolence
In considering the adversary threat type, tactics, mode of operations, capabilities, threat level and likelihood of occurrence we arrive at the…
Design basis threat.
What is the name given to the process that establishes a baseline of PPS effectiveness in meeting goals and objectives?
Vulnerability assessment.
The building blocks of a PPS are:
People,
Procedures,
Technology
Threat many be defined as:
The combination of adversary capabilities, equipment, motivation or intent, and likelihood of attack
Asymmetric encryption
Is a method of communicating in a network using two different but related keys-one to encrypt and the other to decrypt
The function of probability and consequence magnitude and imminence is known as:
Risk
Measures the consistency with which the countermeasure achieves its functional objective.
Validity
Recommended actions of a security manager in the departmental meeting are
Set the directions
Establish professional setting
Establish open exchange of information with
subordinates
The fundamental idea behind an information security management system is
Continual improvement
Oscar Newman’s theory is commonly referred to as
CPTED
Primary resource of an organization
People/Employees
Factors responsible for response time to alarm by police
Increasing numbers of alarm users
From a remote location security officer should report to whom
Security manager at the Headquarters
The major reasons for the use of locks and key are
Deter entry
Reduce numbers of guards
Restrict unauthorized access
Prevent surreptitious entry
The difference between interview and interrogation is
The person being interviewed
Advantages of contract security over police are
More flexible use of labour
Richer array of incentive and penalties
More precise allocation of accountability
Less constraint on process more focused on
results
How would an investigation unit get management support for funding
Demonstrate the unit pays for itself
On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility, is what type of alarm transmission
Central alarm
Who uses PCI-DSS
All companies involved in credit card issuance
The general factors to be considered in setting up a perimeter detection involves what
Uniform detection
Combination of sensors
Use of multiple lines of detection
Complementary detection
Continuous line of detection
The cyclic operating principle of ISO management system standard is
Plan-do-check-act
When an executive is travelling abroad the EPS main role is
Learn the key points of local social custom
Budget=capital, salaries and what else
Operational
Main task of the EPS is
Prevent and avoid danger and dangerous places
Why short down during emergency
Speed-up recovery process
The percentage of the total capital system construction cost that is for maintenance and warranty cost is
11%
Individuals who don’t know themselves wanting to conduct secure transactions through a non-trusted channel would use what
Certificate
Which terms are used to describe assets on the balance sheet
Inventory
Accounts receivable
Prepaid accounts
Accumulated depreciation
Cash
Property ,plant, equipment
Another name for business ethics is
Applied ethics
Validity
A verification that a PPS component is able to do what is expected to do and is suitable for the use it is being selected to do
If a light burns for 15,000 hrs. the lumen per watt is its efficacy
150 watts
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
Two types of metal detectors are
Passive and Active
Passing through a sensor’s normal detection Zone without generating an alarm is
Spoofing
There is serious threat to security and fear of attack in a college, the security measure that would be most appropriate to address this situation is
Utilize the spaces and playgrounds in the college and surroundings areas to establish ownership of space
HIPS is
Host intrusion protection system
Reason for conducting pre-employment and back-ground screening is
Prevent loses and mitigate damages
COOP is used by
U.S federal government
A first line manager is
Supervisor
Evidence of truthfulness relates to which specific words
Reference to:
Rape,
Kill,
Steal
The primary limitation of financial statement is
It does not consider changes in market conditions
A sensor that achieves absolute alarm confirmation by combining two technologies is
Dual technology
The general purpose of undertaking of a vulnerability assessment is
To establish a baseline of the PPS effectiveness in meeting goals and objectives
The light that is good for video surveillance is
Incandescent
Accessing a computer remotely by placing malware on it, perhaps while the use is visiting a website is
Hacking
A building generally becomes a ‘‘high rise’’ at what point
Higher that the maximum reach of available firefighting equipment approximately 23 meters to 100 feet
Maslow first hierarchy of needs is
Physiological
In the development of the business continuity (BC) and continuity of operation plan, the most time critical factor of the plan is
To resume critical functions as quickly as possible
