PPTX Flashcards

1
Q

A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?

A

The span of control is too great

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The approach aimed to make employees happy through the provision of benefits, but which fails to motivate employees to produce to their full capacity is called

A

The Custodial Theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the future, what will define private policing

A

Contract guards working in public space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A main advantage of emergency lighting is:

A

Its ability to activate in the event of a power cut.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The recommended night-time illumination level of a self-parking car park is:

A

1 fc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?

A

Low pressure sodium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A clear zone of how much should separate perimeter fences and internal structures?

A

50 feet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which types of sensors are grouped as fixed and rate of rise?

A

Heat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which kinds of sensors would not be suitable where there are drafts passing through the detection pattern and nearby railroad tracks?

A

Ultrasonic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Theft Triangle depicts which of the following causes of crime?

A

Opportunity,
Motivation,
Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where is an executive most vulnerable?

A

At home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to Kinney, the single biggest deterrent to violence in the workplace is:

A

Careful hiring and screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The two types of plastic glazing used in buildings are:

A

Acrylic and polycarbonate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?

A

Electronic shuttering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?

A

Automatic gain control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When specifying lighting for indoors precision manual work where good CRI is essential, which of the following will produce the best results?

A

Incandescent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the follow relates to Halogen lighting?

A

Low efficacy; high CRI; instant restrike.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What differentiates public sector COOP (continuity of operations) from private sector BC (business continuity):

A

COOP entails the movement of critical functions and personnel to an alternate operating site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should you use an undercover investigation?

A

As a last resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?

A

Microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most popular sensor?

A

PIR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The 3 fundamental components of an intrusion detection system are sensor, annunciator and?

A

Control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is used to minimize the number of monitors security personnel must watch?

A

Multiplexers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which kind of lens is specifically designed to reduce the number of lenses an installer needs to carry?

