PPTX Flashcards

1
Q

A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?

A

The span of control is too great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The approach aimed to make employees happy through the provision of benefits, but which fails to motivate employees to produce to their full capacity is called

A

The Custodial Theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the future, what will define private policing

A

Contract guards working in public space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A main advantage of emergency lighting is:

A

Its ability to activate in the event of a power cut.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The recommended night-time illumination level of a self-parking car park is:

A

1 fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?

A

Low pressure sodium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A clear zone of how much should separate perimeter fences and internal structures?

A

50 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which types of sensors are grouped as fixed and rate of rise?

A

Heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which kinds of sensors would not be suitable where there are drafts passing through the detection pattern and nearby railroad tracks?

A

Ultrasonic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Theft Triangle depicts which of the following causes of crime?

A

Opportunity,
Motivation,
Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where is an executive most vulnerable?

A

At home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to Kinney, the single biggest deterrent to violence in the workplace is:

A

Careful hiring and screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The two types of plastic glazing used in buildings are:

A

Acrylic and polycarbonate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?

A

Electronic shuttering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?

A

Automatic gain control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When specifying lighting for indoors precision manual work where good CRI is essential, which of the following will produce the best results?

A

Incandescent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the follow relates to Halogen lighting?

A

Low efficacy; high CRI; instant restrike.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What differentiates public sector COOP (continuity of operations) from private sector BC (business continuity):

A

COOP entails the movement of critical functions and personnel to an alternate operating site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should you use an undercover investigation?

A

As a last resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?

A

Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most popular sensor?

A

PIR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The 3 fundamental components of an intrusion detection system are sensor, annunciator and?

A

Control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is used to minimize the number of monitors security personnel must watch?

A

Multiplexers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which kind of lens is specifically designed to reduce the number of lenses an installer needs to carry?

A

Varifocal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Oscar Newman

A

Set out the foundation for CPTED in his work on defensible space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following limits the number of keys that can be issued?

A

Master keying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Lighting is a form of

A

Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The Psychological Stress Evaluator works on the principle of:

A

Blood pressure and pulse rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following safes should you recommend to protect encrypted computer back-up media?

A

150-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A typical role for the security manager in an emergency management structure is:

A

The EM Coordinator, responsible for EMPl an maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Logical access control is based on?

A

Identification;
Authentication;
Authorization;
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The risk of a hostage coming to sympathize with the abductors’ cause is known as:

A

The Stockholm Syndrome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following would be found in an operating budget?

A

Maintenance costs for a PPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What statement is correct with regard to discipline?

A

All employees require constructive discipline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which sensors has the lowest NAR?

A

Dual Tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What sensor would you expect to find on windows and doors?

A

Magnetic switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the purpose of an investigation at the strategic level?

A

To plan, organize, equip, staff and prepare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

For outcomes of corporate investigations

A

It is advisable to have clear-cut policies on acceptable outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

One IDS installation which makes it more complex for an attacker to disable the entire system is:

A

Point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the name given to the risk management strategy of spreading the sites of cash registers in a retail outlet instead of just having one central location?

A

Risk spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Car park employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. Which of the following would be an acceptable alternative?

A

High pressure sodium or LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In logical access control, what follows authentication?

A

Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following are recognised search techniques for IEDs?

A

Occupant, warden, team, high risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the followings is one of the most effective psychological evaluations in a pre-employment screening program:

A

MMPI (Minnesota Multiphasic Personality Inventory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the name given to fire sensors that are sensitive to the invisible products of combustion during the early stages of a fire?

A

Ionisation detectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which kind of evidence degrades with time and temperature?

A

Organic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What level of lighting is required for a pedestrian entrance?

A

5 fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the most common kind of sprinkler system?

A

Wet-pipe system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the most widely used method of controlling physical access:

A

Locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Oxycodone is a:

A

Narcotic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Security managers should

A

Be as much a business manager as a security specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In developing strategy we look:

A

3-5 years ahead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The first step in developing a business strategy is:

A

Understanding the business and where it needs to be in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

An organization’s primary resource is its

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Two common ways of classifying risk, originally coined by the insurance industry, are:

A

Pure and dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Against what should staffing decisions be made?

A

A detailed job requirements analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The best way to recruit a good candidate is to

A

Seek internal recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The metrics for evaluating employees should align closely with the organisational strategy.

A

or example, if the strategy calls for growth, then the metric for mid-level managers may be to grow their business units by a certain percentage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Realistically, if a company wants to improve margins it has two options. What are they?

A

Reduce costs or increase price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Three financial reports or statements have become accepted as standard.

A

Income statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Financial statements are created in accordance with:

A

GAAP (Generally Accepted Accounting Principles)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the underlying equation of the balance sheet?

A

Assets = liabilities + shareholder equity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following are considered cash equivalents on the Balance Sheet?

A

Current assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the primary limitation in financial statement analysis?

A

It does not consider changes in market conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the main purpose of a budget?

A

To provide a financial tool that estimates costs and revenue.
To provide a variance warning mechanism.
To provide fiscal uniformity for the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services, or processes is known as

A

Standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

In ISO, the main committee working on security activities is………………….. The committee has a broad scope, addressing security, business continuity, crisis management, disaster management, and emergency response. The committee examines crisis management and organizational continuity related to all types of disasters and disruptions, including intentional attacks, unintentional accidents, and natural disasters. The committee focuses on what an organization should do before, during, and after an incident. The committee also addresses interaction and interoperability between organizations.

A

ISO/TC 223: Societal Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which is the administrator and coordinator of the US private sector voluntary standardisation system?

A

American National Standards Institute(ANSI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the operating principle of ISO’s management systems standards?

A

Plan-Do-Check-Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:

A

Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Those responsible for conducing security awareness programmes for staff should be:

A

Security personnel in general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

The most consistent predictor of theft in all industries:

A

Is the employee’s perceived chance of being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Most fraud perpetrators:

A

Are influenced by an opportunity to profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following are more likely to be tolerant of internal theft?

A

Employees with less tenure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Defalcation specifically deals with the misappropriation of trust funds or money entrusted to a:

A

Fiduciary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which security system elements will significantly increase the chances of detecting the vulnerabilities and gaps that lead to employee theft and fraud?

A

Clear organisational policies, procedures and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The Theft Triangle depicts which of the following causes of crime?

A

Opportunity,
Desire,
Rationalisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A process for screening job applicants for past trust violations and periodic employee communications that include past case studies are two of many elements in a programme designed to prevent:

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

The greatest on going threat to the survival of a business is:

A

Internal theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are the most frequent and costly forms of dishonesty the security professional will likely encounter?

A

Theft and Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

An incident reporting system does two things that could not otherwise be done. One is that it provides a history of events occurring to the organization. What is the other?

A

Provides a basis for professional efforts at asset recapture, recovery or incident reduction or termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Many experts agree that the most effective deterrent to internal theft is:

A

Fear of discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The only way an operating function (such as security) can justify continued funding is to:

A

Demonstrate that the real costs to the enterprise would be greater if the level of support for that activity were reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

To senior management, what is the primary factor in determining the size or existence of an asset protection programme?

A

Cost-effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Bonds that indemnify an organization in the event of dishonesty on the part of an employee are known as:

A

Fidelity bonds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Most insurance policies cover:

A

Direct loss only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Insurance is often divided into two categories:

A

Property and liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The best-known form of risk transfer is

A

Insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Whose theory is premised on the belief that the opposite of satisfaction is not dissatisfaction, but simply no satisfaction?

A

Herzberg.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?

A

The span of control is too great.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The approach aimed to make employees happy through the provision of benefits, but which fails to Motivate employees to produce to their full capacity is called:

A

The custodial theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

The job of managing involves 5 basic functions, which are:

A

Planning,
Organizing,
Directing,
Coordinating,
Controlling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Success in the management of assets protection depends on the proper balance of three managerial dimensions, which are:

A

Technical expertise,
Management ability,
The ability to deal with people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

The process of scoping out potential loss events is known as:

A

Loss event profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The ultimate responsibility for internal security within a department should rest with:

A

The department’s line manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

The principle of unity of command may be broken:

A

During an emergency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Assets protection is increasingly based on the principle of:

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which of the following is an example of an activity that falls within the broad remit of assets protection?

A

Emergency management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Cash is an example of what kind of asset?

A

Tangible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:

A

Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

In the future private policing will be defined by:

A

Contract guards with proprietary supervisors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

The concept whereby security of an industrial facility is handed by a private contractor is known as

A

Private substitute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

The concept whereby private contractors augment regular police in law and order maintenance in publics areas is known as

A

Public supplement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Public/private policing partnerships should

A

Be built around structural and contractual relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Whose reports sought to compare the US security industry to public law enforcement quantitatively

A

Hall crest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is a significant distinction between public and private policing

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What makes private policing an attractive option

A

Private policing is inherently proactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Felson and Cohen postulated that crimes are typically a product of three factor

A

Motivated offender, a suitable target, the absence of a capable guardian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue was put forward by

A

Kelling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

A simplified explanation of why employees steal is:

A

The theft triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue is more generally known as the:

A

Broken window theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

The levels of fear are greatest when there is a concern about both incivility and

A

Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Training for private security officers who provide policing services in public areas should be:

A

Role/task specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

We find that mental illness

A

Only rarely plays a key part in assassination behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

An executive is most vulnerable

A

At home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

In high risk situations the executive is usually accompanied by

A

An EP specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Five of the key principles that can guide one’s thinking about EP are: realise that anyone can protect anyone; don’t stop to think; keep clients out of trouble; understand the security vs. convenience continuum; rely on brains, not technology. What is the sixth

A

Prevent and avoid danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

When an EP specialist researches a destination to which an executive is due to travel, this is called

A

An advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

If a protected executive must travel locally, the ideal arrangement will be to:

A

Place the executive in a suitable car driven by a trained security driver and accompanied by the EP specialist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

In an EP context, what is meant by the term “sound off”?

A

In an attack situation, it is the term given when an EP specialist shouts the type of weapon displayed by an adversary and the direction, in relation to the principal, from which it is coming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Awareness training for executive management should focus on the security programmes benefits and

A

The reasonableness of the programmes expenses compared to those benefits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

If a supplier is given access to sensitive proprietary information, what should accompany this access

A

Awareness of security procedures that protect and account for such information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Creating an understanding of the relationship between security and successful business operations is facilitated by

A

Awareness training for senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

The value of awareness programs can be demonstrated by

A

Metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

We find that most drug users are

A

Employed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Hashish, marijuana, heroin, and LSD belong to:

A

Schedule I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What are the names of types of depressant

A

Methaqualone, Valium (diazepam), Librium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Which of the following drugs causes elevated blood pressure, dilated pupils, increased heart rate, and euphoria

A

Cocaine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Which of the followings are types of stimulants

A

Cocaine, amphetamines, methamphetamine,
Methcathinone, methylphenidate (Ritalin),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which drug is derived from the Peyote cactus

A

Mescaline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Intervention is the calculated interruption of the destructive behaviour of a substance abuser and those around that person. Which of the following answers best describes the steps that supervisors and managers should take in an intervention

A

Observe and document performance,
Confront the problem employee,
Interview and discuss,
Document results,
Communicate with upper management,
Follow up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

The condition whereby a user develops an attachment to the use of a substance due to some emotional or personality need of the person is

A

Psychological dependence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

The essential difference between a social drinker and an alcoholic is

A

A loss of control over time, place and amount of drinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Drug testing may be carried out pre-employment, on reasonable suspicion, after an accident or injury, randomly, after return to work following a violation, and as a follow-up to treatment. Which type of specimen is analysed most often?

A

Urine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Which of the following means of preliminary screening of urine analysis is the most common and least expensive

A

Thin-layer chromatography (TLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

If the preliminary test discovers a drug or its metabolite, what should then follow?

A

A confirmatory test should be carried out using a different technology, such as gas chromatography / mass spectrometry (GC/MS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

According to Joseph Kinney, workplace violence includes four broad categories

A

Threat, harassment, attack, sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

According to Kinney, the single biggest deterrent to violence in the workplace is

A

Careful hiring and screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

An interdisciplinary workplace violence risk assessment and management process is based on

A

The identification and assessment of individuals so they can be diverted from violence before they act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

In relation to workplace violence, complete the following statement: Security programs aim to:

A

First divert someone from committing an unsafe or harmful act and then, if diversion is unsuccessful, to delay the person’s progress in committing the act until trained individuals are notified and respond to the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Business related concerns that a workplace violence programme should address include

A

Liability.
Productivity.
Workplace morale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Most workplace violence incidents result from

A

Robberies and similar criminal violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Only one of the following statements is true. Which is it

A

Unless psychopaths, aggressors typically go through a process of emotional escalation, selecting targets that give them a sense of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

A comprehensive approach to workplace violence should include the creation of an incident management team (IMT). Which are typically the members of the IMT

A

A senior management representative,
A senior human resources manager,
A senior security manager, and
A legal representative who is familiar with labor and employment law and litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What are the most distinctive and important elements in a violence risk assessment programme

A

Behavioural recognition,
Notification,
Assessment, and
Intervention by planned disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Complete the following sentence: The long-term solution to each situation of potential workplace violence lies in

A

Understanding the emotional and mental state of the aggressor and diverting him or her from violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What should be addressed in a violence risk assessment as, in some cases, they are early warning signs that could lead to violence

A

Harassment.
Discrimination.
Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Complete the following sentence: It is essential that the IMT be empowered to

A

Commit company assets and personnel to resolve an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is the preferred strategy of evacuation

A

When an aggressor has a firearm on the premises a preferred strategy 360 degrees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

A restraining or protective order is an example of

A

An intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

The initial interview for a security officer applicant should be with

A

HR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

In non-entry level security staff recruiting the recommended technique is

A

Blind ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Security professionals can most effectively convince management of the need for security

A

By producing a strategic plan that quantifies loss potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Key to ensuring good relations between security staff and service users is

A

Training of security officers in expected standards of courtesy, restraint and the use of good judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

A 24/7 security post at a facility where security officers work 40-hoursweeks requires

A

4.5 officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

When developing a proprietary or contract security organisation, the first task is to

A

Perform a job analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

The required action when dealing with an alcohol-intoxicated employee is to

A

Bring the person into custody thereby eliminating the immediate danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

The issue of deadly force weapons to security personnel is usually justified……

A

In a situation where there would be a greater danger to life safety without weapons than with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

When escorting large amounts of cash:

A

Firearms may be appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which of the following is most appropriate to “ranking” security personnel?

A

To use the terms officer and supervisor for the lower levels, and assistant manager, manager and director for higher levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Which of the following models is most often used by security supervisors in their relationship with front-line security officers?

A

The vertical model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

A model for organisational structure which provides flexibility for one-time needs and for security management to leverage security staff skills for the greater good of the organisation is called:

A

The network model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

The concept of principle-agent is used:

A

In a hybrid security force in which proprietary supervisors oversee contract front-line officers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

When procuring contract guarding services, which of the following best provides a means of ensuring performance after the contract is awarded?

A

By developing detailed bid specifications that spell out the requirements, including wages, benefits, and performance expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Which of the following represents a risk of using peace officers in the security team?

A

Peace officers could be mobilised by the local police chief in the event of a public emergency, thus leaving the site exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Who is first and foremost liable for the individual conduct of security officers

A

The security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Which of the following typically represents the largest cost element in the majority of security operating budgets

A

Security officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Managers can better determine post requirements by use of

A

SOPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

If a security objective requires discrimination among events, persons, circumstances, or physical objects, based on complex and varying criteria, what should be used?

A

A security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Cognitive, psychomotor and affective skills are all aspects that relate to the concept of the:

A

The necessary human being.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

The most important written instructions for the security force are:

A

Post orders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

We find that:

A

Post orders should be available at each guard post

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Which level of security management is the most crucial to front line officer motivation?

A

Security supervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

To rectify a situation in which there is poor performance at some guard posts a recommended first action by supervisors is:

A

To visit each guard post every shift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

To get a full understanding of the requirements of a security post a supervisor should:

A

Personally provide some post relief when an officer is away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

The process of giving motivational feedback to maintain and improve performance is known as:

A

Coaching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

A continually blank occurrence book is most likely to be an indication of:

A

Inadequacies in guard training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What is the primary record of significant events affecting facility protection and made contemporaneously by security officers?

A

A computer-based log into which the security officer types reports into a relational database/Security Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

In any legal proceeding, a security log is

A

Admissible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Addressing issues such as low morale, lack of training, poor working conditions and lack of detailed job analysis is intended to lead to:

A

Vigilant performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Failure of guards to respond to repeated alarms may be a negative by-product of:

A

Automation and human monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

The theory that emphasises the negative aspects of employee behaviour is:

A

The McGregor Theory X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Argyris argues that

A

Traditional organizational principles, structures, and procedures are incompatible with the mental health of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Poor air circulation in a guardroom is a problem associated with the

A

Mechanical environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

In the hiring context, pre-employment screening is fairest and most efficient when it

A

Uses a detailed list of physical requirements against which the applicant can be measured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Herzberg’s work motivation theory developed a position that

A

Motivation comes from work itself and not from those factors such as salary and job security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

When designing a CCTV console, what facet should be incorporated to enhance officer efficiency and maximize the usefulness of the system

A

Annunciation and delay features, such as the sequential display of several image feeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Which is a tool which can help in matching applicants to jobs by examining mental preferences?

A

Myers-Briggs Type Indicator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What is the most important aspect of personnel selection?

A

A face-to-face interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

An effective way to manage security post boredom is to:

A

Systematically rotate the officers’ duties, at 2 to 4 hour intervals, between fixed posts and roving patrols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Training for security officers should include addressing the cognitive, affective and psychomotor levels. An example of training at the affective level is:

A

Understanding the methods and motivations of adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

A recommended method of trying to ensure that new employees learn and adopt workplace values is through:

A

Socialization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Administering discipline is primarily the responsibility of:

A

The supervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Following pre-assignment training, what method of further development has been found to work well in enhancing security officer performance?

A

Mentoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Personnel costs are generally the largest item in:

A

An operating (or programme) budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Three broad criteria that a client should consider when choosing a guarding contractor are i) consistent performance, ii) prompt, efficient and positive response to client concerns, and what else?

A

Competitive pricing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

When engaging contract guarding services, how can disputes concerning acceptable performance best be avoided

A

By the client producing a clear and precise definition of the scope of work and required standards of performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Scenario: At Site X, there is a hybrid mix of proprietary and contract security personnel. There is lesser job satisfaction amongst the contract personnel due to the large pay disparities. 99 How should this have been avoided in the initial contract negotiations?

A

The client should have required the contractor to pay the contract officers a rate equal to the entry wages paid to the proprietary positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Surgency is related to

A

Dominance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Smoke detectors are of either the photoelectric or ionization type. The ionization sensor is of particular value for installation in

A

Areas that might smoulder for a long period, for example electrical equipment in control rooms, switch gear rooms, generator areas, and rooms containing computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

If you are looking for new PPS equipment and you know exactly what you want and no detailed design is necessary, the recommended procurement approach is

A

Invitation for bid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

What is the name given to the process of intercepting conversations on a telephone line by capturing the radiating electromagnetic energy which flows in the line, and which does not require a physical connection to the line?