The time period when a formal audit of the emergency plan is done is
Annually
The second level UL fire resistant safe will resist fire for what duration
2 hrs
Dynamic element in leadership communication tool in an emergency management program is
Changing of leaders telephone and pager numbers when any of the members is changed
A major resource for pre-employment screening is
Application
Disguising information as to make it unintelligible to protect proprietary information is
Scrambling
The percentage of employees responsible for 95% of workplace theft that requires identification and focus by a security manager is
5%
An information communication attacking agent is
Trojan horse
‘‘VSAT’’ is
Vulnerability self assessment tool
Modern management have come to realize that the most cost-effective way to deal with fraud in the work-place is
Preventing it
A technique of excluding people from an investigative pool of subject, so as to conserve investigation resources is
Profiling
The main advantage of smart card is
Has large memory and high degree of resistance to compromise
The job of the first responders in a workplace
violence incident is
Divert
The time period a switcher automatically switches from camera to camera is
Dwell-time
For each threat, the remaining potential risk after all ISS countermeasures are applied is
Residual threat risk
Business related concerns to be addressed by a violence risk assessment are
Liability
Workplace morale
Productivity
Associated costs
An organization is constantly experiencing break-ins with most occurring at night times , which sensors would be most appropriately use to address this situation
Vibration sensors
The most important in information security is
Management buy-in
The culture of a corporate organization is
A pattern of shared basic assumptions that a group learned to solve its problems
A critical consensus that must be made when operating a JTF from the onset is
Defining critical information
Going after a system by accessing it via normal channels, by exploiting vulnerabilities is
Direct attack
A major interior constituent for a record safe is
Moisture
Inducing a person to commit a crime is
Entrapment
Resolution of a digital camera is measured in terms of
Common intermediate format
A technique adopted in information security that prevents individuals access to the actual data is
Cryptography
What are the assessment levels of a workplace violence risk assessment
Initial
Comprehensive
Threshold
Initiating a general discussion with an interviewee, before direct questioning in order to accomplish rapport can be achieved by using
Hidden persuaders
This is fueling commercial technology theft in many organization
Continued fierce global economic competition
The worldwide internet standard for communication over which network PPS communicate is
TCP/IP
A business specifies its type of product or services and level of quality in a more concrete statement called
Mission
A significant area of vulnerability for U.S national security is constituted by who
Insiders
The use of information system to commit crime is
Cyber crime
When there is an emergency and a company allows others to have access to its facility, this action is
Rapid entry system
The most misunderstood form of investigation is
Undercover
How do you protect most valuable information
Encryption
Professional ethics is meant to serve
Relate to employees in humanistic manner
The type of questioning most appropriate at the primary phase of an interview is
Narrative questions
To aid the security professional to better be positioned to measure his departments effectiveness and report back to senior management is achieved by
An incident reporting system
The second most important decision in the application of CCTV program is
Choice of lens
The broad classification into which information systems countermeasures are divided are
Administrative controls,
technical controls,
physical controls
A popular method of obtaining information from a phone line by eavesdroppers
Inductive/direct coupling
A alarm as a result of equipment failure is
False alarm
The theft triangle consist of
Desire(Needs or want)
Rationalization(Motive)
Opportunity
Removing all the cash from the register in the night to eliminate the opportunity of robbery is an example of
Risk avoidance
The de-facto standard communication mechanism in the corporate arena is
E-mails
The sensor that activates an alarm when an intruder is made to go either towards or away from the field of detection is
Microwave
When developing security incident response plan, the most important element is
The policy document
The best way to reduce internal theft in an organization is
Hire employees with integrity
When planning for security, the security professional should always consider
Culture of the organization
The advantage stored image has over manual photo I.D system is
Difficult to tamper with stored image as its comparable to badge exchange
An interview with an employee who has defrauded the company of a large sum of money is