A

Varifocal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Oscar Newman
Set out the foundation for CPTED in his work on defensible space
26
Which of the following limits the number of keys that can be issued?
Master keying
27
Lighting is a form of
Deterrence
28
The Psychological Stress Evaluator works on the principle of:
Blood pressure and pulse rate.
29
Which of the following safes should you recommend to protect encrypted computer back-up media?
150-1
30
A typical role for the security manager in an emergency management structure is:
The EM Coordinator, responsible for EMPl an maintenance
31
Logical access control is based on?
Identification; Authentication; Authorization; Accountability
32
The risk of a hostage coming to sympathize with the abductors’ cause is known as:
The Stockholm Syndrome.
33
Which of the following would be found in an operating budget?
Maintenance costs for a PPS
34
What statement is correct with regard to discipline?
All employees require constructive discipline
35
Which sensors has the lowest NAR?
Dual Tech.
36
What sensor would you expect to find on windows and doors?
Magnetic switch
37
What is the purpose of an investigation at the strategic level?
To plan, organize, equip, staff and prepare
38
For outcomes of corporate investigations
It is advisable to have clear-cut policies on acceptable outcomes.
39
One IDS installation which makes it more complex for an attacker to disable the entire system is:
Point to point
40
What is the name given to the risk management strategy of spreading the sites of cash registers in a retail outlet instead of just having one central location?
Risk spreading
41
Car park employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. Which of the following would be an acceptable alternative?
High pressure sodium or LED
42
In logical access control, what follows authentication?
Authorisation
43
Which of the following are recognised search techniques for IEDs?
Occupant, warden, team, high risk
44
Which of the followings is one of the most effective psychological evaluations in a pre-employment screening program:
MMPI (Minnesota Multiphasic Personality Inventory)
45
What is the name given to fire sensors that are sensitive to the invisible products of combustion during the early stages of a fire?
Ionisation detectors.
46
Which kind of evidence degrades with time and temperature?
Organic
47
What level of lighting is required for a pedestrian entrance?
5 fc
48
What is the most common kind of sprinkler system?
Wet-pipe system.
49
What is the most widely used method of controlling physical access:
Locks
50
Oxycodone is a:
Narcotic
51
Security managers should
Be as much a business manager as a security specialist
52
In developing strategy we look:
3-5 years ahead.
53
The first step in developing a business strategy is:
Understanding the business and where it needs to be in the future.
54
An organization's primary resource is its
People
55
Two common ways of classifying risk, originally coined by the insurance industry, are:
Pure and dynamic
56
Against what should staffing decisions be made?
A detailed job requirements analysis
57
The best way to recruit a good candidate is to
Seek internal recommendations
58
The metrics for evaluating employees should align closely with the organisational strategy.
For example, if the strategy calls for growth, then the metric for mid-level managers may be to grow their business units by a certain percentage.
59
Realistically, if a company wants to improve margins it has two options. What are they?
Reduce costs or increase price.
60
Three financial reports or statements have become accepted as standard.
Income statement.
61
Financial statements are created in accordance with:
GAAP (Generally Accepted Accounting Principles)
62
What is the underlying equation of the balance sheet?
Assets = liabilities + shareholder equity
63
Which of the following are considered cash equivalents on the Balance Sheet?
Current assets.
64
What is the primary limitation in financial statement analysis?
It does not consider changes in market conditions
65
What is the main purpose of a budget?
To provide a financial tool that estimates costs and revenue. To provide a variance warning mechanism. To provide fiscal uniformity for the company
66
A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services, or processes is known as
Standards.
67
In ISO, the main committee working on security activities is....................... The committee has a broad scope, addressing security, business continuity, crisis management, disaster management, and emergency response. The committee examines crisis management and organizational continuity related to all types of disasters and disruptions, including intentional attacks, unintentional accidents, and natural disasters. The committee focuses on what an organization should do before, during, and after an incident. The committee also addresses interaction and interoperability between organizations.
ISO/TC 223: Societal Security.
68
Which is the administrator and coordinator of the US private sector voluntary standardisation system?
American National Standards Institute(ANSI).
69
What is the operating principle of ISO’s management systems standards?
Plan-Do-Check-Act
70
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
71
Those responsible for conducing security awareness programmes for staff should be:
Security personnel in general
72
The most consistent predictor of theft in all industries:
Is the employee’s perceived chance of being detected
73
Most fraud perpetrators:
Are influenced by an opportunity to profit.
74
Which of the following are more likely to be tolerant of internal theft?