A

Inductive coupling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Which type of microphone operates as a loudspeaker in reverse, and which is very popular as an eavesdropping device because it requires no power source and is usually quite small, making it relatively difficult to detect

A

Dynamic microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

Proprietary information is best defined as:

A

Intellectual property which, in some special way, relates to the status or activities of the possessor and over which the possessor asserts ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

What best describes proprietary information

A

Information relating to the structure, products, or business methods of the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

What is the main cause of proprietary information loss:

A

Due to the failure to establish and maintain effective control systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Who, typically, determines the classification level of sensitive information?

A

The originator of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Access to internal information should be restricted:

A

To company personnel or others who have signed a nondisclosure agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

What is the name given to the portable microwave transceiver used to locate electronic eavesdropping devices by detecting the semi conductor components—the transistors, diodes, etc.—which comprise their electronic circuits?

A

Non-linear junction detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

At what stage of a PPS project should the project team begin to develop countermeasures?

A

During the conceptual design phase of the overall planning and assessment phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

When using in-house resources for TSCM inspections, what best represents the necessary criteria?

A

At least one qualified employee is dedicated to the task on a full-time basis, and the proper instrumentation for the needs of the organization has been purchased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

In developing an emergency response structure, what is the most consideration?

A

A totally new organization should not be developed to handle emergencies.
Such problems should be handled by the existing organization, temporarily reconfigured, along with executives responsible for the day-to-day operation of the enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

In the event of an emergency, who should be responsible for equipment shutdown

A

Those familiar with the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

What are the featured of public sector emergency planning?

A

Mitigation,
Preparedness,
Response, and
Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

What are the three words that summarize what to do in the event of an earthquake

A

Duck, cover and hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

The Weingarten rule

A

Established the right of a bargaining unit employee to be assisted by a union representative at an investigatory interview to which the employee has been summoned by management, when the employee reasonably believes that disciplinary action may result from the interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

What is the name given to an accusatory meeting between an investigator and a person suspected of committing a crime or act of misconduct?

A

Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

In general, when investigating which of the following should be interviewed first

A

Persons who are likely not to be around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Compared to non-abusing employees, employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file how many times as many workers’ compensation claims?

A

Five

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

This schedule of drug or substance has a high potential for abuse and currently has no accepted use in medical treatment in the United States. Examples are hashish, marijuana, heroin, and lysergic acid diethylamide(LSD). What schedule is it?

A

Schedule 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

What types of drug is Methaquadone

A

A depressant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

After alcohol, which is the second most common drug of abuse in the workplace

A

Marijuana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Drug testing is a scientific examination of a biological specimen for the presence of a specific drug or its metabolite. The type of specimen analysed most often is:

A

Urine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Under which circumstances would an undercover investigation be prohibited

A

Unions are agitating and planning industrial action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

In the context of undercover investigations, what is meant by the term “coldhire”?

A

The investigator applies for a position and is processed just like any other applicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

The design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means – a crime prevention theory grounded in environmental criminology – is known as:

A

Crime Prevention through Environmental Design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

The Big Five model of personality categorises personality traits into one of five types: Surgency Agreeableness, Adjustment ,Conscientiousness and Openness to Experience. Which best describes Surgency?

A

This refers to leadership and extroversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

The C.I.A. triad is an abbreviation that is used to determine the security requirements of Information Systems (computers). What does the letter A stand for?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

Acoustic glass break detectors can be installed on walls or ceilings. Detection is best when installed:

A

On a wall opposite the protected glass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

What is the name given to the simple tool that uses detection, delay, response and communication values to determine what the effects are on these values when the physical security parameters are changed?

A

The EASI (estimate of adversary sequence interruption) Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

When project managing the implementation of new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment (and models) he/she requires the correct type of specification should be:

A

Request for Proposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

What is the preferable approach to budgeting?

A

Top down and bottom up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Where would you expect to find all on going non-salary expenses

A

Sundry expense budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

In a study by John Clark and Richard Hollinger, it was generally accepted that every employee is tempted to steal from his employer at one time or another during his career, based on:

A

The opportunity to steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

Emergency management has three primary objectives, as follows:

A

Minimise probability of a threat or emergency,
Minimise impact,
Recovery and resumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

What is considered the most critical aspect of an investigation?

A

Interviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

What is the primary purpose of an internal private sector security investigative organisation?

A

To protect the interests of the employing enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

The primary purpose of a background investigation is to prevent losses and:

A

Mitigate damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Explosions may be:

A

Mechanical, chemical, or nuclear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

If you, as an executive protection specialist, are walking with a principal and you encounter a street demonstration ahead, what would be the best action?

A

Remove the principal from the immediate danger by trying to leave the area in a car.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

What is the primary objective of assets protection?

A

To manage risks by balancing the costs and benefits of protection measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

It takes as little as 45 seconds to batter a 12–15 inch hole through an eight inch, mortar filled concrete block wall with a 10 pound sledge hammer. How long will it take to breach a 5 inch, mortar-filled concrete block wall with one-half inch steel reinforcing rods?

A

55 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

In the event of the device circuitry of an intrusion detection system, opening, shorting or grounding, what should the system be designed to do in response?

A

Activate an alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

Which type of sensor is able to detect objects that are either warmer or cooler against (or when compared to) background temperature, and whose effectiveness diminishes as background temperature approaches that of the intruder?

A

PIR(Passive infrared)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

Human beings and dogs have the same basic senses, but some of the dog’s senses are much more acute and developed. Which is the correct list of the senses of a dog in order of importance when used for protection purposes?

A

Smell, hearing, sight, touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

The greatest protection of corporate assets occurs when the appropriate mix of physical, procedural, and electronic security measures are in place……:

A

In relation to the value of the assets being protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Who bears the responsibility to provide the resources needed to enhance the protection of assets?

A

Senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

What represent purely intangible assets

A

Management style,
Worker retention,
Past performance,
Relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

What, according to Fennelly, are important tools in crime prevention programmes?

A

Planning,
Management,
Evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

With generic workplace violence, security programs aim:

A

First to divert someone from committing an unsafe or harmful act and then,
If diversion is unsuccessful, to delay the person’s progress in committing the act
Until trained individuals are notified and respond to the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

For applications in which lighting levels are likely to change throughout the day, which one types of camera lenses would be most suitable?

A

Auto Iris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

What represent the two most important considerations in anew CCTV project, in order of importance?

A

Camera, lens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

What statements is most accurate with regard to anonymous informants?

A

Caution needs to be taken with anonymous informants, as they are the most likely to provide false or biased information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

When interviewing as part of an investigation, which one of the following is the most important factor of a successful interview?

A

The ability of the interviewer to establish a favourable rapport with the interviewee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

What are the four elements of physical design?

A

Territorial definition,
Surveillance,
Building forms,
Compatible building placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

What is the first and most important output of the planning and assessment phase of any security design project?

A

Basis of design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

Which type of light has an extended restrike time?

A

High intensity discharge(HID Family)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

What represents the most appropriate lighting level for cash collection and vehicular access control areas?

A

5 fc (approx 50 lux).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

According to the Reid technique for interviewing, there are at least four objectives of an interview/interrogation. Which are the specific objectives?

A

To obtain valuable facts
To eliminate the innocent
To identify the guilty
To obtain a confession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

The purpose question, the “you” question, the knowledge question, the suspicion question, and the vouch question are all techniques used in the:

A

Behaviour analysis interview.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

In the course of an investigation interview it may be necessary to make a promise to the interviewee. What is the criterion that applies to making promises?

A

The interviewer must be certain that whatever is promised can be legally performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

What are the characteristics of a post order?

A

Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy-to-understand terms.
Orders are indexed in detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

In the US, there are three classification of evidence that the courts will consider. They are:

A

Direct,
Real,
Circumstantial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

What is the cyclic operating principle of ISO’s management systems standards?

A

Plan, do, check, act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

What is the general rule when sending away a computer for forensic examination?

A

Submit only the central processing units and the internal and external storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

What is often the greatest security threat to the flow of commerce?

A

Theft and fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

To what does the following definition refer: Set out in writing by a business unit’s top leadership. It does not focus on day-to-day operations but provides a general direction, and is the fundamental template for decisions that define and support long-term goals:

A

The organisational strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

Defining a security problem involves an accurate assessment of three factors, as follows:

A

he loss event profile,
The probability of those threats becoming actual loss events, and
The effect on the assets or on the enterprise responsible for the assets if the loss occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

You have need to interview a retail employee suspected of not ringing up items in a cash register. What kind of interview would you undertake?

A

Investigatory interview.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

In CCTV systems coaxial cable is commonly used and is generally sufficient for analogue cameras transmitting up to a distance of how far without signal amplification?

A

1000 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

The most important aspect of a successful interview is:

A

Rapport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

In investigative interviewing, if a suspect uses harsh, realistic words such as steal, rape, kill, rob, or stab, this is often an indication of

A

Truthfulness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

In general, effective executive protection requires rings of protection. What best conceptualises this?

A

An outer perimeter,
One or more inner perimeters, and
In some cases a safe room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

One personality assessment designed to gain a better understanding of a person’s weaknesses and strengths, and which is based on four sets of mental preferences, is called:

A

The Myers-Briggs Type Indicator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

What are the underlying concepts in relation to CPTED (Crime Prevention through Environmental Design)?

A

Improve the quality of life by deterring opportunities for crime and
Reducing the fear of crime. As such,
It also supports an improved security/asset protection
Posture and security awareness for the organization and/or facility where it is implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

There are several theories and assumptions which have been made and accepted about human behaviour, motivation and morale. Douglas McGregor’s Theory X and Y are amongst these. Which of the following describes a possible attribute of a Type X person?

A

No initiative and does not accept responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

A basic problem with fully implementing community policing involves there sources and personnel levels associated with these tasks. That challenge may lead public police to:

A

Transfer tasks to, or supplement their strength with, private security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

Assuming that security officers work 40 hours a week, each post that is staffed 24 hours a day, seven days a week, and compensating for sick, vacation, and holiday leave, requires how many officers?

A

4.5 officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

A common way of classifying risks (especially in the insurance industry) is by dividing them into pure and dynamic (aka business or speculative) risks. Which of the following is an example of a pure risk?

A

Labour shortage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

The real value of cost-effective data gathering comes in:

A

Making periodic cumulative reports to senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

Fences, including gates, constructed entirely of barbed wire intended to discourage human trespassing should not be less than

A

7 feet in height, plus a top guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

The most important activity for an undercover operative is:

A

Learning the job and becoming familiar with surroundings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

Ultrasonic sensors are usually limited to indoor applications where types of movements are less varied than those found in

A

Typical exterior environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

The most popular door sensor is known as a:

A

Balanced magnetic switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

In the event of a large-scale disaster incapacitating so many board members that a quorum is no longer possible, a suggested method for emergency management is:

A

For board vacancies to be filled by the remaining board members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

In a very sensitive situation, what method is typically used to shield electromagnetic energy from information processing devices from interception?

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

In developing an organisational strategy, what is the first step?

A

To understand what the business currently entails and where it needs to be in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

After employees, which is the second most valuable resource?

A

Corporate knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

The efficiency of the security force depends primarily on the:

A

Adequacy and skill of its supervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

What is the most effective management style for a supervisor?

A

To acknowledge credit for good performance and be objective when noting deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

Insurance is often divided into two general categories:

A

Property and liability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

Barriers are commonly used to discourage three types of penetration

A

By accident,
By force, and
By stealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

Perhaps the most common shortcoming in the security industry is

A

Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisory training)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

For a security professional, which of the following demonstrates a recommended way to calculate the Return on Investment (ROI)?

A

Avoided losses plus recoveries made, divided by the cost of the security programme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

Who should be responsible for escorting visitors on site?

A

Whoever invited the visitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

The management practice that separates the ultimate and the operating responsibility for accomplishing tasks is known as:

A

Delegation of authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

The manifestation of an ability of intent to affect an asset adversely is defined as a:

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

The employee theft formula includes:

A

Motivation
Opportunity
Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

The number of subordinates that can be effectively managed by one manager is known as the

A

Span of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

Estimate of investments needed in property, buildings, and major equipment

A

Capital expenditure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

The lighting levels for an open area car park and an employee entrance, respectively, are:

A

2 FC and 5 FC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

The job of managing involves 5 basic functions. They are

A

Planning
Organising
Directing
Coordinating
Controlling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

Another term for a capacitance sensor used to protect a perimeter fence is:

A

Electric Field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

Which kind of lock finds continued application in such varying situations as desk, cabinet and locker installations, bank safe deposit boxes and U.S. mail boxes?

A

Lever lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

Which wall fabrics is the most resistant to bomb blast?

A

Thick, reinforced concrete walls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

What is the minimum thickness of a 4-hour fire resistive vault with reinforced concrete walls?

A

8 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

Vaults which are designed to protect large amounts of negotiable, valuable or sensitive information against forced entry should have reinforced concrete walls of what thickness?

A

12 inches or thicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

Which classes of safe is specifically designed to protect its contents against attack using cutting torches, but not explosives?

A

TRTL-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

Which classes of safe is suitable for the protection of magnetic media against fire?

A

125-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

Which types of lamp has a typical re-strike time of 10-20 minutes?

A

Mercury vapour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

This kind of sensor may be utilized in outdoor applications as well as indoors because it is not generally affected by heavy fog, rain, snow, sleet, air turbulence, drafts, noise, temperature extremes or atmospheric disturbances. When utilized for area protection, the wave pattern is designed to flood a room or area being protected. When used for perimeter protection, a narrow beam is directed around the area or zone to be protected. What is it called?

A

Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

This type of sensor is a large electrical condenser that radiates energy and detects change in the capacitive coupling between an antenna and the ground. In a typical installation, a sensor wire is connected to an object to be protected, such as a safe or file cabinet. What is it?

A

Capacitance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

What are the benefits of a business impact analysis

A

Identifying legal, regulatory, and contractual requirements for the organization’s activities and resources
Identifying the potential impacts over time of disruptions resulting from uncontrolled, non specific events on the organization activities and resources
Evaluating resource requirements, activity, and external interdependencies to resume operations within the recovery timescales identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

What is the name given to glass which is heat-treated to resist breakage and can be utilized for both safety and security purposes, but which is not as resistive, however, as laminated glass?

A

Tempered glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

What is the name given to a plastic or polyester film available in a variety of shades, that is applied to the interior surface of glass, and which has a life up to 10 years and does not deteriorate significantly?

A

Cement on plastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

What abused drug in large doses intensifies the user’s high but may also lead to bizarre, erratic, or violent behaviour, along with tremors, vertigo, muscle twitches, paranoia, or a toxic reaction, with some users reporting restlessness, irritability, and anxiety?

A

Cocaine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

If somebody suffers changes in perception, thought, and mood, experiences physiological effects including elevated heart rate, increased blood pressure, and dilated pupils, with sensory effects that include perceptual distortions and psychic effects that include disorders of thought associated with time and space, what type of drug is most likely being abused?

A

Hallucinogen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

Insurance is a form of risk

A

Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

What is the name given to the drug which comes from the peyote cactus, and certain mushrooms?

A

Mescaline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

What is the name given to the unusual condition whereby kidnap victims form an emotional or sympathetic bond with their abductors?

A

The Stockholm Syndrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

The way to detect individuals who are destabilized and seeking control is to:

A

Assess their mental and emotional levels along a continuum of violent behaviour and then develop a plan to divert them from violence through a case-specific use of
Communication,
Company resources,
Community resources, and
The legal system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

Policies and programs dealing with inappropriate workplace conduct, including harassment, intimidation, and discrimination, should be seen as:

A

Related to the violence risk assessment program because in some cases such behaviours are early warning signs that can lead to violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

When is a vulnerability assessment performed?

A

After the threats and assets are defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

What should be specifically developed during an advance?

A

Law enforcement contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

To what does the following definition refer? Used to detect lying during the course of an investigation. A device used as a lie detector. It records voice stress as questions are asked. It has no hook-up, so can be used covertly.

A

Psychological Stress Evaluator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

When reviewing applications for employment, all gaps in employment or life history of more than what duration should be investigated?

A

1 Month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system.

A

Argvris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

This theory holds that two worker models can be contrasted. Theory X contends that workers are inherently lazy and tend to avoid work. They lack creative ambition, must be goaded, require constant supervision, and are motivated by fear. Theory Y states that workers are naturally motivated and want to work hard and do a good job. It assumes that workers are thoughtful, eager to perform well, and willing to be guided and taught. Whose theory is it?

A

McGregor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

What is the name given to the document that is composed of three elements: functions of a job, responsibility and authority vested in the job, and relationships of the job?

A

Job Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

In the course of an investigation, what is profiling used for?

A

It is used to exclude people from an investigative pool of subjects so as to conserve investigative resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

When recruiting, to deal with the many resumes that may be submitted in response to a public listing, staff must filter the resumes and invite only the most viable candidates for an interview. One recommended way to reduce this labour is:

A

To hire external recruiters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

Staffing decisions should be measured against a detailed:

A

Job requirements analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

What type of advertisement is recommended for hiring skilled, technical and managerial (non entry-level) personnel?

A

Blind ad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

Fill in the missing word(s). ………………. are based on standard operating procedures (SOPs),which should be site-specific. The SOPs are a compendium of procedures for the security group to follow in day-to-day operations. They may also include emergency response procedures

A

Post orders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

What is the primary limitation of financial statement analysis?

A

It does not directly consider changes in market conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

This statement summarizes an organization’s investing and financing. The report’s underlying equation is as follows: assets = liabilities + shareholder equity. What is it called?

A

Balance sheet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

Strategy is management’s effort to focus resources on specific targets that lead to business success through proper planning. A financial strategy is:

A

Management’s financial approach to determining the expected returns of its investments (including its departments and operations) and estimating and managing the relevant risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

Complete the following sentence: The time has come to:

A

Institutionalize coordination and cooperation between security and police personnel through structural and contractual relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

According to the formula by astronomer Marquis de Laplace, when events are independent of each other, the probability of their simultaneous occurrence is the product of their separate probabilities. Which of the following sentences best illustrates this?

A

The probability of one detection system in the security system being circumvented is high, but the probability of all the detectors and barriers in an in-depth or redundant security scheme being compromised is very low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

What is the most important measure for loss impact (or criticality)

A

DOLLAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

A security countermeasure should be planned if the loss event will produce an actual loss, measurable in some standard medium such as dollars; and:

A

The loss is not speculative in the sense that non-occurrence of the event would result in a gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

Which type of bond requires that an employee(s) be investigated to limit the risk of dishonesty for the insured?

A

Fidelity Bond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

What is the name given to the crime prevention strategy that uses psychology, architecture, and other measures to encourage desirable behaviour and discourage undesirable behaviour?

A

CPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

The most consistent predictor of employee theft is?

A

Employee’s perceived chance of being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

Oscar Newman argued that physical construction of a residential environment could elicit from residents behaviour that would, itself, contribute in a major way toward their security. What did he call this concept?

A

Defensible Space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system

A

Argvris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

In an emergency which answer best describes the person responsible for initial implementation of the plan?

A

The senior manager present on site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers. Liability is obvious when the weapons are issued to:

A

Proprietary officers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

Which terms best describes: “To prevent confusion during an organised effort, no subordinate should report to more than one supervisor”?

A

Unity of Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

Employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. What would be an acceptable alternative?

A

LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

Which of the following is correct in relation to lighting levels?

A

Detection 0.5 fc
Recognition 1.0 fc
Identification 2.0 fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

When specifying lighting for indoor precision manual work where good CRI is essential, which of the following will produce the best results?