Interrogation
‘‘Vision’’
Specific description of where the business will be in the long term
The first and most crucial question in defining business purpose and mission is
Who is the customer
‘‘Quality’’
Conformance to customer’s requirement
In emergency plan review, what are considered dynamic information whose review must be accurately
Floor plans
Contact numbers
Key assets
Key personnel
The three ‘‘I’ S’’ that are referred to as the tools of the investigator are
Information,
Interrogation,
Instrumentation
A comprehensive analysis of a business risk and pure risk in the insurance world is
Portfolio theory
The key distinction between safety and security is
Their causes
The performing of an analysis of the potential areas of loss is the first step in good security planning is
Profile
Sensors most appropriate for deployment in an environment with explosive vapour materials are
Passive
Forecasting individual loss event that may occur is the first step in dealing with
Risk assessment
In designing a CCTV application, the security manager should keep what in mind
CCTV is a visual tool of security and should be applied accordingly
The application should dictate the equipment
No matter what, the equipment of the system will become obsolete
If the system is obsolete but still performing, it is because the original application was correctly designed
A driver who will be in haulage handling would require which pre-employment testing
Integrity test
In risk analysis, reducing consequences given the event is
Mitigation
Another name for the shift-supervisor is
First line manager
What are considered as second factor authentications
Biometrics
OTP
Encryption
If a camera is mounted on the side of a building 40ft from the ground and the centre of scene to be watched is 30ft from the building the distance from the camera to the scene would be
50ft
What is the most effective installation parameter for a glass break sensor
Installed directly opposite the protected glass
What is another name for capacitance sensor
Proximity sensor
A test that verifies that a PPS device is on and performing as expected is
Functional testing
Barriers that are always in place and are fail secure is
Passive barriers
The term given to the type of operational access control in a high rise described below is ‘‘An hour or two before and after business hours and possibly Saturday the building main entrance door remains unlocked but tenants are scrutinized closely’
Intermediate
The magnetic stripe medium mostly used in security credential application is
2,500-4000 Oersted
To protect its employees from customers who claims to incur losses and mental negligent injury to them by the employees an organization requires what coverage
Liability insurance
The basic steps in report writing are
Gather the facts
Record the facts
Organize the facts
Write the report
Edit if necessary
The quantity of light emitted by a household bulb rated 100 watts is
1700 lumen
The fundamental template for direction that defines and supports the long-term goal of an organization is
Strategy
The best light for security lighting is
Halogen
The classifications of evidence are
Documentary
Physical
Oral
If a witness sees a driver in an automobile pass through a red light and strike another automobile that had the right of way. The type of evidence this witness will give in a trial is
Direct evidence
The first step in assuring life safety in a high-rise is
Comply with applicable local building and fire codes
A report written in the cause of an investigation that gives the investigator updates and detail leads is
Progress report
The levels of building occupancy in a high-rise are, what
Open buildings
Closed buildings
Hybrid building
. Security lightings serves three main purposes these are
Support the video subsystem
Acts as deterrent for criminal activities
Provide life-safety as lighting pathway
The Human perception of the amount of light that reaches the eye is
Brightness
The extinguisher most appropriate for restaurants hood, ducts, looking appliances in kitchens and cafeteria areas is
Dry/wet chemical
Any delay before detection serves primarily as
Deterrence
An asset protection manager can justify request for additional funds for his programs from senior management by
Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced
The key components of alternative services provider would be
Order maintenance operations
During an interview if the interviewee makes a specific denial this is an indication of
Deception
The quality of an investigation that shows the depth of work done is
Thoroughness
A negative variance between the book count and actual count of various items in inventory in a retail investigation is
Shrinkage
The cornerstone of any investigative decision is
Evidence
The major responsibility of a frontline officer on, duty is
Access control
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
The biggest mistake made when conducting a vulnerability assessment is
Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level.