Employees with less tenure
75
Defalcation specifically deals with the misappropriation of trust funds or money entrusted to a:
Fiduciary
76
Which security system elements will significantly increase the chances of detecting the vulnerabilities and gaps that lead to employee theft and fraud?
Clear organisational policies, procedures and practices.
77
The Theft Triangle depicts which of the following causes of crime?
Opportunity, Desire, Rationalisation
78
A process for screening job applicants for past trust violations and periodic employee communications that include past case studies are two of many elements in a programme designed to prevent:
Fraud
79
The greatest on going threat to the survival of a business is:
Internal theft.
80
What are the most frequent and costly forms of dishonesty the security professional will likely encounter?
Theft and Fraud
81
An incident reporting system does two things that could not otherwise be done. One is that it provides a history of events occurring to the organization. What is the other?
Provides a basis for professional efforts at asset recapture, recovery or incident reduction or termination.
82
Many experts agree that the most effective deterrent to internal theft is:
Fear of discovery
83
The only way an operating function (such as security) can justify continued funding is to:
Demonstrate that the real costs to the enterprise would be greater if the level of support for that activity were reduced
84
To senior management, what is the primary factor in determining the size or existence of an asset protection programme?
Cost-effectiveness.
85
Bonds that indemnify an organization in the event of dishonesty on the part of an employee are known as:
Fidelity bonds.
86
Most insurance policies cover:
Direct loss only.
87
Insurance is often divided into two categories:
Property and liability
88
The best-known form of risk transfer is
Insurance.
89
Whose theory is premised on the belief that the opposite of satisfaction is not dissatisfaction, but simply no satisfaction?
Herzberg.
90
A newly-appointed supervisor is put in charge of 20 security guards earning the statutory minimum wage, and faces an immediate problem of poor performance. What is the likely cause?
The span of control is too great.
91
The approach aimed to make employees happy through the provision of benefits, but which fails to Motivate employees to produce to their full capacity is called:
The custodial theory.
92
The job of managing involves 5 basic functions, which are:
Planning, Organizing, Directing, Coordinating, Controlling.
93
Success in the management of assets protection depends on the proper balance of three managerial dimensions, which are:
Technical expertise, Management ability, The ability to deal with people
94
The process of scoping out potential loss events is known as:
Loss event profile.
95
The ultimate responsibility for internal security within a department should rest with:
The department’s line manager
96
The principle of unity of command may be broken:
During an emergency.
97
Assets protection is increasingly based on the principle of:
Risk management
98
Which of the following is an example of an activity that falls within the broad remit of assets protection?
Emergency management
99
Cash is an example of what kind of asset?
Tangible
100
Complete the following sentence: The greatest protection of corporate assets occurs when the appropriate mix of:
Physical, procedural, and electronic security measures are in place in relation to the value of the assets being protected.
101
In the future private policing will be defined by:
Contract guards with proprietary supervisors.
102
The concept whereby security of an industrial facility is handed by a private contractor is known as
Private substitute
103
The concept whereby private contractors augment regular police in law and order maintenance in publics areas is known as
Public supplement
104
Public/private policing partnerships should
Be built around structural and contractual relationships
105
Whose reports sought to compare the US security industry to public law enforcement quantitatively
Hall crest
106
What is a significant distinction between public and private policing
Cost
107
What makes private policing an attractive option
Private policing is inherently proactive
108
Felson and Cohen postulated that crimes are typically a product of three factor
Motivated offender, a suitable target, the absence of a capable guardian
109
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue was put forward by
Kelling.
110
A simplified explanation of why employees steal is:
The theft triangle
111
The notion that if minor crimes and disorderly behaviour are not addressed, more serious law breaking will ensue is more generally known as the:
Broken window theory.
112
The levels of fear are greatest when there is a concern about both incivility and
Crime
113
Training for private security officers who provide policing services in public areas should be:
Role/task specific
114
We find that mental illness
Only rarely plays a key part in assassination behaviours
115
An executive is most vulnerable
At home
116
In high risk situations the executive is usually accompanied by
An EP specialist
117
Five of the key principles that can guide one’s thinking about EP are: realise that anyone can protect anyone; don’t stop to think; keep clients out of trouble; understand the security vs. convenience continuum; rely on brains, not technology. What is the sixth
Prevent and avoid danger
118
When an EP specialist researches a destination to which an executive is due to travel, this is called
An advance