A

Incandescent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

Lighting is a form of:

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

What gives the greatest reflectance?

A

Grass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?

A

Low pressure sodium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

Coaxial cable is limited to transmitting analogue video signals over distances of:

A

Less than 1,000 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

Which kind of lens reduces the number of different kinds of lenses an installer needs to carry?

A

Varifocal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?

A

Electronic shuttering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

What is used to minimise the number of monitors security personnel must watch?

A

Multiplexers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?

A

Automatic gain control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

In a CCTV system, for subject identification to be effective, what percentage of the screen should the subject occupy?

A

At least 20% of the scene’s width.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

Which lens has become the standard for camera and lens design?

A

The DC/LC lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

Which has the greatest impact on CCTV system performance?

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

If a camera is mounted on the side of a building, 40 ft. from the ground, and the center of the scene is 30 ft. from the building, what is the distance between the camera and the scene?

A

50 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

Scenario: You are required to protect a safe during daytime in a room in which there is a limited degree of human movement, although not in the immediate vicinity of the safe. Which sensors would be appropriate?

A

A capacitance sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

Which kinds of sensors would not be suitable where there are draughts passing through the detection pattern and nearby railroad tracks?

A

Ultrasonic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

Which types of sensors are grouped as fixed and rate of rise?

A

Heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

In PIR sensors, detection is based on the difference in temperature between the intruder and the background. This difference is called:

A

The minimum resolvable temperature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

The most common intrusion sensor is:

A

PIR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

The most common type of sensor used to detect intrusion through doors is a:

A

Simple mechanical switch, using a magnetic reed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

What is considered an advantage of volumetric motion sensors?

A

They will detect an intruder moving in the detection zone regardless of the point of entry into the zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?

A

Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

Two ways to reduce nuisance alarms on fence-mounted sensors are i) the use of rigid fence posts and tight fence fabric, and:

A

Installing the sensors on the inner fence of a two-fence system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

Which perimeter sensor types would likely generate nuisance alarms if deployed close to a creek (stream)

A

Ported coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

The 3 fundamental components of an intrusion detection system are sensor, annunciator and

A

Control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

Which sensors has the lowest NAR?

A

Dual tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

Complete the following statement: When a high PD is required at all times and under all expected weather conditions…

A

The use of multiple sensors is recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

The three main characteristics of intrusion sensor performance are:

A

Probability of detection
nuisance alarm rate
vulnerability to defeat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

The 3 core concepts (first principles) of CPTED are:

A

Natural access control
Natural surveillance
Natural territorial reinforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

Shipping and receiving areas should be

A

Separated to the extent possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

Which crime prevention theory has as its theoretical framework the Rational Choice Theory?

A

Situational crime prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

Which crime prevention theory, influenced by CPTED, seeks to reduce crime opportunities in all behavioural contexts, not just buildings and other spaces?

A

Situational crime prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

Which concept, developed by Oscar Newman, became the foundation for CPTED?

A

Defensible space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

What is the name given to the design approach that seeks to reduce crime opportunity and fear of crime through natural, mechanical and procedural means?

A

Crime prevention through environmental design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

The use of a feature criteria approach to PPS design:

A

Should generally be avoided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

Having more than one cash register in a retail site is an example of:

A

Risk spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

A well-engineered PPS exhibits the following characteristics:

A

Protection in depth,
Minimum consequences of component failure,
Balanced protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

Why would a compliance-based vulnerability analysis process be inappropriate for assets which are exposed to a high probability of malevolent adversary action and which have a high consequence of loss?

A

Because in this process the measure of system effectiveness is based on the presence or absence of components, and not the ideal of performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

Measures of effectiveness for an entry control system are

A

Throughput,
False acceptance rate,
False rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
390
Q

Key measures of the effectiveness for the detection function are: i) The probability of sensing adversary action, and:

A

The time required for reporting and assessing the alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
391
Q

The major part of a vulnerability assessment is the

A

Facility characterization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
392
Q

The key factor that differentiates a security risk from a safety risk is:

A

Malevolence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
393
Q

In considering the adversary threat type, tactics, mode of operations, capabilities, threat level and likelihood of occurrence we arrive at the…

A

Design basis threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
394
Q

What is the name given to the process that establishes a baseline of PPS effectiveness in meeting goals and objectives?

A

Vulnerability assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
395
Q

The building blocks of a PPS are:

A

People,
Procedures,
Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
396
Q

Threat many be defined as:

A

The combination of adversary capabilities, equipment, motivation or intent, and likelihood of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
397
Q

Asymmetric encryption

A

Is a method of communicating in a network using two different but related keys-one to encrypt and the other to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
398
Q

The function of probability and consequence magnitude and imminence is known as:

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
399
Q

Measures the consistency with which the countermeasure achieves its functional objective.

A

Validity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
400
Q

Recommended actions of a security manager in the departmental meeting are

A

Set the directions
Establish professional setting
Establish open exchange of information with
subordinates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
401
Q

The fundamental idea behind an information security management system is

A

Continual improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
402
Q

Oscar Newman’s theory is commonly referred to as

A

CPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
403
Q

Primary resource of an organization

A

People/Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
404
Q

Factors responsible for response time to alarm by police

A

Increasing numbers of alarm users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
405
Q

From a remote location security officer should report to whom

A

Security manager at the Headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
406
Q

The major reasons for the use of locks and key are

A

Deter entry
Reduce numbers of guards
Restrict unauthorized access
Prevent surreptitious entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
407
Q

The difference between interview and interrogation is

A

The person being interviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
408
Q

Advantages of contract security over police are

A

More flexible use of labour
Richer array of incentive and penalties
More precise allocation of accountability
Less constraint on process more focused on
results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
409
Q

How would an investigation unit get management support for funding

A

Demonstrate the unit pays for itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
410
Q

On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility, is what type of alarm transmission

A

Central alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
411
Q

Who uses PCI-DSS

A

All companies involved in credit card issuance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
412
Q

The general factors to be considered in setting up a perimeter detection involves what

A

Uniform detection
Combination of sensors
Use of multiple lines of detection
Complementary detection
Continuous line of detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
413
Q

The cyclic operating principle of ISO management system standard is

A

Plan-do-check-act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
414
Q

When an executive is travelling abroad the EPS main role is

A

Learn the key points of local social custom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
415
Q

Budget=capital, salaries and what else

A

Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
416
Q

Main task of the EPS is

A

Prevent and avoid danger and dangerous places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
417
Q

Why short down during emergency

A

Speed-up recovery process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
418
Q

The percentage of the total capital system construction cost that is for maintenance and warranty cost is

A

11%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
419
Q

Individuals who don’t know themselves wanting to conduct secure transactions through a non-trusted channel would use what

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
420
Q

Which terms are used to describe assets on the balance sheet

A

Inventory
Accounts receivable
Prepaid accounts
Accumulated depreciation
Cash
Property ,plant, equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
421
Q

Another name for business ethics is

A

Applied ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
422
Q

Validity

A

A verification that a PPS component is able to do what is expected to do and is suitable for the use it is being selected to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
423
Q

If a light burns for 15,000 hrs. the lumen per watt is its efficacy

A

150 watts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
424
Q

One major obstacle in the implementation of an effective security awareness program is

A

Creating employee and management buy-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
425
Q

Two types of metal detectors are

A

Passive and Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
426
Q

Passing through a sensor’s normal detection Zone without generating an alarm is

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
427
Q

There is serious threat to security and fear of attack in a college, the security measure that would be most appropriate to address this situation is

A

Utilize the spaces and playgrounds in the college and surroundings areas to establish ownership of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
428
Q

HIPS is

A

Host intrusion protection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
429
Q

Reason for conducting pre-employment and back-ground screening is

A

Prevent loses and mitigate damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
430
Q

COOP is used by

A

U.S federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
431
Q

A first line manager is

A

Supervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
432
Q

Evidence of truthfulness relates to which specific words

A

Reference to:
Rape,
Kill,
Steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
433
Q

The primary limitation of financial statement is

A

It does not consider changes in market conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
434
Q

A sensor that achieves absolute alarm confirmation by combining two technologies is

A

Dual technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
435
Q

The general purpose of undertaking of a vulnerability assessment is

A

To establish a baseline of the PPS effectiveness in meeting goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
436
Q

The light that is good for video surveillance is

A

Incandescent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
437
Q

Accessing a computer remotely by placing malware on it, perhaps while the use is visiting a website is

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
438
Q

A building generally becomes a ‘‘high rise’’ at what point

A

Higher that the maximum reach of available firefighting equipment approximately 23 meters to 100 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
439
Q

Maslow first hierarchy of needs is

A

Physiological

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
440
Q

In the development of the business continuity (BC) and continuity of operation plan, the most time critical factor of the plan is

A

To resume critical functions as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
441
Q

The time period when a formal audit of the emergency plan is done is

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
442
Q

The second level UL fire resistant safe will resist fire for what duration

A

2 hrs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
443
Q

Dynamic element in leadership communication tool in an emergency management program is

A

Changing of leaders telephone and pager numbers when any of the members is changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
444
Q

A major resource for pre-employment screening is

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
445
Q

Disguising information as to make it unintelligible to protect proprietary information is

A

Scrambling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
446
Q

The percentage of employees responsible for 95% of workplace theft that requires identification and focus by a security manager is

A

5%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
447
Q

An information communication attacking agent is

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
448
Q

‘‘VSAT’’ is

A

Vulnerability self assessment tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
449
Q

Modern management have come to realize that the most cost-effective way to deal with fraud in the work-place is

A

Preventing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
450
Q

A technique of excluding people from an investigative pool of subject, so as to conserve investigation resources is

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
451
Q

The main advantage of smart card is

A

Has large memory and high degree of resistance to compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
452
Q

The job of the first responders in a workplace
violence incident is

A

Divert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
453
Q

The time period a switcher automatically switches from camera to camera is

A

Dwell-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
454
Q

For each threat, the remaining potential risk after all ISS countermeasures are applied is

A

Residual threat risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
455
Q

Business related concerns to be addressed by a violence risk assessment are

A

Liability
Workplace morale
Productivity
Associated costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
456
Q

An organization is constantly experiencing break-ins with most occurring at night times , which sensors would be most appropriately use to address this situation

A

Vibration sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
457
Q

The most important in information security is

A

Management buy-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
458
Q

The culture of a corporate organization is

A

A pattern of shared basic assumptions that a group learned to solve its problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
459
Q

A critical consensus that must be made when operating a JTF from the onset is

A

Defining critical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
460
Q

Going after a system by accessing it via normal channels, by exploiting vulnerabilities is

A

Direct attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
461
Q

A major interior constituent for a record safe is

A

Moisture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
462
Q

Inducing a person to commit a crime is

A

Entrapment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
463
Q

Resolution of a digital camera is measured in terms of

A

Common intermediate format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
464
Q

A technique adopted in information security that prevents individuals access to the actual data is

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
465
Q

What are the assessment levels of a workplace violence risk assessment

A

Initial
Comprehensive
Threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
466
Q

Initiating a general discussion with an interviewee, before direct questioning in order to accomplish rapport can be achieved by using

A

Hidden persuaders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
467
Q

This is fueling commercial technology theft in many organization

A

Continued fierce global economic competition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
468
Q

The worldwide internet standard for communication over which network PPS communicate is

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
469
Q

A business specifies its type of product or services and level of quality in a more concrete statement called

A

Mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
470
Q

A significant area of vulnerability for U.S national security is constituted by who

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
471
Q

The use of information system to commit crime is

A

Cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
472
Q

When there is an emergency and a company allows others to have access to its facility, this action is

A

Rapid entry system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
473
Q

The most misunderstood form of investigation is

A

Undercover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
474
Q

How do you protect most valuable information

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
475
Q

Professional ethics is meant to serve

A

Relate to employees in humanistic manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
476
Q

The type of questioning most appropriate at the primary phase of an interview is

A

Narrative questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
477
Q

To aid the security professional to better be positioned to measure his departments effectiveness and report back to senior management is achieved by

A

An incident reporting system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
478
Q

The second most important decision in the application of CCTV program is

A

Choice of lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
479
Q

The broad classification into which information systems countermeasures are divided are

A

Administrative controls,
technical controls,
physical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
480
Q

A popular method of obtaining information from a phone line by eavesdroppers

A

Inductive/direct coupling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
481
Q

A alarm as a result of equipment failure is

A

False alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
482
Q

The theft triangle consist of

A

Desire(Needs or want)
Rationalization(Motive)
Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
483
Q

Removing all the cash from the register in the night to eliminate the opportunity of robbery is an example of

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
484
Q

The de-facto standard communication mechanism in the corporate arena is

A

E-mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
485
Q

The sensor that activates an alarm when an intruder is made to go either towards or away from the field of detection is

A

Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
486
Q

When developing security incident response plan, the most important element is

A

The policy document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
487
Q

The best way to reduce internal theft in an organization is

A

Hire employees with integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
488
Q

When planning for security, the security professional should always consider

A

Culture of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
489
Q

The advantage stored image has over manual photo I.D system is

A

Difficult to tamper with stored image as its comparable to badge exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
490
Q

An interview with an employee who has defrauded the company of a large sum of money is

A

Interrogation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
491
Q

‘‘Vision’’

A

Specific description of where the business will be in the long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
492
Q

The first and most crucial question in defining business purpose and mission is

A

Who is the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
493
Q

‘‘Quality’’

A

Conformance to customer’s requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
494
Q

In emergency plan review, what are considered dynamic information whose review must be accurately

A

Floor plans
Contact numbers
Key assets
Key personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
495
Q

The three ‘‘I’ S’’ that are referred to as the tools of the investigator are

A

Information,
Interrogation,
Instrumentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
496
Q

A comprehensive analysis of a business risk and pure risk in the insurance world is

A

Portfolio theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
497
Q

The key distinction between safety and security is

A

Their causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
498
Q

The performing of an analysis of the potential areas of loss is the first step in good security planning is

A

Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
499
Q

Sensors most appropriate for deployment in an environment with explosive vapour materials are

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
500
Q

Forecasting individual loss event that may occur is the first step in dealing with

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
501
Q

In designing a CCTV application, the security manager should keep what in mind

A

CCTV is a visual tool of security and should be applied accordingly
The application should dictate the equipment
No matter what, the equipment of the system will become obsolete
If the system is obsolete but still performing, it is because the original application was correctly designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
502
Q

A driver who will be in haulage handling would require which pre-employment testing

A

Integrity test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
503
Q

In risk analysis, reducing consequences given the event is

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
504
Q

Another name for the shift-supervisor is

A

First line manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
505
Q

What are considered as second factor authentications

A

Biometrics
OTP
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
506
Q

If a camera is mounted on the side of a building 40ft from the ground and the centre of scene to be watched is 30ft from the building the distance from the camera to the scene would be

A

50ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
507
Q

What is the most effective installation parameter for a glass break sensor

A

Installed directly opposite the protected glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
508
Q

What is another name for capacitance sensor

A

Proximity sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
509
Q

A test that verifies that a PPS device is on and performing as expected is

A

Functional testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
510
Q

Barriers that are always in place and are fail secure is

A

Passive barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
511
Q

The term given to the type of operational access control in a high rise described below is ‘‘An hour or two before and after business hours and possibly Saturday the building main entrance door remains unlocked but tenants are scrutinized closely’

A

Intermediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
512
Q

The magnetic stripe medium mostly used in security credential application is

A

2,500-4000 Oersted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
513
Q

To protect its employees from customers who claims to incur losses and mental negligent injury to them by the employees an organization requires what coverage

A

Liability insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
514
Q

The basic steps in report writing are

A

Gather the facts
Record the facts
Organize the facts
Write the report
Edit if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
515
Q

The quantity of light emitted by a household bulb rated 100 watts is

A

1700 lumen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
516
Q

The fundamental template for direction that defines and supports the long-term goal of an organization is

A

Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
517
Q

The best light for security lighting is

A

Halogen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
518
Q

The classifications of evidence are

A

Documentary
Physical
Oral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
519
Q

If a witness sees a driver in an automobile pass through a red light and strike another automobile that had the right of way. The type of evidence this witness will give in a trial is

A

Direct evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
520
Q

The first step in assuring life safety in a high-rise is

A

Comply with applicable local building and fire codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
521
Q

A report written in the cause of an investigation that gives the investigator updates and detail leads is

A

Progress report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
522
Q

The levels of building occupancy in a high-rise are, what

A

Open buildings
Closed buildings
Hybrid building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
523
Q

. Security lightings serves three main purposes these are

A

Support the video subsystem
Acts as deterrent for criminal activities
Provide life-safety as lighting pathway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
524
Q

The Human perception of the amount of light that reaches the eye is

A

Brightness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
525
Q

The extinguisher most appropriate for restaurants hood, ducts, looking appliances in kitchens and cafeteria areas is

A

Dry/wet chemical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
526
Q

Any delay before detection serves primarily as

A

Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
527
Q

An asset protection manager can justify request for additional funds for his programs from senior management by

A

Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
528
Q

The key components of alternative services provider would be

A

Order maintenance operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
529
Q

During an interview if the interviewee makes a specific denial this is an indication of

A

Deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
530
Q

The quality of an investigation that shows the depth of work done is

A

Thoroughness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
531
Q

A negative variance between the book count and actual count of various items in inventory in a retail investigation is

A

Shrinkage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
532
Q

The cornerstone of any investigative decision is

A

Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
533
Q

The major responsibility of a frontline officer on, duty is

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
534
Q

One major obstacle in the implementation of an effective security awareness program is

A

Creating employee and management buy-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
535
Q

The biggest mistake made when conducting a vulnerability assessment is

A

Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
536
Q

The advantage of private policing over public police is

A

Cost of service delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
537
Q

This will trigger the destruction of information but will not multiply itself refers to

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
538
Q

A person who has vision, idealist, and more interested in future and timeless is exhibiting a mental preference of

A

Intuitionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
539
Q

In risk analysis, reducing consequences given the event is

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
540
Q

In drawing up an awareness training a consideration to make is

A

Organization business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
541
Q

Every employer’s nemesis is

A

Time theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
542
Q

A major enemy of training is

A

Budgetary limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
543
Q

When kidnapped victims form an emotional bond with their abuductors this is

A

Stockholm syndrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
544
Q

A four digits pin will allow a trial combination of

A

10,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
545
Q

Measures a potential adversary perceives as too difficult to defeats are called

A

Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
546
Q

Categories of emergencies are natural and what else

A

Accidental
Man-made
Natural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
547
Q

The characteristics of old terrorism are

A

Show discretion and moderation in both selections of targets and means of attack
Organizational structures are predictable
Have political motivation, use violence as a didactic tool
Have traditional motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
548
Q

The standard that applies to all organization that hold, process and exchange card holder information is

A

PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
549
Q

An interviewee who uses very definitive statements during an interview is a sign of

A

Truthfulness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
550
Q

Important factors in the design of an integrated security system to pin point the best solution are

A

Anticipated threat/vulnerability
Needs of the facility
Constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
551
Q

A protective system is evaluated on the performance and cost-effectiveness of individual measures in doing what

A

Countering threats
Reducing vulnerabilities
Decreasing risk exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
552
Q

What is the most used sensor for intrusion detection

A

Line/boundary sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
553
Q

In an emergency, where the response is by multiple agencies, the incident commander is

A

Senior representative of the lead agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
554
Q