The advantage of private policing over public police is
Cost of service delivery
This will trigger the destruction of information but will not multiply itself refers to
Trojan Horse
A person who has vision, idealist, and more interested in future and timeless is exhibiting a mental preference of
Intuitionist
In risk analysis, reducing consequences given the event is
Mitigation
In drawing up an awareness training a consideration to make is
Organization business
Every employer’s nemesis is
Time theft
A major enemy of training is
Budgetary limitation
When kidnapped victims form an emotional bond with their abuductors this is
Stockholm syndrome
A four digits pin will allow a trial combination of
10,000
Measures a potential adversary perceives as too difficult to defeats are called
Deterrence
Categories of emergencies are natural and what else
Accidental
Man-made
Natural
The characteristics of old terrorism are
Show discretion and moderation in both selections of targets and means of attack
Organizational structures are predictable
Have political motivation, use violence as a didactic tool
Have traditional motivation
The standard that applies to all organization that hold, process and exchange card holder information is
PCI-DSS
An interviewee who uses very definitive statements during an interview is a sign of
Truthfulness
Important factors in the design of an integrated security system to pin point the best solution are
Anticipated threat/vulnerability
Needs of the facility
Constraints
A protective system is evaluated on the performance and cost-effectiveness of individual measures in doing what
Countering threats
Reducing vulnerabilities
Decreasing risk exposure
What is the most used sensor for intrusion detection
Line/boundary sensor
In an emergency, where the response is by multiple agencies, the incident commander is
Senior representative of the lead agency
The two most common communication frequencies are sound waves and what else
Microwaves /Radio waves
The business impact analysis involves which actions
Identify the organization critical functions
Assess the impact of disaster or emergency on these critical functions over time
Determine other elements of the business on which these critical functions depends
Develop and prioritize recovery strategies
An appropriate approach to create a job position for proprietary security is
Job description
If a large scale disaster incapacitates so many board members a most desirable approach is
The vacancies can be filled by the remaining members of the board
Alarm systems may be communicated on which of the following type of medium
Unshielded pair of direct current (DC)
Arrangement for storing vital records should be integrated into the BC and COOP planning list the indispensable vital records
Engineering data
Customer data
Payroll and personnel data policy
Manufacturing process data
The most important step when preparing to conduct a security survey is
Planning
Measures of return-on-investment are
Time saved
Increased productivity
Reduced employee turnover
Lower liability
Greater customer satisfaction
Gathering information on the layout of a site, the location of key assets, site operations and production capability and the types of PPS components locations by the VA team is called
Facility characterization
The appropriate person to trigger emergency rescue operation if the disaster is on a large scale is
Incident commander
Concerns to an enterprise to be addressed by a violence risk assessment which are business related are all the following except
Liability
Associated cost
Workplace morale
Productivity
A standard that is voluntary and compulsory is
Mixed standard
If an attack is within the reach of the EPS, the action most appropriate is
Cover and evacuate
The objectives of an interview are
To obtain valuable facts
To obtain a confession
To identify the guilty
To eliminate the innocent
In an organization where series of missing items are been reported, a key record of item movement and control can be adequately sourced from
Well developed security incident data base
To measure the effectiveness of the security countermeasures as to show a long-range cost saving to the company’s senior management, a manager should apply what
Efficiency vs cost
An appropriate structure to handle an incident that involves multiple agencies from multiple jurisdictions is
Unified command
In asset protection the period between major paradigm shift has been
Decreasing
In absolute number a High-rise is
23-30 meters
75-100 feet
7-10 stories
Legislation that governs the process of background screening in the U.S is
Fair credit reporting act
Workplace violence management, monitoring or closeout of the incident is determined by
The company
Which information is found in the balance sheet
Company’s operation, financing and investment
Company’s use of profit to increase shareholder equity
Assets and liability mix and how it relates to shareholder equity
The most considered in the planning stage of an emergency management program is
Identifying the key assets of the organization that need protecting
Measures of margins are
Gross profit margin
Operating margin
Net profit margin
If a large scale disaster requires a public safety response, the incident commander is usually
A senior member of the responding agency
This entails the movement of critical function and personnel to an alternative operating site in accordance with a pre-established plan
COOP plan
Modern management has come to the realization that their best option to manage employee theft and fraud is
Preventing looses
An insurance cover most appropriate for a facility with high incident of break-ins resulting in theft, embezzlement, loss of equipment
Crime coverage
An EPS initial reaction to a sudden violence attempt on the principal is
Evacuation
In asset protection the paradigm shift is in the area of technological development and what else
Conceptual shift
The major reason for installing light at the perimeter fence is
Deterrence
A hybrid budget technique is which of the following
Top-down, bottom-up
A type of budgeting technique more likely to be accepted by lower level managers is
Bottom-up
This plan is modified annually, but under what other condition can it be modified before annually
Emergency
Valid violence risk assessment requires depth of information available only for what
Known subject
Financial statements are created in accordance with
GAAP
A management financial approach to determine the expected return on its investment is
Financial strategy
The level of violence risk assessment which determines whether there is an immediate risk of harm for emergency procedures to be activated is
Initial
State the equation of the balance sheet
Assets = Liabilities + Shareholder’s Equity
The primary function of the EPS is
Avoiding dangerous persons and conditions
Evidence of truthfulness refers to what specific words
Steal,
Kill,
Rape
In the most basic sense, the purpose of an interview is
Aid an investigation into the truth
A lighting equipment most appropriate to illuminate a potential intruder while leaving the security personnel concealed is
Fresnel