119
If a protected executive must travel locally, the ideal arrangement will be to:
Place the executive in a suitable car driven by a trained security driver and accompanied by the EP specialist.
120
In an EP context, what is meant by the term “sound off”?
In an attack situation, it is the term given when an EP specialist shouts the type of weapon displayed by an adversary and the direction, in relation to the principal, from which it is coming.
121
Awareness training for executive management should focus on the security programmes benefits and
The reasonableness of the programmes expenses compared to those benefits.
122
If a supplier is given access to sensitive proprietary information, what should accompany this access
Awareness of security procedures that protect and account for such information
123
Creating an understanding of the relationship between security and successful business operations is facilitated by
Awareness training for senior management
124
The value of awareness programs can be demonstrated by
Metrics
125
We find that most drug users are
Employed
126
Hashish, marijuana, heroin, and LSD belong to:
Schedule I
127
What are the names of types of depressant
Methaqualone, Valium (diazepam), Librium
128
Which of the following drugs causes elevated blood pressure, dilated pupils, increased heart rate, and euphoria
Cocaine
129
Which of the followings are types of stimulants
Cocaine, amphetamines, methamphetamine, Methcathinone, methylphenidate (Ritalin),
130
Which drug is derived from the Peyote cactus
Mescaline
131
Intervention is the calculated interruption of the destructive behaviour of a substance abuser and those around that person. Which of the following answers best describes the steps that supervisors and managers should take in an intervention
Observe and document performance, Confront the problem employee, Interview and discuss, Document results, Communicate with upper management, Follow up.
132
The condition whereby a user develops an attachment to the use of a substance due to some emotional or personality need of the person is
Psychological dependence
133
The essential difference between a social drinker and an alcoholic is
A loss of control over time, place and amount of drinking
134
Drug testing may be carried out pre-employment, on reasonable suspicion, after an accident or injury, randomly, after return to work following a violation, and as a follow-up to treatment. Which type of specimen is analysed most often?
Urine
135
Which of the following means of preliminary screening of urine analysis is the most common and least expensive
Thin-layer chromatography (TLC)
136
If the preliminary test discovers a drug or its metabolite, what should then follow?
A confirmatory test should be carried out using a different technology, such as gas chromatography / mass spectrometry (GC/MS)
137
According to Joseph Kinney, workplace violence includes four broad categories
Threat, harassment, attack, sabotage
138
According to Kinney, the single biggest deterrent to violence in the workplace is
Careful hiring and screening
139
An interdisciplinary workplace violence risk assessment and management process is based on
The identification and assessment of individuals so they can be diverted from violence before they act
140
In relation to workplace violence, complete the following statement: Security programs aim to:
First divert someone from committing an unsafe or harmful act and then, if diversion is unsuccessful, to delay the person’s progress in committing the act until trained individuals are notified and respond to the problem
141
Business related concerns that a workplace violence programme should address include
Liability. Productivity. Workplace morale
142
Most workplace violence incidents result from
Robberies and similar criminal violence
143
Only one of the following statements is true. Which is it
Unless psychopaths, aggressors typically go through a process of emotional escalation, selecting targets that give them a sense of control
144
A comprehensive approach to workplace violence should include the creation of an incident management team (IMT). Which are typically the members of the IMT
A senior management representative, A senior human resources manager, A senior security manager, and A legal representative who is familiar with labor and employment law and litigation
145
What are the most distinctive and important elements in a violence risk assessment programme
Behavioural recognition, Notification, Assessment, and Intervention by planned disruption.
146
Complete the following sentence: The long-term solution to each situation of potential workplace violence lies in
Understanding the emotional and mental state of the aggressor and diverting him or her from violence
147
What should be addressed in a violence risk assessment as, in some cases, they are early warning signs that could lead to violence
Harassment. Discrimination. Intimidation
148
Complete the following sentence: It is essential that the IMT be empowered to
Commit company assets and personnel to resolve an incident
149
What is the preferred strategy of evacuation
When an aggressor has a firearm on the premises a preferred strategy 360 degrees
150
A restraining or protective order is an example of
An intervention
151
The initial interview for a security officer applicant should be with
HR
152
In non-entry level security staff recruiting the recommended technique is
Blind ad
153
Security professionals can most effectively convince management of the need for security
By producing a strategic plan that quantifies loss potential
154
Key to ensuring good relations between security staff and service users is