The two most common communication frequencies are sound waves and what else

A

Microwaves /Radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
555
Q

The business impact analysis involves which actions

A

Identify the organization critical functions
Assess the impact of disaster or emergency on these critical functions over time
Determine other elements of the business on which these critical functions depends
Develop and prioritize recovery strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
556
Q

An appropriate approach to create a job position for proprietary security is

A

Job description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
557
Q

If a large scale disaster incapacitates so many board members a most desirable approach is

A

The vacancies can be filled by the remaining members of the board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
558
Q

Alarm systems may be communicated on which of the following type of medium

A

Unshielded pair of direct current (DC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
559
Q

Arrangement for storing vital records should be integrated into the BC and COOP planning list the indispensable vital records

A

Engineering data
Customer data
Payroll and personnel data policy
Manufacturing process data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
560
Q

The most important step when preparing to conduct a security survey is

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
561
Q

Measures of return-on-investment are

A

Time saved
Increased productivity
Reduced employee turnover
Lower liability
Greater customer satisfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
562
Q

Gathering information on the layout of a site, the location of key assets, site operations and production capability and the types of PPS components locations by the VA team is called

A

Facility characterization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
563
Q

The appropriate person to trigger emergency rescue operation if the disaster is on a large scale is

A

Incident commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
564
Q

Concerns to an enterprise to be addressed by a violence risk assessment which are business related are all the following except

A

Liability
Associated cost
Workplace morale
Productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
565
Q

A standard that is voluntary and compulsory is

A

Mixed standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
566
Q

If an attack is within the reach of the EPS, the action most appropriate is

A

Cover and evacuate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
567
Q

The objectives of an interview are

A

To obtain valuable facts
To obtain a confession
To identify the guilty
To eliminate the innocent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
568
Q

In an organization where series of missing items are been reported, a key record of item movement and control can be adequately sourced from

A

Well developed security incident data base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
569
Q

To measure the effectiveness of the security countermeasures as to show a long-range cost saving to the company’s senior management, a manager should apply what

A

Efficiency vs cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
570
Q

An appropriate structure to handle an incident that involves multiple agencies from multiple jurisdictions is

A

Unified command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
571
Q

In asset protection the period between major paradigm shift has been

A

Decreasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
572
Q

In absolute number a High-rise is

A

23-30 meters
75-100 feet
7-10 stories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
573
Q

Legislation that governs the process of background screening in the U.S is

A

Fair credit reporting act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
574
Q

Workplace violence management, monitoring or closeout of the incident is determined by

A

The company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
575
Q

Which information is found in the balance sheet

A

Company’s operation, financing and investment
Company’s use of profit to increase shareholder equity
Assets and liability mix and how it relates to shareholder equity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
576
Q

The most considered in the planning stage of an emergency management program is

A

Identifying the key assets of the organization that need protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
577
Q

Measures of margins are

A

Gross profit margin
Operating margin
Net profit margin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
578
Q

If a large scale disaster requires a public safety response, the incident commander is usually

A

A senior member of the responding agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
579
Q

This entails the movement of critical function and personnel to an alternative operating site in accordance with a pre-established plan

A

COOP plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
580
Q

Modern management has come to the realization that their best option to manage employee theft and fraud is

A

Preventing looses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
581
Q

An insurance cover most appropriate for a facility with high incident of break-ins resulting in theft, embezzlement, loss of equipment

A

Crime coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
582
Q

An EPS initial reaction to a sudden violence attempt on the principal is

A

Evacuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
583
Q

In asset protection the paradigm shift is in the area of technological development and what else

A

Conceptual shift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
584
Q

The major reason for installing light at the perimeter fence is

A

Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
585
Q

A hybrid budget technique is which of the following

A

Top-down, bottom-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
586
Q

A type of budgeting technique more likely to be accepted by lower level managers is

A

Bottom-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
587
Q

This plan is modified annually, but under what other condition can it be modified before annually

A

Emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
588
Q

Valid violence risk assessment requires depth of information available only for what

A

Known subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
589
Q

Financial statements are created in accordance with

A

GAAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
590
Q

A management financial approach to determine the expected return on its investment is

A

Financial strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
591
Q

The level of violence risk assessment which determines whether there is an immediate risk of harm for emergency procedures to be activated is

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
592
Q

State the equation of the balance sheet

A

Assets = Liabilities + Shareholder’s Equity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
593
Q

The primary function of the EPS is

A

Avoiding dangerous persons and conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
594
Q

Evidence of truthfulness refers to what specific words

A

Steal,
Kill,
Rape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
595
Q

In the most basic sense, the purpose of an interview is

A

Aid an investigation into the truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
596
Q

A lighting equipment most appropriate to illuminate a potential intruder while leaving the security personnel concealed is

A

Fresnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
597
Q

A lighting source that is least efficient, most expensive and have a short life span is

A

Incandescent

598
Q

This is neither an asset nor a liability in the balance sheet

A

Shareholders’ equity

599
Q

Which surface have the highest reflectance

A

Snow

600
Q

An all important but often missed form of identification in a CCTV program is

A

Scene identification

601
Q

The first key concept that must be understood by the asset protection professional, to be able to design a PPS that will meet identified goals and objectives is

A

System

602
Q

The most valuable asset of the EP specialist is

A

Physical acumen

603
Q

The minimum pounds of force required to separate an electromagnetic lock is

A

500 Ibs

604
Q

The first step in risk assessment process is

A

Data gathering

605
Q

The theoretical maximum combination for a four-number combination lock is

A

100,000,000

606
Q

An exception to a hearsay evidence are

A

Dying declaration
Res gestae
Banking record

607
Q

A sensor technology that reduces false alarm rate and detection sensitivity is

A

Dual technology

608
Q

When suspicious activity is suspected by an intrusion detection system, a lighting system most appropriate to deploy is

A

Standby lighting

609
Q

After the VA is conducted and the VA report is written and analyzed a key principle off this analysis

A

An initial baseline is established

610
Q

If you move form a lawn tennis court where the light is bright to a covering or underpass, which lighting source should be applied

A

Induction lighting

611
Q

An analysis most appropriate for assets with lower consequences of loss is

A

Qualitative

612
Q

A complete collection and range of uncertainties that affect an organization’s future is

A

Risk portfolio

613
Q

An analysis of past security incidence and their patterns is called

A

Trends

614
Q

Who is more concerned with the implementation of the organization’s policies and procedures

A

First line manager

615
Q

A spoken statement regarding a person’s knowledge, which may be direct or indirect and gained through any manner is

A

Oral evidence

616
Q

Categories of physical evidence are and what else

A

Corpus delicti,
Identifying
Associative
Trace,
Tracing

617
Q

How is residual risk calculated

A

Threat X vulnerability ÷ countermeasures

618
Q

Who has the primary responsibility of determining the classification level for information

A

The owner

619
Q

What does a retina scan biometrics system do

A

Examines the pattern of blood vessels at the back of the eye

620
Q

Most computer-related documents are categorized as which types of evidence

A

Hearsay evidence

621
Q

What best describes the ALE calculation

A

It estimates the loss potential from a threat in a one-year time span

622
Q

In the PPS what may serve as a first line of defense

A

Deterrence

623
Q

When is a security guard best choice for a physical access control

A

When discriminating judgment is required

624
Q

List what are considered delaying mechanism

A

Passive barriers
Redundant scheme
Dispensable barriers
Access controls
Security officers

625
Q

The choreography for the EPS is called

A

Working the Principal

626
Q

The distance of the perimeter to the building inside, if it does not form part of the building is

A

50 feet

627
Q

If an earthquake strikes, what to do if inside the building

A

Stay under a sturdy material

628
Q

The sensor that emits human energy

A

PIR

629
Q

Which sensors are also known as proximity sensors

A

Capacitance/Pressure mat

630
Q

The quick ratio is also known as what

A

Acid test

631
Q

What you are, what you have, and what you know refers to

A

Personnel Entry control

632
Q

Distance required for bomb evacuation

A

300 Meters/328 yards

633
Q

Which sensor can detect the presence of a suspected arsonist

A

PIR

634
Q

Which are the HID family of lights

A

High Pressure Sodium
Mercury Vapour
Metal Halide

635
Q

The first step of an investigator is

A

Establish rapport

636
Q

What is the function of the budget in management

A

Planning

637
Q

Main function of the EPS

A

Preventing harm and dangerous conditions

638
Q

The weight of a safe that require anchoring on the structure is

A

750 Ibs

639
Q

The temperature for paper in a safe against fire

A

350 Deg F

640
Q

The major interior constituent of a safe resistant to fire

A

Moisture

641
Q

The primary purpose of a private sector investigator is

A

Protect the interest of the employing agency

642
Q

A first line Manager is

A

Supervisor

643
Q

The main motive for intrusion detection deployment

A

Early warning

644
Q

What is the cause of the cry wolf syndromes

A

Nuisance alarms

645
Q

Which sensor is good for preventing burglary incident

A

Vibration

646
Q

What is the secondary function of the physical protection system

A

Deterrence

647
Q

Which documents should be kept as separate from the emergency management plan

A

BC and COOP

648
Q

Applied ethic is for which in the society

A

Humanity

649
Q

Which glass type is strongest against blast

A

Polycarbonate

650
Q

The percentage of the scene width for action identification is

A

20%

651
Q

What substance acts on the central nervous system and also serves as a sleep inducer or depressant

A

Alcohol

652
Q

Which drug is also referred to as ‘‘ICE‘‘

A

Methamphetamine

653
Q

What substance drastically alters the user mood, sensory perception and ability to reason

A

Hallucinogens

654
Q

PCP (Phencycledine) is often called what

A

Angel dust

655
Q

What is the most common drug of abuse in the workplace

A

Alcohol

656
Q

The most common prescription drugs of abuse sold at the workplace belongs to which family of drugs

A

Benzodiazepines

657
Q

An employee who appears to be more alert, eager to work and productive is a suspect of which family of drugs

A

Stimulants

658
Q

Which drug acts on the central nervous system that results in dilated pupils, elevated blood pressure and increased heart rate

A

Cocaine

659
Q

An employee who experiences frequent severe mood swings and has trouble getting along with others and thus. Become difficult to manage is a victim of which family of drugs

A

Stimulants

660
Q

An uncontrollable repeated use of a drug by an employee is called

A

Addiction

661
Q

Overreliance on security technology tends to place the principal in what

A

Vault

662
Q

A theory that suggests that the presence of a capable guardian may deter crime is

A

Routine activity theory

663
Q

What does the most critical stage of PDCA entail

A

Identifying and analyzing the organization’s problems

664
Q

What is perhaps the most frequently overlooked and most difficult to identify and evaluate threats

A

Inadvertent threats

665
Q

Which lights are none HID family of lights

A

Incandescent
Florescent
Halogen

666
Q

What is the second most commonly used drug in the workplace

A

Marijuana

667
Q

Which substance tend to relieve malaise and increase alertness when used in moderation

A

Stimulant

668
Q

The retinal scan which uses low intensity light to scan the eyes measures what

A

Blood vessels patterns

669
Q

The two types of explosive detection are

A

Passive/Active

670
Q

Which substance acts on the central nervous system and also serves as a sleep inducer

A

Alcohol

671
Q

What action is taken by an organization to prevent an employee who just gained employment into a competitor’s firm from disclosing proprietary information to his new employer

A

Non-competitive covenant

672
Q

What is described as a practical document that is shared with all relevant unit and fairly enforced

A

Information security policy

673
Q

What is fundamental to the protection of information

A

CIA triad

674
Q

Which sensor will be imparted if the temperature in a room rises by 370C at 11 am in the morning to 550C by 6pm

A

PIR

675
Q

Which sensors are best to provide early warning of a forced entry

A

Vibration sensors

676
Q

What sensors are best to measure temperature changes in a room caused by the human presence

A

PIR

677
Q

Which sensor are best suited for protecting metal cabinets and safes

A

Capacitance

678
Q

Which lights have instant re-strike time

A

Fluorescent
Halogen
Incandescent

679
Q

Which lights has the highest re-strike time

A

Mercury vapour
Metal Halide
High Pressure Sodium

680
Q

What is the first step an interviewer should take to ensure a good session is achieved

A

Establish rapport

681
Q

Which measures are covered by a security manager using CPTED

A

Mechanical measures
Organizational measures
Natural measures

682
Q

A building considered a high rise would be exposed to which kinds of risk

A

Fire
Explosion
Contamination of life support system

683
Q

What is considered the most important aspect of personnel selection

A

Interview

684
Q

Which theory believes that punishment or threat of punishment motivates a worker

A

McGregor’s theory X

685
Q

Which are the important tools in crime prevention

A

Management
Evaluation
Planning

686
Q

What device can be place between the internet and the system one wants to protect

A

Firewalls

687
Q

Which kind of attack makes several direct attempts at the password of a system with the intention of compromising it

A

Brute-force attack

688
Q

Which lock has the longest delay

A

Pin tumbler lock

689
Q

What factor can adversely affect the response time by police to alarms

A

Increase in the numbers of alarm users

690
Q

When a company allows another to make use of its warehouse during an emergency, what is in play

A

Mutual Aid

691
Q

What does a fire safe rating imply

A

Ability to maintain a certain internal temperature for the specified period

692
Q

What model appears to be the future of security management

A

Proprietary staff supervising contract staff

693
Q

Which groups of lights are classified as outside lightings

A

Emergency light
Continuous
Controlled
Standby
Portable
Glare projection

694
Q

What are the types of locks

A

Mechanical/Electromechanical

695
Q

The process of an EP specialist moving around with the principal is

A

Working the principal

696
Q

What can be considered as the major cost of workplace violence to a company

A

Loss of productivity and morale

697
Q

Which record has in it a documentation of every major security incident on the premises

A

Security log

698
Q

What are the major types of line connections

A

Loop
Point-to-Point
Multiplex

699
Q

What is the major difference between HIPS and IDS

A

HIPS is like an IDS except that it operates on a host and protects it from antivirus

700
Q

What are the types of explosion

A

Chemical
Mechanical
Nuclear

701
Q

All gaps in employment history if more than what period should be investigated

A

30 days (1 mth)

702
Q

What tool is appropriate to ascertain the reason for an incident, so as to prevent same from reoccurring

A

Root cause analysis

703
Q

What tool is appropriate to determine what steps might need to be taken for organization’s capacity to conduct risk assessment to move from current state

A

Gap analysis

704
Q

Budget the equivalent of pro-forma invoice, projects future cost and what else

A

Revenue for a defined period

705
Q

List what are dispensable barrier

A

Chemical fogs
Smokes
Irritants
Foams

706
Q

What are the characteristics of a post order

A

Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple easy-to understand terms
Orders are indexed in detail.

707
Q

A company investigator who checks the financial records of another company and their history ahead of a planned acquisition is doing what

A

Due diligence investigation

708
Q

Difference between a social drinker and an alcoholics

A

A loss of control over the time, place and amount of drinking

709
Q

High-rise buildings are generally divided into public Access, Rented Spaces and what

A

Maintenance space

710
Q

With whom does ultimate responsibility for shutting down a facility be in an emergency

A

Those trained/familiar for that responsibility

711
Q

Which sensors would be affected by the Doppler principle

A

Microwave
Ultrasonic

712
Q

The members of the incident management team are

A

A senior Human resource manager
A senior management representative
A senior security manager
A legal representative familiar with labour and employment laws

713
Q

The primary elements of violence risk assessment program are

A

Behavioral recognition
Notification
Assessment
Intervention through
Planned disruption

714
Q

What are the stages of a behavioral dynamics of workplace violence

A

First the determination of violence as an acceptance means to establish control and re-establish control
Next selection of targets and location for violence
Then the act of violence can occur

715
Q

What are the illegal means to acquiring information about a competitor without directly stealing it

A

Directing an agent to establish a fake business arrangement with a company to learn details of its manufacturing process.
Conduct fake job interviews
Directing an agent to befriend employees of such a company to collect information on proprietary manufacturing processes.
Recruiting an employee of the company to provide information on manufacturing processes.
Performing reverse engineering.

716
Q

Who would be regarded to use the incident command system

A

Private and public agencies

717
Q

What are the elements of the incident command system

A

Command
Operations
Logistics
Planning
Finance and
Administration

718
Q

Errors are discovered after an interviewee has given his written statement, what action should an investigator take to address this

A

It should be initialed with an ‘‘OK’’ written in the margin by the suspect

719
Q

A balanced system should have what in addition to detection and assessment

A

Communication/deployment

720
Q

In the plan-Do-Check-Act operating principle, the check stage involves what

A

Examination of devised solution to address a company problems

721
Q

An organization who decides keeping important assets at a separate location is doing what

A

Risk spreading

722
Q

Fastening bookshelves and file cabinets to the walls to keep them from falling during an earthquake is

A

Mitigation

723
Q

In a high-rise which access type requires credentialing

A

Closed building

724
Q

What are the verbal behaviors of a truthful person

A

Offers unqualified direct, answers
Makes a sweeping denials
Gives spontaneous answers
Offers unqualified answers
Responds to questions in a rational and clear tone of voice

725
Q

What are the verbal behaviors of a deceptive person

A

Exhibits an unusually poor, selective, or remarkable memory
Avoids realistic words
Makes seemingly irrelevant comments
Gives delayed, evasive, or vague answers
Offers a specific denial

726
Q

Whose theory is based on the premise that the opposite of satisfaction is not dissatisfaction but simply no satisfaction

A

Herzberg

727
Q

Criticality in an emergency is measure in terms of what of

A

Financial loss

728
Q

A,B and C were pooled together from logistics, security and HR for a project and then disbanded, what is this practice

A

Network Model

729
Q

What type budgeting technique is when funds are placed only to the extent that planned expenditures are justified in detail

A

Zero-based

730
Q

What type of budgeting technique is when the top management appropriates and allocates money to the security department

A

Top-down budgeting

731
Q

Testing after installation or upgrade of the PPS is

A

Functional testing

732
Q

The only answer for an employee who has surrendered to substance abuse is

A

Progressive discipline

733
Q

The space between an asset and an explosive threat is

A

Stand-off-distance

734
Q

Protection from a bomb is achieved through what

A

Distance and cover

735
Q

A major factor in the design and implementation of security systems and programs is

A

Organization’s culture

736
Q

A maintenance that corrects faults and returns the system to operating capacity

A

Remedial maintenance

737
Q

What should be developed to ensure that preventive maintenance tasks are performed adequately

A

Checklist

738
Q

To ensure that security systems operate at its optimum capability with minimum downtime, is what major goal

A

Service level agreement

739
Q

Layers in an asset’s safe guide in relation to protection-in-depth is referred to what

A

Redundant scheme

740
Q

What is the greatest exposure to a corporation in terms of loose

A

Employee misconduct

741
Q

A chief executive praised a staff performance in an end of year party whose theory is being projected

A

Herzberg

742
Q

A colour rendition of 70 to 80 percent is considered what

A

Good

743
Q

A coverage intended to guarantee the performance of some obligation by an individual is

A

Surety coverage

744
Q

A process that is used to identify an entity’s critical function as to identify the effect of a disaster on those function is

A

Business impact analysis

745
Q

A coverage to protect an employer from the dishonesty of employees

A

Fidelity coverage

746
Q

What are the components of a mechanical lock

A

Key/Unlocking device
Tumbler array/Revolving Device
Bolt or Latch

747
Q

What provides a definitive certification guidance for an organization information assets