Training of security officers in expected standards of courtesy, restraint and the use of good judgement
155
A 24/7 security post at a facility where security officers work 40-hoursweeks requires
4.5 officers
156
When developing a proprietary or contract security organisation, the first task is to
Perform a job analysis
157
The required action when dealing with an alcohol-intoxicated employee is to
Bring the person into custody thereby eliminating the immediate danger
158
The issue of deadly force weapons to security personnel is usually justified……
In a situation where there would be a greater danger to life safety without weapons than with them.
159
When escorting large amounts of cash:
Firearms may be appropriate
160
Which of the following is most appropriate to “ranking” security personnel?
To use the terms officer and supervisor for the lower levels, and assistant manager, manager and director for higher levels.
161
Which of the following models is most often used by security supervisors in their relationship with front-line security officers?
The vertical model.
162
A model for organisational structure which provides flexibility for one-time needs and for security management to leverage security staff skills for the greater good of the organisation is called:
The network model
163
The concept of principle-agent is used:
In a hybrid security force in which proprietary supervisors oversee contract front-line officers.
164
When procuring contract guarding services, which of the following best provides a means of ensuring performance after the contract is awarded?
By developing detailed bid specifications that spell out the requirements, including wages, benefits, and performance expectations.
165
Which of the following represents a risk of using peace officers in the security team?
Peace officers could be mobilised by the local police chief in the event of a public emergency, thus leaving the site exposed.
166
Who is first and foremost liable for the individual conduct of security officers
The security officer
167
Which of the following typically represents the largest cost element in the majority of security operating budgets
Security officers
168
Managers can better determine post requirements by use of
SOPs
169
If a security objective requires discrimination among events, persons, circumstances, or physical objects, based on complex and varying criteria, what should be used?
A security officer
170
Cognitive, psychomotor and affective skills are all aspects that relate to the concept of the:
The necessary human being.
171
The most important written instructions for the security force are:
Post orders
172
We find that:
Post orders should be available at each guard post
173
Which level of security management is the most crucial to front line officer motivation?
Security supervisors
174
To rectify a situation in which there is poor performance at some guard posts a recommended first action by supervisors is:
To visit each guard post every shift.
175
To get a full understanding of the requirements of a security post a supervisor should:
Personally provide some post relief when an officer is away.
176
The process of giving motivational feedback to maintain and improve performance is known as:
Coaching
177
A continually blank occurrence book is most likely to be an indication of:
Inadequacies in guard training
178
What is the primary record of significant events affecting facility protection and made contemporaneously by security officers?
A computer-based log into which the security officer types reports into a relational database/Security Log
179
In any legal proceeding, a security log is
Admissible.
180
Addressing issues such as low morale, lack of training, poor working conditions and lack of detailed job analysis is intended to lead to:
Vigilant performance
181
Failure of guards to respond to repeated alarms may be a negative by-product of:
Automation and human monitoring
182
The theory that emphasises the negative aspects of employee behaviour is:
The McGregor Theory X
183
Argyris argues that
Traditional organizational principles, structures, and procedures are incompatible with the mental health of employees
184
Poor air circulation in a guardroom is a problem associated with the
Mechanical environment
185
In the hiring context, pre-employment screening is fairest and most efficient when it
Uses a detailed list of physical requirements against which the applicant can be measured.
186
Herzberg’s work motivation theory developed a position that
Motivation comes from work itself and not from those factors such as salary and job security.
187
When designing a CCTV console, what facet should be incorporated to enhance officer efficiency and maximize the usefulness of the system
Annunciation and delay features, such as the sequential display of several image feeds.
188
Which is a tool which can help in matching applicants to jobs by examining mental preferences?
Myers-Briggs Type Indicator.
189
What is the most important aspect of personnel selection?
A face-to-face interview
190
An effective way to manage security post boredom is to:
Systematically rotate the officers’ duties, at 2 to 4 hour intervals, between fixed posts and roving patrols.
191
Training for security officers should include addressing the cognitive, affective and psychomotor levels. An example of training at the affective level is:
Understanding the methods and motivations of adversaries
192
A recommended method of trying to ensure that new employees learn and adopt workplace values is through:
Socialization
193
Administering discipline is primarily the responsibility of:
The supervisor.
194
Following pre-assignment training, what method of further development has been found to work well in enhancing security officer performance?
Mentoring.
195
Personnel costs are generally the largest item in:
An operating (or programme) budget
196
Three broad criteria that a client should consider when choosing a guarding contractor are i) consistent performance, ii) prompt, efficient and positive response to client concerns, and what else?
Competitive pricing
197
When engaging contract guarding services, how can disputes concerning acceptable performance best be avoided
By the client producing a clear and precise definition of the scope of work and required standards of performance
198
Scenario: At Site X, there is a hybrid mix of proprietary and contract security personnel. There is lesser job satisfaction amongst the contract personnel due to the large pay disparities. 99 How should this have been avoided in the initial contract negotiations?
The client should have required the contractor to pay the contract officers a rate equal to the entry wages paid to the proprietary positions
199
Surgency is related to
Dominance
200
Smoke detectors are of either the photoelectric or ionization type. The ionization sensor is of particular value for installation in
Areas that might smoulder for a long period, for example electrical equipment in control rooms, switch gear rooms, generator areas, and rooms containing computer systems
201
If you are looking for new PPS equipment and you know exactly what you want and no detailed design is necessary, the recommended procurement approach is
Invitation for bid
202
What is the name given to the process of intercepting conversations on a telephone line by capturing the radiating electromagnetic energy which flows in the line, and which does not require a physical connection to the line?
Inductive coupling
203
Which type of microphone operates as a loudspeaker in reverse, and which is very popular as an eavesdropping device because it requires no power source and is usually quite small, making it relatively difficult to detect
Dynamic microphone
204
Proprietary information is best defined as:
Intellectual property which, in some special way, relates to the status or activities of the possessor and over which the possessor asserts ownership.
205
What best describes proprietary information
Information relating to the structure, products, or business methods of the organisation
206
What is the main cause of proprietary information loss:
Due to the failure to establish and maintain effective control systems
207
Who, typically, determines the classification level of sensitive information?
The originator of the information
208
Access to internal information should be restricted:
To company personnel or others who have signed a nondisclosure agreement
209
What is the name given to the portable microwave transceiver used to locate electronic eavesdropping devices by detecting the semi conductor components—the transistors, diodes, etc.—which comprise their electronic circuits?
Non-linear junction detector
210
At what stage of a PPS project should the project team begin to develop countermeasures?
During the conceptual design phase of the overall planning and assessment phase
211
When using in-house resources for TSCM inspections, what best represents the necessary criteria?
At least one qualified employee is dedicated to the task on a full-time basis, and the proper instrumentation for the needs of the organization has been purchased.
212
In developing an emergency response structure, what is the most consideration?
A totally new organization should not be developed to handle emergencies. Such problems should be handled by the existing organization, temporarily reconfigured, along with executives responsible for the day-to-day operation of the enterprise
213
In the event of an emergency, who should be responsible for equipment shutdown
Those familiar with the process
214
What are the featured of public sector emergency planning?
Mitigation, Preparedness, Response, and Recovery
215
What are the three words that summarize what to do in the event of an earthquake
Duck, cover and hold
216
The Weingarten rule
Established the right of a bargaining unit employee to be assisted by a union representative at an investigatory interview to which the employee has been summoned by management, when the employee reasonably believes that disciplinary action may result from the interview
217
What is the name given to an accusatory meeting between an investigator and a person suspected of committing a crime or act of misconduct?
Interrogation
218
In general, when investigating which of the following should be interviewed first
Persons who are likely not to be around
219
Compared to non-abusing employees, employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file how many times as many workers’ compensation claims?
Five
220
This schedule of drug or substance has a high potential for abuse and currently has no accepted use in medical treatment in the United States. Examples are hashish, marijuana, heroin, and lysergic acid diethylamide(LSD). What schedule is it?
Schedule 1
221
What types of drug is Methaquadone
A depressant
222
After alcohol, which is the second most common drug of abuse in the workplace
Marijuana
223
Drug testing is a scientific examination of a biological specimen for the presence of a specific drug or its metabolite. The type of specimen analysed most often is:
Urine
224
Under which circumstances would an undercover investigation be prohibited
Unions are agitating and planning industrial action
225