A

ISO 27001/2

748
Q

The centre piece of ISO 27001 is

A

ISMS

749
Q

Which employee would be more appropriate to deploy for a crowd control function and to ensure order in a crowded environment

A

Extroversive

750
Q

A scheduled activity to keep the system in good operating condition is

A

Preventive maintenance

751
Q

This associates the immediate image capture with a sensor alarm to determine response

A

Assessment system

752
Q

A level of violence risk assessment that provides the basis for the design and implementation of a non-immediate emergency resolution plan is

A

Comprehensive

753
Q

An illegal acquisition of a competitor patent information is

A

Industrial espionage

754
Q

Words, names, symbols or images applied to products to identify their source is

A

Trademark

755
Q

Computers on the internet communicate via a protocol called

A

TCP/IP

756
Q

An alarm connected by a telephone line to the police/fire station is

A

Auxiliary alarm

757
Q

When a supervisor is having problem supervising officers under him is due to what

A

Span of control

758
Q

What constitutes cost of goods sold

A

Cost of creating a product and service

759
Q

A required guarantee from a contractor to response to site to handle a maintenance is

A

2 to 4 hours

760
Q

A property right granted an inventor to exclude others, from making, offering for sale the invention for a limited time refers to what

A

Patent

761
Q

What communicates a business functionality and operational methods

A

Mission

762
Q

The adaptive capacity of an organization in a complex and changing environment is

A

Organizational resilience

763
Q

After assessment of vulnerability and the implementation of countermeasures what is next

A

Review of effectiveness

764
Q

Outsourcing of the production of a major component to company X due to security issues and then buying the component from company X is what

A

Risk avoidance

765
Q

When access control into a facility is impossible due to bomb threat, what is recommended

A

Control access to critical assets

766
Q

In an account department the best practice to ensure proper accounting practice is

A

Separation of responsibilities

767
Q

The manipulation of people to get them to do something that weakens their security on the network is

A

Social engineering

768
Q

When a drug abuser agrees that they cannot help himself out of the situation an employer best approach is

A

Referral to EAP

769
Q

Most common specimen used for drug test in the workplace

A

Urine

770
Q

Whose support should the security manager get involved in the final protection measures in a high-rise structure

A

Owner and
Tenants

771
Q

A security design program is implemented by who

A

Security manager

772
Q

A code used for electro-mechanical locks using timer is

A

Switch code

773
Q

A sensor that is activated when the passage of air from the body of a person crosses the line of the protected area is

A

PIR

774
Q

A type of advert most appropriate for non-entry technical/professional person’s is

A

Blind-ad

775
Q

When presenting information to decision makers with limited time, the security manager can convey his key points in what way

A

Graphical display

776
Q

The type of evidence that links a person to a scene of crime is

A

Associative evidence

777
Q

Protective barriers against bomb-blast is

A

Thick reinforced concrete

778
Q

The historical origin of mug photo shots is

A

Private agency

779
Q

A device that record the calls/caller number in a telephone is

A

Pen register

780
Q

An analysis more appropriate for assets with unacceptable consequences of loss is

A

Quantitative analysis

781
Q

In a facility, when the primary power source becomes non-functional, and the secondary source is utilized, some lamps takes long time to reach full brightness, the best light suited to handle this situation is

A

Halogen /Incandescent

782
Q

In an alarm system, contact device means

A

An alarm is triggered when the contact is broken

783
Q

The correct sequence of choosing a camera is

A

ANS
Sensitivity,
Resolution,
Features

784
Q

An organization that sends an e-mail to an outside organization requires what to protect the e-mail

A

VPN

785
Q

If a building wall is made of gypsum plastic, or plywood, the sensor most inappropriate is

A

Microwave

786
Q

After analyzing the facility data and conducting a vulnerability assessment and the VA report is written, the next appropriate response should be

A

Determine baseline risk

787
Q

If a loose would have a noticeable impact on earnings, the rating recommended is

A

Moderately serious

788
Q

To handle frequent reports of stolen haulage item in a distant location, a security manager should apply what

A

Use intrusion detection system

789
Q

What are the characteristics of policies in an organization

A

Policies provide a board description of how operations will be conducted
Policies cover items that organization monitors
Not all policies requires written procedures
Some policies are driven by government regulations

790
Q

The financial reports that have become accepted as standard are

A

Income statement
Balance sheet
Statement of cash flow

791
Q

A wife who continuous to stay in a abusive relationship because of what

A

Economic assistance

792
Q

Action taken by a business before, during or after an emergency to minimize the emergency negative impact on the organization’s operation is encompassed in what

A

Business continuity

793
Q

The recommended spacing distance between pillars in a chain link fencing is

A

10 feet

794
Q

When a grandmaster key is lost, re-keying should start where

A

From the perimeter to the interior

795
Q

A report that is often concise, well written and interesting to read is

A

Structured narrative

796
Q

An analysis approach that depends on for conformance to specific policies and regulations is

A

Compliance based

797
Q

The distance of the outer perimeter fence to the structure inside, if the building itself is not part of the perimeter

A

50 feet

798
Q

The greatest problem in an investigation is

A

Objectivity

799
Q

When two sensors are logically combined, the probability of detection of the combined detectors is

A

Less than the probability of detection of the individual detectors

800
Q

This test measures the numerical perception of a job applicant

A

Aptitude test

801
Q

This process should be cost-effective and the most experience component should be conducted last is

A

Policy on a comprehensive pre-employment screening program

802
Q

In a simple case…………………report may be the final and opening report

A

Initial report

803
Q

The maximum delay time for an emergency exit is

A

15 Secs

804
Q

When preparing an initial budget, the percentage of the final bid price, generally allowed as a margin of error is

A

15-20%

805
Q

The technique of transmitting several messages simultaneously on the same medium is

A

Multiplexing

806
Q

The distance of the outer perimeter to the structure inside if the building itself forms part of the perimeter

A

2 inch

807
Q

A report that documents events observed by an undercover operative other than the normal happening in the course of the investigation is

A

Special report

808
Q

The alarm that operates from residential location with guards in charge is

A

Proprietary alarm

809
Q

The best approach to adopt during the pre-planning stage of an executive protection program

A

Crisis management team

810
Q

The percentage of illicit drug users in the U.S that are on full time employment is

A

8.8% (approximately 9%)

811
Q

When it is difficult and time consuming to test the entire system at one time, a recommended test is

A

Limited scope testing

812
Q

The cornerstone of any construction project is

A

Drawings

813
Q

A lighting system that duplicates other lighting systems but depends on an alternative power source is

A

Emergency lighting

814
Q

The most valuable asset of the EPS is

A

Physical acumen

815
Q

The identification of different components of the PPS and their functionality is

A

Vulnerability assessment

816
Q

To mitigate against tailgating in access control, an appropriate measure is

A

Turnstile

817
Q

Fire resistant safes will keep the documents inside it safe under a burning fire at a temperature of

A

350 Degf

818
Q

Sensors are generally classified into two major categories namely

A

Passive and active

819
Q

For resolution that is clearer and can see larger range of colours and high sensitivity, the best recommended for observation or assessment is

A

Digital camera

820
Q

Giving motivational feedback to improve performance is

A

Coaching

821
Q

What are the secondary elements of the violence risk assessment

A

Diversion
Delay
Response

822
Q

When a senior management directs a security manager to perform certain functions, this relationship is

A

Functional authority

823
Q

What are the early warning signs that can lead to violence

A

Harassment
Intimidation
Discrimination

824
Q

For security professionals, CPTED is a set of management tools targeting what components

A

Places
Behavior
Design and use of space

825
Q

A detailed-in-depth examination of all revealing security defences and defensive activity, measured against current and projected risk is

A

Security survey

826
Q

Dividing of video images into grid sections is

A

Masking

827
Q

For each threat, the remaining potential risk after all ISS countermeasures are applied is

A

Residual threat risk

828
Q

The most visible sign of a PPS when you approach a facility is

A

Uniformed security officer operation

829
Q

Response force personnel if deployed in a fixed and well protected position are considered elements of the PPS

A

Delay

830
Q

The decision to shut the plant in an anticipated bomb attack is taken by

A

Threat evaluation team leader

831
Q

The components of a good PPS are

A

People
Procedure
Technology

832
Q

In executive protection, when an adversary strikes salvation lies in

A

Agents conditioned response

833
Q

A lock recommended for safety and security on an emergency exit is

A

Electromagnetic lock

834
Q

A logical method of problem solving in which a comprehensive solution is developed in relation to a problem having several dimension is

A

System approach

835
Q

A fully integrated security program blends what into a flexible responsive elements

A

Architectural
Technological
Operational

836
Q

An easy going entry control card technology is

A

Proximity card

837
Q

The theft triangle concept is

A

An explanation of why people steal

838
Q

The function of a guard on patrol duties is

A

Observation

839
Q

Applied ethics is to serve

A

Humanity

840
Q

The backbone of a security survey is

A

Checklist

841
Q

A line transmission technique in which the installation is connected directly to a control by a pair of wires is called

A

Point-to-point

842
Q

Sensors are generally categorized into classes of

A

Perimeter,
Space,
Object

843
Q

The type of lighting that would best serve for video surveillance if colour rendition is a major consideration is

A

Metal halide

844
Q

Using the following scenario, answer questions 845 - 847
A security manager for company X has been asked to oversee the installation of a fire suppression sprinkler system as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization assets. The sprinkler systems is designed to reduce the impact of the fire on the company

A
845
Q

In this scenario, fire is considered what

A

Threat

846
Q

In this scenario, the sprinkler system is considered what

A

Countermeasure

847
Q

In this scenario, the likelihood and damage potential of a fire is considered what

A

Risk

848
Q

What volume of sales is required by a company with net profit of 5% to offset a loss of $50

A

1,000

849
Q

What will make better chain of custody for an evidence

A

Evidence collected and marked with a permanent ink by the same
person

850
Q

A situation where your body cells adjust to the presence of a drug is

A

Dependency

851
Q

Lock with the highest delay

A

Pin Tumbler

852
Q

What part of the pin tumbler is called the revolving device

A

The tumbler array or revolving device

853
Q

What kind of video Camera can be installed at a Jetty bay to monitor activities

A

Standard lens camera

854
Q

Perimeter lighting should be installed to face where

A

Down and away from the protected area

855
Q

The relationship between private security and public policing offers what advantage

A

Cooperation

856
Q

A drug that works on the central nervous system but can also be used as a sedative in little dose is called

A

Benzodiazepines/Depressant

857
Q

The type of light used in residence

A

Incandescent

858
Q

Type of sensor that emits an electrical energy around the protected object is

A

Capacitance

859
Q

Classification of smoke sensors are

A

Photoelectric and Ionization sensors

860
Q

What training should be given to workers to help them from contracting infections from body fluids and blood borne pathogens

A

Disease control/Concept of Universal Precaution

861
Q

What is the process of evacuation during earthquake

A

Duck under a sturdy material

862
Q

Types of spaces in High rise are

A

Public or Common areas
Rented or assigned space
Maintenance space

863
Q

This communicates business functionality and operational methods

A

Mission

864
Q

Distance between perimeter wall and building if the building is part of it.

A

2 inch

865
Q

Margins are

A

Gross profit,
Operating and
Net profit

866
Q

Personal entry control is what you have, what you know and what else

A

What you are

867
Q

What are based on past performance and projected future performance

A

Financial decisions

868
Q

What sensor can detect even outside a gypsum wall

A

Microwave

869
Q

CCTV design considers what

A

Camera,
cable,
monitors

870
Q

What light is best used for CCTV for good colour rendition index

A

Metal Halide

871
Q

A drug that attacks central nervous system and sleepy

A

Narcotics

872
Q

Security light that is turned on when suspicious activity is detected is

A

Standby

873
Q

Two types of infrared sensors are

A

Passive/Active

874
Q

Sensor to protect safe is

A

Capacitance

875
Q

Percentage of scene width for action identification is

A

20%

876
Q

What temperature would a paper endure in a record safe before it is charred

A

350 Degf

877
Q

How do you pick a spent cartridge at a crime scene

A

Pick it up by the open end using tweezers so as not to destroy any partial fingerprint or other evidence that may be on the outside of the cartridge

878
Q

The principal was going to a function and en-route there was a crisis and an alternative route was taken, who was responsible for this decision

A

EP, Specialist

879
Q

Who is responsible for the implementation of program after design and installation

A

Security Manager/ safety

880
Q

The most common mistake of inexperience investigator is

A

Failure to corroborate evidence

881
Q

An illumination device deployed in a series that maintain uniform lighting during the hours of darkness is

A

Continuous

882
Q

An employee misassembled a device and caused harm to a customer is covered by

A

Liability insurance

883
Q

Types of explosive products are

A

Blast,
Fragmentation and
Heat

884
Q

Private system in place to guide the implementation of SOX is

A

An integral reporting system that is non-retaliatory so employee can report suspected violations/Employee Hotline/Compliance Investigation

885
Q

What is the second greatest threat to an organization in terms of loss

A

Employees’ theft and fraud

886
Q

This uses a plain-text mechanism and connects with a control panel, what is

A

Magnetic stripe card

887
Q

Types of glass used in security are

A

Acrylic and Poly Carbonate

888
Q

A drug test that turns positive when the drug is not present is

A

False positive

889
Q

Why is functional Authority only allowed for one step below

A

To Maintain the Unity of Command

890
Q

For a woman that runs a restaurant how does she hide her secret sauce recipe and what can her secret sauce recipe be referred to

A

Trade secret

891
Q

Which aspect of the Plan –Do- Check –Act deals with total quality control

A

Check

892
Q

What are considered account payable

A

These are accounts on which an organization owes money, e.g. utilities or services acquired under informal agreements

893
Q

An organization greatest threat in terms of loss is

A

Competition/Industrial espionage

894
Q

Questioning approach most appropriate at the primary phase of an interview is

A

Open-ended or Narrative questions

895
Q

The use of private security personnel to provide services within public areas is

A

Public safety policing

896
Q

How well a company uses financed assets to generate income is

A

Return on Equity

897
Q

What is recovery time objective(RTO

A

The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days

898
Q

A relationship for an institutionalized coordination and cooperation between security and police personnel should be through what framework

A

Structural and Contractual

899
Q

The purpose of a security audit/survey is for

A

A thorough physical examination of a facility and its system and procedure conducted to assess
The current level of security
Locate deficiencies
Gauge the degree of protection needed

900
Q

List exterior security lightings

A

Continuous,
Standby
Controlled,
Portable,
Emergency
Glare Projection

901
Q

What is the purpose of a vulnerability assessment in a disaster recovery plan

A

To establish/ identify weaknesses at the facility before the emergency occurs

902
Q

What is the most common form of workplace embezzlement and what can be done to stem it

A

Cash disbursement
A separation of duties so that an accounts payable clerk doesn’t have access to add names or delete names to the master vendor files

903
Q

The second most valuable resource of an organization is

A

Corporate knowledge

904
Q

What are considered account receivable

A

The amount due by customers for goods and services already delivered

905
Q

A significant loss event occurring thus resulting in a planned activity not achieving its expected outcome will result in what analysis

A

Root cause Analysis

906
Q

Borrowing capital to purchase asset that can increase revenue is

A

Leveraging

907
Q

A search following a bomb threat most suited for offices and manufacturing sites with little public access is

A

Occupant Search

908
Q

What is the required clear zone between the outer environment and the perimeter fence

A

20 ft

909
Q

Risk ratios are

A

Current,
Quick and
Equity

910
Q

Practices that provides analysis and decision tools that allows businesses to monitor the financial operations is

A

Financial Management

911
Q

An evaluation of the suitability of the current process in assessing risk and its sufficiency to manage risk is

A

Gap Analysis

912
Q

What is recovery point objective is (RPO)

A

The point in time to which an organizational activities in a known integral state can be restored from

913
Q

An employee whose continued performance shortcoming due to drug policy violation should attract what, explain the sequence

A

Documented progressive discipline such as
Oral warning,
Written warnings,
Suspension and ultimately
Termination

914
Q

What are work place violence spectrum

A

Behavioral recognition
Notification
Assessment
Intervention by planned disruption

915
Q

What are work place violence spectrum

A

Behavioral recognition
Notification
Assessment
Intervention by planned disruption

916
Q

Which kind of sprinkler is positioned at the centre of a building against fire out break

A

Wet pipe sprinkler

917
Q

How is the brightness of light measured

A

Lumen

918
Q

What is the most essential part of the CCTV project

A

Camera

919
Q

Security is moving towards the use of hybrid security, what does this entail

A

Proprietary supervisors (first line managers)
oversee contract front -line officers (Guards)

920
Q

Security is moving towards the use of hybrid security, what does this entail

A

Proprietary supervisors (first line managers oversee contract front -line officers)

921
Q

What kind of lightening have a high re strike time

A

High intensity discharge family of lamps

922
Q

What is the problem faced by security department in an organization

A

Low credibility

923
Q

The security of an organization rest squarely on who

A

The practices of employees

924
Q

The most expensive fee in design is

A

Projected system construction costs

925
Q

What is international standard for ISO 27001 and ISO 27002

A

FOR Management of information security and other information technology

926
Q

An alarm that sound within a compound

A

Local alarm

927
Q

What is the most essential job requirement for a person loading a dock in a shipping company

A

Direct requirement

928
Q

An undercover investigator wrote in his report ‘I saw the suspect passed some parcels; containing white substance suspected to be heroine to an employee’ What is wrong with the report

A

Name of suspect not clearly mentioned
Time of exchange not mentioned
Substance exchange has no validation

929
Q

Who are the first line of defense in the recruitment and selection of quality and risk-free applicant for the organization

A

Human Resource Personnel

930
Q

At what point would you withdraw an undercover agent

A

When the investigation, has yielded enough information to allow the operative to be removed

931
Q

This provides a method for evaluating and comparing the value and cost of risk treatment options

A

Cost-Benefit Analysis

932
Q

The role of the security investigator in pre-employment screening

A

Verification of all information provided by the applicant in his signed application

933
Q

What has historically been associated with reactive, rearwards-looking reviews situations

A

The use of RCA (Root cause analysis)

934
Q

How many days period between pre-adverse action and adverse action

A

60 Days

935
Q

What is the best cover to adopt when disengaging an undercover operative

A

When the operative has been named as an offender
If named as a co-offender by enough interviewees

936
Q

Who developed the concept ‘‘Eyes on the street’’

A

Jane Jacob’s

937
Q

What is another name for the cause and effect analysis diagram

A

Fishbone diagram or Ishikawa Programming

938
Q

How should the shipping, receiving and warehouse departments be designed

A

They should be separated as much as possible to minimize collusion and pilferage opportunities

939
Q

What theory suggest that unmaintained space can lead to the impression of abandonment and increase crime opportunity as no capable guardian is observed

A

The ‘‘Broken Window’’ theory

940
Q

To align specific actions with specific risks as a means of leveraging or overcoming existing dependencies, what tool is required

A

Force field analysis and influence diagrams

941
Q

What process assess the likelihood and consequences to determine the level of risk and prioritize risk treatments

A

Risk Analysis

942
Q

An evaluation of the suitability of the current process for assessing risk and its sufficiency of the current process for assessing risk and its sufficiency to manage risks is

A

Gap Analysis

943
Q

What is designed to pictorially show how relative strength of the risk can impact each other

A

Force Field Analysis

944
Q

A provision that once an employer obtains consent, consumer report may be procured at anytime during the employee’s tenure without tenure without having to obtain another consent

A

‘‘Evergreen clause’’ or ‘‘Blanket’’ Authorization

945
Q

The longest period of time that a critical process can be disrupted before recovery becomes unlikely is

A

Maximum Downtime

946
Q

A visualization tool for categorizing the potential causes of a problem in order to identify its root cause is called

A

Fishbone Diagram

947
Q

A two-dimensional means of representing the risk level using a matrix showing risk events, defining likelihood and consequences is called

A

Heat Map

948
Q

How many days period between adverse and pre-adverse response

A

3 Days

949
Q

The Fishbone diagram or Ishikawa Programming is also known as what

A

The cause and effect analysis diagram

950
Q

Words, phrase, and graphic symbols are used for protection as what

A

Trade Mark

951
Q

You are the team leader of a search team you discovered a computer unit during search, how would you go about it

A

Isolate
Photograph and
Document the computer system

952
Q

A type of light to be used when one is coming out of a tunnel is

A

Induction lamps

953
Q

What type of cabling is regarded to be used when installing a camera with a distance of 1000ft

A

Coaxial Cable

954
Q

A key principle of PPS analysis is

A

An initial baseline must first be established, upgrades are then considered if the baseline shows the PPS does not meet goals and objective

955
Q

A budget that generates revenue is

A

Zero-Based budgeting

956
Q

When installing a camera with distance of 2,500ft to the control room what type of cable is recommended

A

Fibre Optics / Type RG-11

957
Q

Tank fire extinguisher is used for which type of fire

A

Class B Fire

958
Q

The process for planning and allocation of money to be used for the year is

A

Budgeting

959
Q

How should the undercover report be written

A

Third Person

960
Q

What is the most expensive and last stage of the employment process

A

Back grounding

961
Q

A key element of an information asset protection risk assessment model is

A

A thorough study of existing and projected threat

962
Q

Water pump is best to extinguish which type of fire source

A

Wood, Papers, Fibers (Class ‘A’ Fires)

963
Q

Emergencies are categorized as

A

Natural,
Human and
Accidental Threats

964
Q

The fire extinguisher used in restaurants is

A

Dry Chemicals and Wet Chemicals

965
Q

The process for planning and allocation of money o be used for a year is

A

Budget

966
Q

Intent of damage or an indication of something impending is

A

Threat

967
Q

An ordered series of actions against a facility which if completed, results in a successful malevolent outcome is

A

An adversary path or fault tree

968
Q

What is the primary objective of the logical network access control

A

To preserve, and protect the;
Confidentiality,
Integrity and
Availability of information system

969
Q

A technique used to identify the conditions that initiate the occurrence of an undesired activity is

A

Root Cause Analysis

970
Q

Deliberately and knowingly making a false and damaging statement about the subject of an investigation is called

A

Tort of Slander

971
Q

When considering entries to be used during strike, what parameter should guide this decision

A

They should be situated so that loss of control by police would produce a public traffic control problem to facilitate the application of more law enforcement pressure promptly

972
Q

Altering and encoding information in a way that it can only be decoded by whom it is intended is

A

Encryption

973
Q

High-rise facility is associated with space challenges in which areas

A

Public access or common areas
Rented or assigned occupancies
Maintenance spaces

974
Q

A very expensive type of light with very short life span is

A

Incandescent light

975
Q

The possibility of loss resulting from threat event or incident is

A

Risk

976
Q

Dry powder is best to extinguish which type of fire source

A

Gasoline Fire or Class B Fire

977
Q

How should communication with the press be handled during an emergency situation

A

Through prepared press releases and oral briefings through a single source in the organization

978
Q

A type of budget where senior management dictates the figures is

A

Top-down budget

979
Q

How should the undercover narrative report be written

A

Third Person

980
Q

The duration of a failsafe lock on an emergency doors of High-rise building is

A

15 To 30 Seconds

981
Q

When can an emergency door be locked

A

To practice the use of alternate exits during drills.

982
Q

The most important consideration in the budget of CCTV installation is

A

It is best to design the application before establishing a budget
After the design is completed, the cost can be calculated

983
Q

The lumens of incandescent light is

A

1700 Lumens

984
Q

Tank fire extinguisher is used for which type of fire

A

Class B Fire fuelled by gasoline, flammable liquids

985
Q

An important aspect of internal human relations as well as public relation during an emergency is

A

The handling of information concerning casualties

986
Q

A crime scene investigation is what measure in an investigative activity

A

Reactive Measure

987
Q

The investigation report that can be either initial or final is used when

A

In a simple case

988
Q

The appropriate time to withdraw an undercover operative is

A

When He/She has been named as a co-offender or
Before the operation is compromised.

989
Q

What is a requirement for release of names of those who have been killed or injured during an emergency

A

Relatives must be informed before such information can be released to the public

990
Q

What should the undercover keep record of and how often

A

Make daily reports on his observation and experiences, after each shift

991
Q

What is the major function of CEO as regards SOX laws

A

To personally certify financial reports that are released to the public

992
Q

What is also referred to as a ’’Risk Universe’’

A

Risk Portfolio

993
Q

What is the purpose of the undercover operatives report

A

They are ultimately used to make decisions.
Serves as the basis for post investigation administrative action

994
Q

List what are considered hard cost due to high number nuisance fire alarms In an organization

A

Lost productivity for employees evacuating the building
Cost of fire department fines

995
Q

The investigative capabilities of the public sector is frequently measured in what term

A

Numbers of arrests and convictions

996
Q

A company’s effectiveness in using financed assets to generate income is called

A

Return on Equity

997
Q

What type of risk method is keeping money in the bank

A

Risk Transfer

998
Q

Primary resources of a business is

A

Its people/Employees

999
Q

What are the primary elements of incident management system

A

Command
Operatives
Planning
Logistics
Finance and administration

1000
Q

Avoiding answering questions from the press with the phrase ‘’ No Comments’’ will result to what

A

Leads to the propagation of rumors, conjecture and speculation from sources with little or no information

1001
Q

What are considered soft costs due to high rate of nuisance fire alarms in an organization

A

Wear and tear on building mechanical system when alarms activate
Tendency for employees to learn to ignore alarms thereby placing themselves in jeopardy
The potential for staff injuries during evacuation
The frustration of the organizations staff and fire department personnel due to the high number of alarms

1002
Q

In a series of robberies occurring in an environment list two strategies that can be adopted by the public sector investigation

A

Proactive strategy – Surveillance
Reactive Strategy – Assigning more manpower to solve cases

1003
Q

Which organization model consists of third party suppliers who has been chosen for their expertise and ability to provide quality service to the organization

A

Shamrock Model

1004
Q

What are the characteristics principles involved in internal theft

A

Diversion
Conversion
Disguise
Divergence

1005
Q

The expected first step of an executive protection program is

A

Establishing a Crisis Management Team

1006
Q

The Sarbanes-Oxley Act (SOX) is officially known as what

A

The public company accounting reform and investor protection Act of 2002

1007
Q

In an organization, these highlights specific goals that the organization wants units to achieve

A

Objectives

1008
Q

What is the best cover to adopt when disengaging an undercover operatives

A

When named as co-offender by enough interviewees

1009
Q

Elements of a post order are

A

Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy-to understand terms
Orders are indexed in details

1010
Q

The commonest type of loss in any organization is

A

Employee theft/Internal Loss

1011
Q

List what records are admissible in legal proceedings as entries made in the regular course of business and are therefore an exceptions to the evidentiary rules against hearsay

A

Security Logs and Reports

1012
Q

The most outstanding quality of an investigator is

A

The ability to obtain information from individuals through questioning

1013
Q

Method of recruiting non-entry level staff is

A

Blind -ad

1014
Q

The most costly item in an security department budget is

A

Security Officer (Personnel)

1015
Q

What conveys a general understanding of the business, its culture and its future goals

A

Vision

1016
Q

What is the required time period to inform an applicant about an investigative consumer report on him by the employer

A

3 Days

1017
Q

Type of light recommended for a residence is

A

Incandescent/ Halogen

1018
Q

During strike action the standard is to have how many entries

A

The fewest entries possible consistent with the realistically estimated operating status preferably 2 entries (One-in One Out)

1019
Q

For security professionals planning for a strike should start when

A

The commencement of the 60days as effective notice of the possibility of a strike

1020
Q

When a receiving dock personnel counts a shipment without knowledge of the stated quantity this is called

A

Blind-Tallies

1021
Q

In an organization what states objectives and business goals

A

Vision

1022
Q

The first notice of an intended decision not to hire an individual based in whole or part on a consumer report before it is taken is called

A

Notice of pre-adverse action

1023
Q

What is designed according to an entity’s risk appetite, risk tolerance, timeframe and return objectives

A

Risk Portfolio

1024
Q

The longest period of time that a critical process can be disrupted before recovery becomes unlikely is

A

Maximum Downtime

1025
Q

What serves as the basis for post-investigation administrative action

A

The Investigation Report

1026
Q

When an abductor develops interest in the victim, this is

A

Lima Syndrome

1027
Q

The process of removing data on a storage medium before the medium is reused is

A

Sanitizing

1028
Q

An organization most valuable resource is

A

Employees

1029
Q

When is a strike by employees considered illegal

A

The absence of a ‘’60 days’’ notice of intent to modify the collective bargaining agreement

1030
Q

Magnetically erasing a storage medium such as a Hard Drive is called

A

Degaussing

1031
Q

If an investigator makes a racial statement about individuals involved in a case under investigation what is the recommended

A

It may be best for another investigator to conductor the interview with the individuals

1032
Q

The potential that a given threat will exploit vulnerabilities to cause loss or damage is

A

Risk

1033
Q

A complete collection and range of uncertainties that affects an organization’s future is

A

Risk Portfolio

1034
Q

A person to whom sensitive company information is entrusted is called

A

Fiduciary

1035
Q

Open/ closed questions @ the beginning of interviews is to do what

A

To put interviewees at ease

1036
Q

What tool is used to determine how a particular undesired event may occur

A

Logic diagrams

1037
Q

What is the first step required of an investigator in a due diligence investigation

A

Examine the issue at hand,
Better still look at the question at hand and determine what is important for the particular problem

1038
Q

What is the critical element in an interview

A

Ability of the interviewer to establish favorable rapport with the interviewee

1039
Q

To trace an initiating event through a sequence with different possible outcomes, what tool is required

A

Event trees

1040
Q

What is the key to a due diligence investigation

A

Understanding the needs of the client and the transaction at hand

1041
Q

The most outstanding quality of an investigator is

A

The ability to obtain information from individuals through questioning

1042
Q

A search for discarded intellectual property or prototypes from a waste bin is called

A

Dumpster diving

1043
Q

When should undercover investigation be used

A

When no other alternatives are available
When the company can reasonably expect return on the investment

1044
Q

You have been appointed as the new security manager of a storage facility where high theft rate is recorded, what is the first step you would take

A

Setting up shipping, receiving and warehousing as individual departments (SMM 151)
Shipping and receiving areas of the loading dock should be physically separated (PSM 64)
Separate the two functions of shipping and receiving to minimize collusion and pilferage opportunities

1045
Q

List what are sources information asset threat

A

International threats
Natural threats and
Inadvertent threats

1046
Q

A tool used to determine the basic causes events is

A

Fault trees

1047
Q

What is the greatest exposure to a corporation in terms of threat outside competition

A

Employees theft and fraud

1048
Q

An employer failure to conduct pre-employment screening is liable for negligent hiring and

A

Discrimination

1049
Q

How would foreign competitors criminally seek economic intelligence from U.S industries

A

Establishing, seemingly innocent business relationships between foreign companies and U.S Companies to gather economic intelligence including trade secrets

1050
Q

What is the second greatest cost in an internal investigation unit

A

Overhead cost

1051
Q

Types of emergency are natural, accidental and what else

A

Man-Made

1052
Q

In analog view what percentage of the overall scene width does a subject occupy at the point of recording

A

20 Percent

1053
Q

What measures can be changed without the tedious review from management before it can be implemented

A

Procedures

1054
Q

The advantage of private policing over public policing is

A

The objective of service delivery

1055
Q

What best describes a post order

A

Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple easy-to understand terms

1056
Q

The members of the incident management team are; (1) A senior human resource manager (2) A senior management representative (3) A senior security manager and who else

A

A legal representative familiar with labor and employment laws

1057
Q

How do you pick a spent cartridge at a crime scene

A

At the open end using tweezers

1058
Q

Planning for emergency preparedness need to be documented and what

A

Ensure recovery from business interruption and to protect the profitability of the enterprise
Reviewed and updated regularly

1059
Q

What is the main objective of executive protection

A

Preventing and avoiding trouble/danger

1060
Q

What has broader scope in the recruitment process

A

Background investigation or screening/pre-employment screening

1061
Q

Who in the event of high impact emergency is needed to establish the incident management system

A

Public and private agencies

1062
Q

When should an interviewer observe non-verbal response

A

Throughout the interview process

1063
Q

How does multiple sensors experience nuisance alarms

A

Decrease pattern

1064
Q

How is fire resistant safes rated

A

To indicate the hour of protection and the temperature of the inside of the container can withstand

1065
Q

What is essential in any emergency response

A

Communication

1066
Q

One company experience theft with low loss but high frequency, another company experience high loss low frequency what type of assessment should be conducted

A

Qualitative risk assessment

1067
Q

What is field of view

A

The height or width of the area being viewed, which determines the appropriate focal length of the lens.

1068
Q

What human factors make people commit industrial espionage

A

Social engineering

1069
Q

What type of questions limits the amount or scope of information that the witness can provide

A

Closed-ended questions

1070
Q

After the threat and assets are defined, a vulnerability assessment is generally performed to achieve what

A

Establish a baseline of PPS effectiveness in meeting goals and objectives

1071
Q

What sensor is affected by Doppler principle

A

Microwave

1072
Q

What insurance should be purchased to protect employees for injury incurred to customers for not properly assembling products

A

Liability endorsement/liability policy

1073
Q

Typically to whom should the security director report to

A

Directly to senior or executive management (CEO)

1074
Q

What best describes a strategy

A

The fundamental template for direction that defines and supports long-term goals

1075
Q

How will management support funding of the investigative unit

A

If the unit shows value to the organization and demonstrate that the unit pays for itself

1076
Q

What measures tends to remain in place for an extended time once established as it is aligned with the overall business objectives of the organization

A

Policy

1077
Q

How will the investigative units significantly improve response from management for its funding request

A

By carefully tracking and managing operational and over head costs

1078
Q

The most common tool for controlling the brightness of an image focused onto a chip is called

A

Auto-Iris Lens

1079
Q

List deceptive actions exhibited by an interviewee

A

Significant posture change grooming gesture and cosmetic adjustment supportive gesture

1080
Q

A person who likes to be in large crowd, socialize, like to be in charge

A

Extrovert

1081
Q

What concept is when a member of the crisis management team is vacant, there will be someone to take over

A

Alternate designate or member

1082
Q

What does ISO standard propagate

A

Voluntary standard

1083
Q

What is the two classification of bomb

A

Incendiary and explosive

1084
Q

During an interview, what responses from a witness tends to be more accurate and promote more effective listening on the part of the investigator

A

Open-ended response

1085
Q

What is a fundamental tool to most security officers positions

A

Keys

1086
Q

Who in the organization is most concerned with security activities as its effects performance

A

First-line supervisor/managers

1087
Q

To access a computer what is essentially needed

A

What you know (password)
What you have (access card)
What you are (biometrics)

1088
Q

To increase information security IAP awareness what must be done

A

Develop,
Promulgate and enforce practical policies for IAP
Conduct security awareness and training

1089
Q

When employees are given emergency response training, this training must be

A

Reinforced and tested with periodic drills and exercise

1090
Q

If an incident of concern is received, the threat management team will first do what?

A

Evaluate the risk

1091
Q

Threat and vulnerability are sometimes interchanged with what word

A

Risk

1092
Q

Two types of maintenance are

A

Preventive and remedial maintenance

1093
Q

Right design and less crime is synonymous with what concept

A

CPTED (Crime prevention through environmental design)

1094
Q

Vulnerability to defeat involves what

A

Bypass and spoofing

1095
Q

Absolute alarm confirmation is ideally achieved by combining two technologies, each with a high probability of detection and no shared susceptibilities to nuisance alarms, what sensor replicates this features

A

Dual technology

1096
Q

Assurance of the management that their partner-company, during emergency will back them up is called

A

Mutual Aid

1097
Q

Right design of perimeter security

A

Consistency in detection

1098
Q

The adversary against which the facility must be protected is referred to as

A

Design basis threat

1099
Q

What are open-ended question

A

This allows for an unlimited response from witness, in his or her own words, thereby generating a greater amount of unsolicited information

1100
Q

What are the three general methods for valuing assets

A

Monetary value,
Consequence criteria,
Policy

1101
Q

What is the optimal relationship between police and private security

A

Institutionalized coordination and cooperation through structural and contractual relationships

1102
Q

What three questions should a risk assessment answer

A

What can go wrong?
What is the likelihood it could go wrong?
What are the consequences?

1103
Q

Who should be involved in developing a standard

A

A broad group of stakeholders and interested parties, working collaboratively

1104
Q

What type of specimen is analyzed most often in drug tests?

A

Urine

1105
Q

Which stakeholder group drives the ANSI standards development process?

A

Standards users

1106
Q

In Pastor’s public/private, substitute/ supplement model of policing, which cell represents the rarest scenario?

A

Public/Substitute

1107
Q

What is the principal value of security awareness to executive management?

A

Awareness of the security program’s financial contribution to the bottom line

1108
Q

What are the elements of a systems approach to developing a physical protection system

A

Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness

1109
Q

What are the four main strategies of second generation CPTED (Four C’s)?

A

Cohesion,
Capacity threshold (tipping point),
Community culture,
Connectivity

1110
Q

At what size and how far above the ground should an opening in a building’s shell be protected?

A

96 square inches and under 18 feet above the ground

1111
Q

What two values describe sensor effectiveness

A

Probability of detection and confidence level

1112
Q

What are the three ways to measure profit margins

A

Gross profit margin = (revenue – cost of goods sold – general and administrative costs)/ revenue
Operating margin = EBITA (earnings before interest, taxes, and amortization)/revenue
Net profit margin = net income/revenue

1113
Q

What is the major exterior application of bistatic microwave sensors

A

Detecting a human being crawling or rolling on the ground

1114
Q

What is the most accurate confirmatory drug test?

A

Gas chromatography/mass spectrometry

1115
Q

What determines the appropriate focal length for a CCTV lens

A

The field of view

1116
Q

What are the five pillars of ISO standards

A

Equal footing of members market need consensus voluntary participation and application worldwide applicability

1117
Q

The first step in the risk assessment process is

A

Data gathering

1118
Q

What kind of lens has become the standard for camera and lens design

A

DC/LC (Direct circuit, logic control)

1119
Q

Which two types of lamps take the most time to restart after a power outage

A

Metal halide and
Mercury vapor

1120
Q

What are the general rules of thumb for lighting levels for detection, recognition, and identification?

A

Detection – 0.5 fc
Recognition 1.0fc
Identification – 2.0fc

1121
Q

What is the biggest vulnerability of a loop system?

A

All the detectors in an area could be disabled by interrupting the loop at the proper location

1122
Q

What are the shortcomings of magnetometers

A

They only detect ferromagnetic materials, so they don’t detect metals such as:
Copper,
Aluminum, and
Zinc.

1123
Q

What bulk explosives detection technology uses pulsed low energy radio waves to determine the presence of nitrogen-rich materials?

A

Quadruple resonance

1124
Q

What is an effective way of setting the value of line items in a budget

A

Look at each budget expense as an investment and calculate the expected return on that investment

1125
Q

What technology is considered the gold standard of trace explosives detection but is hampered by high costs, high maintenance requirements, and the need for expert operators?

A

Mass spectrometry

1126
Q

To be fire resistant, what are the minimum wall thicknesses for 4-hour vaults and 6-hour vaults

A

4-hour vaults: 12 inches of brick or 8 inches of reinforced concrete
6-hour vaults: 12 inches of brick or 10 inches of reinforced concrete

1127
Q

Above what weight should safes be anchored, according to UL

A

750 s

1128
Q

What are the three steps in creating an adversary sequence diagram

A

Describe facility by separating it into adjacent physical areas
Define protection layers and path elements between adjacent areas
Record detection and delay values for each path element

1129
Q

In which type of procurement process is it usual for prospective contractors to submit sealed bids that are publicly opened

A

Invitation for Bid

1130
Q

In EP, what is an advance?

A

The process of researching a destination before the principal arrives

1131
Q

What is the range of light sensitivity for standard analog CCD cameras

A

.005 lux to 10 lux

1132
Q

What is “working the principal”?

A

The choreography used by an executive protection specialist to physically move about with the principal

1133
Q

What are the three basic stages of addiction

A

Craving,
Loss of control,
Physical dependence,
Tolerance

1134
Q

What are the four symptoms of alcohol dependence

A

Increased tolerance to the drug Increases in rationalization, lying Obsession

1135
Q

What is the most accurate preliminary drug test?

A

Radioimmunoassay (RIA)

1136
Q

How does situational crime prevention differ from CPTED and defensible space

A

Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.

1137
Q

What business-related concerns should a workplace violence program address

A

Liability,
Productivity,
Workplace morale,
Associated costs

1138
Q

What is “the second injury?”

A

Emotional harm to employees caused by unconcerned or callous management in the wake of a workplace violence incident

1139
Q

What is the name for the process by which an employer verifies the experience and qualifications presented by a job candidate?

A

Credentialing

1140
Q

What are the most challenging problems in international investigations?

A

Cultural differences

1141
Q

What is one of the most common errors in “friendly” due diligence investigations?

A

Relying on information provided by the target

1142
Q

What is typically the initial question in an interview?

A

A request for the subject to relate the events in the matter under investigation

1143
Q

How should obsolete prototypes, models, and test items be disposed of?

A

They should be destroyed so they can’t be reverse engineered

1144
Q

The three methods of sanitizing electronic media

A

Overwriting,
Degaussing,
Physical destruction

1145
Q

What are the two primary aspects of recovery after an information loss?

A

Return to normal business operations ASAP and implement measures to prevent a recurrence

1146
Q

What is the difference between embedded and host-based systems

A

Embedded systems are typically programmed at the manufacturer and run proprietary or nonstandard operating systems, e.g. cameras, card readers, and video converters.
Host-based systems run on more standard operating systems such as Windows and Linux and are easier to change

1147
Q

What is the “A triad” of information security with regard to access con

A

Authentication,
Authorization,
Auditing/accountability

1148
Q

What are the three types of emergency operation plans?

A

All hazards,
Standalone (different for each emergency),
Combination of all hazards/standalone

1149
Q

Who should be assigned the role of an organization’s emergency coordinator

A

Someone regularly responsible for handling emergencies, such as the head of security or engineering

1150
Q

What security measures can help prevent or limit the effect of bombings if sufficient standoff distance is impossible?

A

CCTV,
Security patrols

1151
Q

When conducting risk identification, what should be consulted as a key impute

A

The business SWOT analysis

1152
Q

An organization that sends and e-mail to an outside organization requires what to protect the e-mail

A

Virtual private network (VPN)

1153
Q

What is a collaborative technique for building consensus involving independent analysis and voting by experts

A

Delphi methodology or facilitated workshops

1154
Q

What is the key question in a bomb threat assessment

A

Whether the threatener could have done what was claimed

1155
Q

What is the most important and most difficult phase of bomb threat evaluation

A

The review phase

1156
Q

What is the primary cause of nuisance alarms for bistatic microwave sensors

A

Standing water

1157
Q

What are the two goals when dealing with possible chem-bio mail attacks?

A

Limit distribution of the material, look after any staff who have been exposed

1158
Q

What does a balance sheet show

A

A summary of an organization’s investing and financing

1159
Q

What should a full set of PPS procurement documents (contract documents) contain?

A

Contractual details,
Construction specifications,
Construction drawings

1160
Q

What three elements are depicted in a cash flow statement

A

Net operating cash flow,
Net investing cash flow,
Financing cash flow

1161
Q

Which two ratios show how an organization has done in making money during a reporting period?

A

Return on assets = net income/total assets
Return on equity = net income/shareholder equity

1162
Q

When should fiber optic cable replace coax cable in video systems

A

For distances greater than 1,000 feet.

1163
Q

What is used to conduct threat analysis

A

Threat tree analysis

1164
Q

Should the deliberations of a threat evaluation team be recorded

A

Yes, to assist with subsequent investigations, to justify actions taken, and to provide a basis for future training and process reviews

1165
Q

What is the quick ratio

A

A measure of an organization’s ability to cover current liabilities with current assets that can be quickly converted to cash
Quick ratio = (cash + securities + accounts receivable)/current liabilities

1166
Q

What is generally the most practical approach to budget development

A

Top-down bottom-up

1167
Q

In a security services contract, what should the scope of work specify

A

Security tasks,
Days and hours of performance,
Total number of hours to be worked

1168
Q

When conducting risk identification, what should be consulted as a key impute

A

The business SWOT analysis

1169
Q

What is the first criterion in evaluating bids for security services

A

Complying with the submission deadline

1170
Q

For executive protection, the decision for using of vehicle should be based on what

A

Risk Assessment

1171
Q

In establishing financial strategy what benefit does it provides to the organization

A

It identify expected margins the businesses generally make

1172
Q

What is dependent on the risk control measures deployed to manage the risk events

A

Vulnerability

1173
Q

When numerical data is inadequate, uncertain or unavailable to properly describe a given risk, which analysis approach is most suitable

A

Qualitative analysis

1174
Q

What is the current ratio

A

A measure of a company’s ability to cover short-term obligations
Current ratio = current assets/current liabilities

1175
Q

A threat to impartially that arises from complacency or over familiarity with the context of operating conditions is

A

Habituation

1176
Q

Who assumes that workers are thoughtful, eager to perform well and willing to guide

A

Mc Gregor’s Theory

1177
Q

What is EOC

A

Emergency operation centers

1178
Q

What in an organization specifies type of products, and level of quality

A

Mission

1179
Q

Informing an emergency management what does a management analysis to partner a supply chain to provide the emergency assistance

A

Mutual Aid

1180
Q

What should provide a structure for the various assessment activities

A

Checklist

1181
Q

Where is the executive most vulnerable

A

At home

1182
Q

What is the most important consideration when developing emergency management plan

A

Management involvement in the identification and evaluation of key assets of the organization that need to be protected

1183
Q

What drives the findings and conclusions of any investigation

A

Information and evidence gathered

1184
Q

What best describes the performance measurement and training in a job requirement analysis

A

This is to aid employee development and retention through review and reward of performance and provide training mechanism for employee growth

1185
Q

A data gathering process that uses descriptive models to ascertain and analyze possible events that may occur in the future and their potential outcomes is called

A

Scenario analysis

1186
Q

In case of destruction of the EOC, what is necessary

A

Designation of an alternate building location outside the building of the primary EOC

1187
Q

During the preplanning stage of the EP program, what is the best approach

A

Establish a crisis management team

1188
Q

Analysis of vulnerability involves what

A

Analyzing the attributes of the event and assets, services and activities

1189
Q

What does timely response, resumption of critical business function and recovery show in the business continuity

A

BIA (Business Impact Analysis)

1190
Q

What conveys the general understanding of the business, culture and future goals

A

Vision

1191
Q

Which form of test is used to determine reaction to different situation through a form of stimulation

A

Stress analysis test

1192
Q

What best describes the financial strategy

A

A management financial approach to determining the expected return of its investment

1193
Q

For continuity of operation what should an EOC must have

A

Should have back-up power and an independent supply of potable water,
Sanitary arrangement that are not dependent on the normal water supply must also be considered

1194
Q

In which financial statement is EBITA clearing shown that is earnings before interest, taxes, and amortization

A

Income statement

1195
Q

What are technical controls in information security

A

Network log-ins and passwords,
Firewalls audit logs,
Encryption,
Antivirus and
Spam filters.

1196
Q

Standards that are binding under the law and can be enforced by formal authorities

A

Statutory standard/regulatory standard

1197
Q

What does Gap analysis mean

A

A technique that can be used to determine what steps might need to be taken to improve the organization capacity to conduct a risk assessment to move from current state to a desired future state

1198
Q

What should a security manager do to maximize cost-effectiveness

A

Ensure that operations are conducted in the least expensive, but cost effective way
Maintain the lowest cost consistent with required operational results
Ensure that the amount of money spent generates higher return

1199
Q

One of the most important ingredients in effectively managing an emergency event is what

A

Communication

1200
Q

In what analysis should the staffing decision be measured in a detailed job analysis

A

Job requirement analysis

1201
Q

The range of threats to a principals safety and well-being are vast, what is perhaps the most troubling event

A

Events that have been known to occur but are unexpected

1202
Q

What metrics shows when assessing employees overall contribution to the company

A

Extra sales, extra hours, work on several projects
Work on task outside the position requirements
Contribution towards improvements in the business process
Leadership

1203
Q

Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk

A

Sensitivity analysis

1204
Q

Information on how much money an organization generates (Revenue) how much it spends (Expenses) and the difference between those figures (Net income) is obtained where

A

Income statements

1205
Q

What is an integral part of the business continuity

A

Business Impact Analysis

1206
Q

What threats to impartiality arises from complacency or over-familiarity with the context of operating condition

A

Habituation

1207
Q

After the emergency the plan should given priority to what

A

Facility structure

1208
Q

What elements are required for a successful bombing

A

Motive
Knowledge
Materials
Opportunity

1209
Q

An indication of the effectiveness of incident prevention effort is

A

Quick and accurate reporting of suspected incidents

1210
Q

Which consultant does the investigation, identification and collection of evidence, identification of vulnerabilities in an assessment

A

Forensic security consultants

1211
Q

A simple technique for prioritizing possible changes by identifying the problems that will be resolved by making these changes is

A

Pareto analysis

1212
Q

In financial decision, what does financial analysis considers

A

Profitability measurement and business risks

1213
Q

What specifics does the vision gives to an organization

A

Description of where the business will be in the long term

1214
Q

In a risk assessment, how is risk ranks measured

A

Low,
Moderate
High
Critical

1215
Q

When does an EPS need to do the advance in executive protection

A

Before the principal arrives

1216
Q

What training may promote innovative approaches to work tasks

A

External training

1217
Q

In designing primary and alternative EOC/CMC what should be the primary consideration

A

They should be able to accommodate the CMT and should provide redundant communication capabilities

1218
Q

Which method of data collection involves observations, interviews, checklist and reviews of historical data

A

Evidence-based methods

1219
Q

The category of security consultants that form the largest group within the consultant profession is

A

Security management consultants

1220
Q

Gap analysis consists of three steps list them

A

Noting currently available factors
Listing success factors needed to achieve future desired objectives
Highlighting the gaps

1221
Q

What does the most visible component of the EP program involved

A

Physical acumen

1222
Q

What provides a basis for making decision in the context of the different conditions and outcomes

A

Scenario analysis

1223
Q

What is a requirement to arrive at an appropriate threat level for a particular executive

A

EP risk assessment

1224
Q

What is the purpose of mutual aid association

A

An agreement of business and organization to assist each other by providing materials, equipment and personnel’s for disaster control during emergency

1225
Q

What is the most effective means of preventing workplace violence for security professional

A

Early detection

1226
Q

What will provide an insight into how the defined alternative differ from one another and provides a basis for considering new and improved alternatives

A

Decision analysis

1227
Q

In the balance sheet what value is neither an asset or liability

A

Shareholders’ equity

1228
Q

Which two ratios demonstrate how well a firm has done in making money for a reporting period?

A

Return on assets = net income/total assets
Return on equity = net income/shareholder equity

1229
Q

What encourages the employee to reporting incidents

A

Fostering a culture of integrity and honesty

1230
Q

Who decides on the security vs convenience continuum where the executive should be and what trade off to make

A

The principal and the agent

1231
Q

What is the goal of a risk assessment program

A

To review the risk management controls and system as well as identify opportunities for improvement

1232
Q

What helps employees to do their job better

A

Internal training

1233
Q

List three risk assessment approaches/methods

A

Operational risk assessment
Strategic risk assessment
Project risk assessment

1234
Q

An organization that sends and e-mail to an outside organization requires what to protect the e-mail

A

Virtual private network (VPN)

1235
Q

What do investigators often find is a precursor to an organization’s theft problem

A

A substance abuse problem

1236
Q

Which risk assessment method is limited to uncertainties associated with existing assets, people, processes and systems-in-place

A

Operational risk assessment

1237
Q

The risk of an organization is ready to bear after the risk treatment is

A

Risk tolerance

1238
Q

Which sampling method requires sample selection process to be based on probability theory

A

Statistical sampling

1239
Q

When evaluating the potential for intentional threats, consideration should be given to what

A

Presence and proximity of ‘‘hard’’ and ‘‘soft’’ targets

1240
Q

What descriptive terms are used to describe potential likelihood and consequences of risk events during qualitative analysis

A

‘‘Minor’’
‘‘Moderate’’
‘‘Major’’
‘‘Critical’’

1241
Q

Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk is called

A

Sensitivity analysis

1242
Q

Which theory believes that punishment or threat of punishment motivates a worker

A

McGregor’s theory x

1243
Q

What is recovery time objective (RTO)

A

The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days

1244
Q

What should be established at the beginning of the risk assessment process

A

Risk criteria

1245
Q

Which kind of attacks makes several direct attempts at the password of a system with the intention of compromising it

A

Brute force attack

1246
Q

A non-statistical sampling method wherein samples are selected based on convenience but preferably should still be chosen as randomly as possible is

A

Haphazard sampling

1247
Q

A helpful tool in evaluating the vulnerability of an asset is

A

Event tree

1248
Q

When scenario analysis and event tree logic diagrams are used in data collection, what technique is being applied

A

Inductive reasoning technique

1249
Q

What is the key task of the person planning and conducting the risk assessment program

A

To develop an understanding of the organization to be assessed.

1250
Q

What are the main two categories of sensors

A

Active
Passive

1251
Q

What are less conventional and more difficult to define nature of modern day threat

A

Asymmetric Threats

1252
Q

Security director should report to whom

A

A Key Senior Management Level Executive

1253
Q

Criticality is measured in terms of what

A

Financial Cost/Currency

1254
Q

The most important in pre-employment process is

A

Employer Application Form

1255
Q

Types of techniques of communication transmission

A

Point-to-point,
Loop,
Multiplex

1256
Q

What is common about workplace violence and drug abuse behavior

A

Although the rate illicit drug use is highest amongst unemployed, most drug users are employed

1257
Q

The new task of first-line supervisor

A

Mentoring and advising

1258
Q

What does it mean to divide video images to grid section

A

Masking

1259
Q

Another word for business ethics

A

Applied Ethics

1260
Q

Reason for non-entry technical/professional person

A

Blind – ad, its designed for career people

1261
Q

What rule has been violated if a security officer is reporting to two superiors

A

Unity of command

1262
Q

A person who likes to be with people, acts rather than rationalize is

A

Extrovert or Extroversion

1263
Q

Which light the least re-strike time

A

Incandescent
Halogen
Florescent

1264
Q

Lock with the highest delay

A

Pin Tumbler Lock

1265
Q

Perimeter lighting should be installed to face where

A

Down and away from the protected area

1266
Q

Type of space in High-Rise are

A

“Open” building,
“Closed” building
“Hybrid” building

1267
Q

What to do during earthquake

A

Take cover under a desk, or table or sit or stand against an inside wall

1268
Q

Types of light used in residence

A

Incandescent/Halogen

1269
Q

Types of smoke detector

A

Photoelectric detector
Ionization detector

1270
Q

Personal entry control is

A

What you have,
what you know,
what you are

1271
Q

What does plan in the PDCA implies

A

To define and analyze a problem and identity the root cause

1272
Q

What is the greatest threat to an organization

A

Industrial espionage

1273
Q

What determines the use of a car and driver in an EP program

A

Risk assessment

1274
Q

Verifying the experience and qualification that are presented by an applicant is

A

Credentialing

1275
Q

How do you handle a spent cartridge

A

Pick it up by the open end using tweezers

1276
Q

Two classifications of bombs is

A

Explosive
Incendiary

1277
Q

Difference between safety and security is

A

Unintentional or natural abnormal events vs malevolent intentional human caused event

1278
Q

The three primary products of explosion are what

A

Heat

1279
Q

Forms of explosions are what

A

Mechanical
Chemical
Nuclear

1280
Q

An illegal means of obtaining information about a competitor outside stealing it from him is

A

Performing reversed engineering
Directing an agent to gain employment with a suspected company under false pretenses.
Directing an agent to befriend employees of such company to collect information on proprietary manufacturing process.
Recruiting an employee of the company to provide information in manufacturing process.
Fake job interviews

1281
Q

A key element of the ISS risk assessment model is

A

A thorough study of existing and projected threats

1282
Q

What ensures there is no gap in plan maintenance of the emergency management structure

A

An alternate designate, for the designated organization’s emergency coordinator

1283
Q

A glazing material composed of two sheets of ordinary glass bonded in a middle layer of plastic sheeting materials thus mitigate against blast force

A

Laminated glass

1284
Q

What is based on the risk assessment and should consider both tangible and intangible assets

A

Cost benefit analysis

1285
Q

Security risk control and counter measures should be measured using what

A

Effectiveness and efficiency

1286
Q

What is the greatest mistake of an inexperienced investigator when interrogating a suspect

A

Neglecting the skill of listening

1287
Q

What type of questions can investigator ask an interviewee that will make him continue to talk more

A

Open-ended questions/narrative type questioning

1288
Q

What light is good for clearer and colourful video surveillance system (VSS)

A

Metal halide

1289
Q

Taking your money to the bank is what kind of risk measure

A

Risk Transfer

1290
Q

Surveillance, undercover and misconduct are what investigation

A

Constructive incident investigation

1291
Q

Function of “check” in PDCA is

A

Confirm outcomes against plan; identify deviation and issues, (quality control)

1292
Q

What information is contained in account payment

A

Account on which an organization owns money

1293
Q

EPS Choreography is

A

“Working the principal”

1294
Q

The principal and agent must agree on what

A

Where on the continuum the executive should be and what tradeoff to make

1295
Q

The most important task of an EPS

A

Preventing and avoid danger

1296
Q

The relationship between public and private policing should be

A

Structural and contractual/institutionalize, coordination and cooperation

1297
Q

Why the response to alarm by police is reduced

A

Increase in the number of alarm users

1298
Q

Security manager should report

A

A key senior level executive of the organisation

1299
Q

List key success factors of a security manager

A

Ability to build sustainable competitive advantage
Demonstrated integrity and ability to maintain principles under internal and/or pressure
High-quality analytical skills, management experience
Exceptional relationship management competence
Qualitative experience in strategic planning and policy development.

1300
Q

What provides a behavior based protection to the computer or server

A

Host intrusion protection system (HIPS)

1301
Q

What device operates on a computer or server to be able to look at both signature and behavior to protect the machine

A

Host intrusion protection system (HIPS)

1302
Q

List statements made by a deceptive person

A

Offers specific denials
Avoids realistic words
Qualifies answers
Uses religion or oaths to support statements
Gives delayed and evasive or vague answers

1303
Q

When a company lose $50, and makes a 5% profit margin, what amount of sales in dollar will be required to write off the stolen amount

A

: $1000 i.e 𝟓𝟎/𝟓 -: 5/100 = 50/1 x 100/5
= = $1000

1304
Q

Why employ employees with integrity

A

Best way to reduce internal theft in an organization

1305
Q

Taking your money to the bank is what kind of risk measure

A

Transfer

1306
Q

What is personified in the hard-driving authoritarian manager

A

Theory x

1307
Q

Security officer should be managed by who

A

Asset protection management and not placed as the sub-operation of another department

1308
Q

Giving responsibility with commensurate authority and holding the employee fully accountable for the use of the authority is

A

Delegation

1309
Q

Security manager assigned operational responsibility to a security officer is what

A

Delegating authority to see how he handles responsible decision making and security oversight

1310
Q

Gaps in employment history of more than what period should be investigated

A

One-month/30 days

1311
Q

In collecting which evidence/exhibits would you use tweezers

A

Spent cartridge

1312
Q

What is the most common in security function in modern time

A

Access control

1313
Q

Surveillance is

A

An overt monitoring to prevent a crime or misconduct

1314
Q

VSS (Video surveillance system) at the Harbor is

A

Standard lens (black and white)

1315
Q

A common characteristics of an inexperienced investigative Interviewer is

A

Impatient

1316
Q

What will help the CCTV function better

A

Operator’s capability

1317
Q

When conducting an interview what is the initial thing to do

A

Establish favorable rapport

1318
Q

The future of policing is

A

Proprietary supervisor oversee contract front-line officer

1319
Q

A manager that gives a task to someone immediately under him did so because he wants to do what

A

Motivate his subordinate

1320
Q

Which sensor is passive, covert, and can detect a change in electrostatic field when someone touches the protected object

A

Capacitance

1321
Q

The behavior spectrum of workplace violence

A

Harassment
Intimidation
Discrimination

1322
Q

For effective security measure of critical information, which security is best

A

Operation security

1323
Q

What security measure do you provide for an investigator

A

Operational security

1324
Q

How can a security manager convince management to approve his security

A

Talk about return on investment measurable in financial terms

1325
Q

In Investigating embezzlement, where to check the transaction of inflow and outflow over a period of time

A

The account payable and account receivable

1326
Q

Before conducting a security program what must you check

A

The organization strategy and goal

1327
Q

What the difference between vulnerability and risk assessment

A

Vulnerability assessment is the process of identifying and quantifying weaknesses.

1328
Q

Which pattern can give the best insight to an investigation

A

Asking for the interviewee’s understanding of the reason for the interviews

1329
Q

Which is the action of inexperienced investigator

A

Neglecting the skill of listening when interviewing suspects

1330
Q

How does an organization determine on whether to outsource an investigative unit

A

Cost benefit analysis

1331
Q

Statements of a deceptive person

A

Offers specific denials
Avoids realistic words
Makes seemingly irrelevant comments,
Gives delayed, evasive or vague answers
Qualifies answers or uses religion or oaths

1332
Q

An organization that has an alternative business location is called what

A

Hot Sites

1333
Q

When you put your item in a locker of a bank before going in, could be described as

A

Risk Avoidance

1334
Q

Which type of risk is achieved when EPS diverts The principal from riot scene

A

Risk avoidance

1335
Q

The threat that directly attacks password and also lure system user to reveal their Credential are what and what

A

Social Engineering/Brute force attack

1336
Q

What best describes asymmetric threats control

A

This is the bypass/sabotage of a victim Strengths while targeting their vulnerabilities

1337
Q

CPTED is aimed at achieving what

A

Deterring
Detecting and
Delaying likely offenders

1338
Q

Why should a Security manager decides to hire an insurance broker

A

Reduce risk by transferring the risk to the insurer

1339
Q

When an organization put in place protection in-depth in concentric layers, this could also be described as

A

Redundant schemes

1340
Q

Strategic planning, provision of resources, policy emplacement is a responsibility of

A

Managerial task/actions

1341
Q

A personnel is being considered for a supervisory and managerial role which should be factors to consider

A

Work on several projects,
Work on task outside position requirements,
Contribution towards improvement in the business process,
Leadership

1342
Q

A personnel has more than two superiors to report to which rule has been violated

A

Unity of Command

1343
Q

A supervisor has over 30 personnel’s to supervise, what are the challenges with this?

A

Span of Control

1344
Q

What motivates a worker to keep his work despite unfavorable working condition and whose theory

A

Job Content (motivators) Herzberg’s Motivation - Hygiene theory

1345
Q

The recommended way to pick a bullet Shell is

A

Picking it up by open end using tweezers

1346
Q

The last stage of the recruitment exercise

A

Back grounding

1347
Q

Who should be interviewed last

A

The offender or offending group

1348
Q

Concentric layers of security is also known as what

A

Protection - in-depth/Redundant Scheme

1349
Q

Types of exterior lightings are

A

Streetlights,
Searchlights,
Floodlights,
Fresnel and
High mast-lightening’s

1350
Q

Best light for residence

A

Incandescent/Halogen

1351
Q

The interior of a safe to control temperature requires

A

Moisture

1352
Q

How much sales is required to cover a loss of 5% on a profit of $50

A

𝟓/𝟏𝟎𝟎 X 𝟓𝟎/𝟏 = 𝟏𝟎𝟎/𝟓 X 𝟓𝟎/𝟏

= 100 X 10 = $1000

1353
Q

EPS that noticed riot and takes another route is doing what

A

Avoiding danger

1354
Q

The construction of container to store sensitive information should be based on

A

General Service Administration (GSA) Approval

1355
Q

Why lower management prefer bottom-up budget

A

They had a stake in developing it/they had an input in its development

1356
Q

When management generates an expenditure and allocates money to lower management what type of budgeting practice is described as

A

Top-down budgeting

1357
Q

In a technical surveillance situation, what should the security manager consider

A

Offices, meeting rooms be inspected for technical surveillance vulnerabilities
He should also obtain floor plans and details the sites telecommunication and audiovisual infrastructure

1358
Q

Most effective protection approach for a IT environment is

A

Integrating physical, procedural and logical protection measures in a layered approach

1359
Q

A building with wooden structure without windows experiencing temperature changes in the morning and evening all through the summer, which sensor detection will be most affected when applied

A

Passive infrared (PIR)

1360
Q

When is a victim most likely to be kidnapped?

A

On transit/when travelling

1361
Q

The decision to outsource and outsourcing approach of the investigative unit should be based on what

A

Cost benefit analysis and projected overall investigative needs

1362
Q

Who should be interviewed first during investigation

A

Persons who are not likely to be readily available later

1363
Q

Putting sensitive documents in a safety deposit box of a bank is which form of risk option

A

Risk transfer

1364
Q

The most cost-effective emergency management response drill

A

Tabletop exercise

1365
Q

Minimum time for lock delay during emergency is

A

15 – 30 second

1366
Q

Why is the facility shutdown during emergency

A

Speed the recovery operation

1367
Q

What cable is used for CCTV connection of 2,200m

A

Fiber optics

1368
Q

Criticality is measured in

A

Financial terms/Currency/Money

1369
Q

A means of proactively managing risk before they can affect planned objective is

A

Root Cause Analysis

1370
Q

To identify what failure mode gave rise to the loss event to support future preventive actions describes what

A

Root Cause Analysis

1371
Q

Words, phrases, logo or graphic symbols to distinguish products describes

A

Trade Mark

1372
Q

A property right in an original work of authorship giving the holder the exclusive right to reproduce, adapt and display the work defines

A

Copyright

1373
Q

What is used to identify the condition that initiate the occurrence of an undesired activity

A

Root Cause Analysis

1374
Q

Information that has the government grant of a right to exclude others from making an invention for a specified period describes what

A

Patent

1375
Q

Which CPTED solution is also known as target hardening

A

Mechanical measures

1376
Q

Removing data on a storage medium before it is reused describes

A

Sanitizing

1377
Q

When body cells adjust to the presence of drugs is

A

Chemical dependency

1378
Q

Tapping into a communication line is

A

Inductive coupling/Direct coupling

1379
Q

Best source of information for employment screening

A

Application form

1380
Q

When the adversary strikes, removing the principal from harm’s way is based on

A

EPS conditioned response

1381
Q

Definitive statements proves what

A

Truthfulness

1382
Q

Family of drugs for opium and cocaine is

A

Schedule II/Narcotics

1383
Q

Initiating a general discussion before direct questioning to accomplish rapport uses

A

Hidden persuaders

1384
Q

Who implements disciplinary action after an investigation in an organization

A

Organizations decision maker/Human resources

1385
Q

How do you get management support for an investigation

A

Show value to the organization and demonstrate that the unit pays for itself

1386
Q

Why a woman stays in an abusive relationship

A

Economic assistance

1387
Q

A written coverage to protect the employer from the dishonesty of the employees describes what

A

Fidelity coverage

1388
Q

To guarantee the performance of some obligation by an individual requires

A

Surety coverage

1389
Q

What is meant by chain of custody in evidence collection

A

All persons who came in contact with the evidence from collection to storage

1390
Q

When employees are manipulated to give up important information and when the system is remotely accessed without authorization is known as

A

Hacking/Social engineering

1391
Q

The most expensive part of an investigation process

A

Cost of personnel and outside services

1392
Q

Why do you inform the applicant that you want to conduct a credit check during background screening

A

Encourages applicants to be honest because they know that the information they provide will be scrutinized

1393
Q

Difference between covert surveillance and overt surveillance

A

Covert surveillance is hidden/unknown method of gathering intelligence unknown to the subject.
Overt surveillance is open method of preventing crime or misconduct.

1394
Q

Whose theory connects job motivators to work conditions

A

Herzberg

1395
Q

What are the characteristics of post orders

A

Each order deals with a single subject
Each order is as brief as possible
Each order is written in simple, easy to understand terms.
Orders are indexed in details

1396
Q

Which sensor works with Doppler principle

A

Microwave

1397
Q

HIPS is different from IDS, how?

A

HIPS operates on the host system such as computer or server

1398
Q

The qualities of a security manager

A

Business process enabler
Creative problem solver
Subject matter expert
Risk manager
Strategist
Relationship manager
Executive management
leadership
Governance and
Team member

1399
Q

Giving responsibility with commensurate authority and holding the employee fully accountable for the use of that authority describes what

A

Delegation of authority

1400
Q

The crisis management team should be as part of the emergency planning do what else

A

Review, update and test the plan regularly

1401
Q

In setting up a proprietary investigative unit, the most important aspect to consider is

A

Selecting professional personnel’s

1402
Q

A technique used to disguise digital data during transmission is

A

Encryption

1403
Q

Copies of investigative report should be distributed to whom

A

Only to those with a need-to-know

1404
Q

A critical onsite examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excess in determining the protection needed to make recommendation to improve overall security is the definition of

A

Security survey

1405
Q

Between the perimeter barrier and the exterior structure should be a clear zone of

A

20 feet

1406
Q

The intrusion detection system that is used on safes, desk, vaults is

A

Capacitance

1407
Q

The least in counter measure in terms of expense

A

Procedure

1408
Q

A barrier considered the most resistant to a blast explosion

A

Reinforced concrete

1409
Q

The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives of behavior is known as

A

Maslow theory

1410
Q

The difference in the physical stock of products and the number recorded in the book is called

A

Shrinkage

1411
Q

Many experts agree that the most important deterrent to internal theft is

A

Employees perceived chance of being detected or fear of discovery

1412
Q

According to estimates, about one third of all business failures are caused by

A

Theft from employees

1413
Q

Store inventory shortage are mainly caused by

A

Employee theft

1414
Q

Outsourcing of investigation unit is for what

A

Cost benefit analysis
Projected overall investigative need

1415
Q

The possibility of loss resulting from a threat is

A

Risk

1416
Q

A model for analyzing proposed organizational project is

A

SWOT

1417
Q

How would you demonstrate cost effectiveness to senior management

A

Show return on investment measurable in financial terms

1418
Q

Risk ratios are

A

Current
Quick
Equity

1419
Q

The three main categories of expenditures when developing security budget are

A

Salaries
Operational
Capital

1420
Q

What the business currently entails and where its needs to be in the future is the first step in developing what

A

Organizational Strategy

1421
Q

The only way the security operating function can justify continued funding from senior management is

A

Demonstrate that the real cost to the enterprise would be greater if the level of the support for the security operation is reduced

1422
Q

The second most valuable resource of an organization is

A

Corporate knowledge

1423
Q

Early warning signs that can lead to violence are

A

Harassment
Intimidation
Discrimination

1424
Q

The department that promulgates corporate policies and procedures is

A

Human Resource

1425
Q

A coverage provide only for losses that are reported during the period the policy is in force is

A

Claim-made form

1426
Q

The first and most crucial question in defining business purpose and mission is

A

Who is the customer

1427
Q

The most valuable corporate resource is

A

Employees

1428
Q

What are legal approach to asset protection

A

Copyrighting
Trademarks
Patenting

1429
Q

Facility characterization is done during

A

Risk analysis

1430
Q

Assess-protect-confirm-improve model is more generally known as

A

PLAN-DO-CHECK-ACT

1431
Q

When recruiting, skill that will increase the candidates likelihood of success are referred to as

A

Indirect skills

1432
Q

The most frequent and costly forms of dishonesty the security professional will likely encounter is

A

Theft and fraud

1433
Q

A mechanism that will significantly increase the chances of detecting the vulnerabilities that leads to employee theft and fraud is

A

Clear organizational policies,
Procedures and
Practices

1434
Q

The best way to recruit a good candidate is

A

Internal recommendation

1435
Q

The most consistent predictor of theft in all industries is

A

Employee’s perceived chance of being detected

1436
Q

An advantage of which budgeting forces a manager to consider alternative ways of getting the job done

A

Zero-based

1437
Q

The type of risk occurrence that can only result in loss is

A

Pure risk

1438
Q

In bottom-up budgeting where does the broad base of information come from

A

Front-line managers

1439
Q

To impose performance goals on lower management, which Budgeting approach is recommended

A

Top-down

1440
Q

The ISO committee responsible for societal security is

A

ISO/TC 223

1441
Q

Most management systems are based on what model

A

Plan-Do-Check-Act

1442
Q

The fundamental template for decision that define and support an enterprise long term goal is

A

Organizational strategy

1443
Q

What is the vulnerability concern about critical infrastructure

A

Natural and intentional attack

1444
Q

The process of performing an analysis of potential areas of loss, their probability and their impact to the corporations is

A

Risk analysis

1445
Q

In the insurance world ‘‘The cause of a possible loss’’

A

Peril

1446
Q

Losses covered by insurance policies are

A

Direct loss
Loss-of-use
Extra-expense-losses

1447
Q

Making sure the human and non-human resources are put into place is which basic function of managing

A

Organizing

1448
Q

What kind of litigation has exploded in the security field

A

Liability

1449
Q

Important factors related to the conduct of security officer are

A

Courtesy
Restraint
Interest

1450
Q

The document/Process that supports long term goals is

A

Organizational Strategy

1451
Q

A private system in place to guide the implementation of SOX

A

Hotline

1452
Q

Services acquired under informal agreements for which money is owed by an organization is

A

Accounts payable

1453
Q

Integration of traditional and IT security functions is

A

Convergence

1454
Q

This covers items that the organization monitors and expects employees to conform to

A

Policies

1455
Q

What are performance characteristic of intrusion sensors

A

Probability of detection
Nuisance alarm rate
Vulnerability to defeat

1456
Q

This communicates business functionality and operational methods

A

Mission

1457
Q

A closed loop around an area that needs protection is

A

Perimeter area

1458
Q

Which are the integral parts of a mechanical lock

A

Revolving device
Dead Bolt/Latch
Unlocking device

1459
Q

If a security supervisor is confused because he is being told to do one thing by one supervisor and another by a security manager, which basic principle is probably being, violated

A

Unity of command

1460
Q

To put an interviewee at ease, at the beginning of the interview, the type of questions should be

A

Close-ended

1461
Q

If a security supervisor is having problems coordinating the activities of his 30 subordinates, which basic principle is being violated

A

Span of control

1462
Q

The goal of an interview is

A

Get truthful information

1463
Q

When actual work practice need to be compared with required state but routine auditing is not possible requires which time of investigation

A

Undercover investigation

1464
Q

Setting up a business as a front where stolen goods are bought and sold is

A

Sting operation

1465
Q

A simple and systematic method of employing safeguards to protect critical information is

A

Operation security

1466
Q

Apart from the basic skills, an investigator should have which other skill

A

Maths skill

1467
Q

A responsibility that is often neglected but is important to the operation of the investigation unit is

A

Setting objectives and monitoring

1468
Q

What are the components of risk

A

Threat
Consequence
Vulnerability

1469
Q

Passive sensors typically respond to which types of energy

A

Vibration
Infrared energy
Acoustic activity

1470
Q

Another name for password cracker is

A

Brute-force

1471
Q

A key principle of the vulnerability assessment is

A

Establish initial baseline

1472
Q

To protect an interior space against breakthrough of a defined point such as skylight, sensor most appropriate is

A

Boundary sensor

1473
Q

The building blocks of a PPS

A

People
Software
Hardware

1474
Q

A card that contains a sets of wires in a unique formation is

A

Wiegand card

1475
Q

What elements combine to create functional integration

A

Detection
Delay
Response

1476
Q

The simplest form of line-supervision is end-of-line

A

Resistor

1477
Q

What is the most important factor in CCTV camera choice

A

Sensitivity

1478
Q

Staffing decisions should be made against what

A

Detailed job requirement analysis

1479
Q

A class of sensor best suited to protecting an internal environment with multiple points of possible entry is

A

Volumetric sensor

1480
Q

This uses a plain-text mechanism and connects with a control panel

A

Magnetic strip

1481
Q

Examples of smoke sensors are

A

Photoelectric/Ionization

1482
Q

A common method of evaluating how well the PPS meets its goals and objective is

A

Vulnerability analysis

1483
Q

Defalcation specifically deals with the misappropriation of trust funds entrusted to whom

A

Fiduciary

1484
Q

Verifying system performance against defined threat is the basis of what

A

Vulnerability assessment

1485
Q

A situation where your body cells adjust to the presence of a drugs is

A

Dependency

1486
Q

What drugs causes hyperactivity, dilated pupils, suppresses sleep and appetite

A

Amphetamines’

1487
Q

What are classes of adversaries

A

Outsider
Insider
Outsider in collusion with insider

1488
Q

What are steps that characterize a system approach in a security context

A

Assessment of vulnerability
Implementation of countermeasure
Review of effectiveness

1489
Q

What should be done last in the employment process

A

Back grounding

1490
Q

Workplace IMT includes who

A

Senior management representative
Senior human resource manager
Legal representative who is familiar with labour laws
Senior asset protection manager