In the context of undercover investigations, what is meant by the term “coldhire”?
The investigator applies for a position and is processed just like any other applicant
226
The design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means – a crime prevention theory grounded in environmental criminology – is known as:
Crime Prevention through Environmental Design.
227
The Big Five model of personality categorises personality traits into one of five types: Surgency Agreeableness, Adjustment ,Conscientiousness and Openness to Experience. Which best describes Surgency?
This refers to leadership and extroversion
228
The C.I.A. triad is an abbreviation that is used to determine the security requirements of Information Systems (computers). What does the letter A stand for?
Availability
229
Acoustic glass break detectors can be installed on walls or ceilings. Detection is best when installed:
On a wall opposite the protected glass.
230
What is the name given to the simple tool that uses detection, delay, response and communication values to determine what the effects are on these values when the physical security parameters are changed?
The EASI (estimate of adversary sequence interruption) Model.
231
When project managing the implementation of new security technology, unless the security manager has an intimate and detailed knowledge of exactly the equipment (and models) he/she requires the correct type of specification should be:
Request for Proposal
232
What is the preferable approach to budgeting?
Top down and bottom up
233
Where would you expect to find all on going non-salary expenses
Sundry expense budget
234
In a study by John Clark and Richard Hollinger, it was generally accepted that every employee is tempted to steal from his employer at one time or another during his career, based on:
The opportunity to steal
235
Emergency management has three primary objectives, as follows:
Minimise probability of a threat or emergency, Minimise impact, Recovery and resumption
236
What is considered the most critical aspect of an investigation?
Interviews.
237
What is the primary purpose of an internal private sector security investigative organisation?
To protect the interests of the employing enterprise
238
The primary purpose of a background investigation is to prevent losses and:
Mitigate damages
239
Explosions may be:
Mechanical, chemical, or nuclear
240
If you, as an executive protection specialist, are walking with a principal and you encounter a street demonstration ahead, what would be the best action?
Remove the principal from the immediate danger by trying to leave the area in a car.
241
What is the primary objective of assets protection?
To manage risks by balancing the costs and benefits of protection measures
242
It takes as little as 45 seconds to batter a 12–15 inch hole through an eight inch, mortar filled concrete block wall with a 10 pound sledge hammer. How long will it take to breach a 5 inch, mortar-filled concrete block wall with one-half inch steel reinforcing rods?
55 seconds
243
In the event of the device circuitry of an intrusion detection system, opening, shorting or grounding, what should the system be designed to do in response?
Activate an alarm
244
Which type of sensor is able to detect objects that are either warmer or cooler against (or when compared to) background temperature, and whose effectiveness diminishes as background temperature approaches that of the intruder?
PIR(Passive infrared)
245
Human beings and dogs have the same basic senses, but some of the dog’s senses are much more acute and developed. Which is the correct list of the senses of a dog in order of importance when used for protection purposes?
Smell, hearing, sight, touch
246
The greatest protection of corporate assets occurs when the appropriate mix of physical, procedural, and electronic security measures are in place......:
In relation to the value of the assets being protected
247
Who bears the responsibility to provide the resources needed to enhance the protection of assets?
Senior management
248
What represent purely intangible assets
Management style, Worker retention, Past performance, Relationships.
249
What, according to Fennelly, are important tools in crime prevention programmes?
Planning, Management, Evaluation.
250
With generic workplace violence, security programs aim:
First to divert someone from committing an unsafe or harmful act and then, If diversion is unsuccessful, to delay the person’s progress in committing the act Until trained individuals are notified and respond to the problem.
251
For applications in which lighting levels are likely to change throughout the day, which one types of camera lenses would be most suitable?
Auto Iris
252
What represent the two most important considerations in anew CCTV project, in order of importance?
Camera, lens.
253
What statements is most accurate with regard to anonymous informants?
Caution needs to be taken with anonymous informants, as they are the most likely to provide false or biased information
254
When interviewing as part of an investigation, which one of the following is the most important factor of a successful interview?
The ability of the interviewer to establish a favourable rapport with the interviewee.
255
What are the four elements of physical design?
Territorial definition, Surveillance, Building forms, Compatible building placement
256
What is the first and most important output of the planning and assessment phase of any security design project?
Basis of design
257
Which type of light has an extended restrike time?
High intensity discharge(HID Family)
258
What represents the most appropriate lighting level for cash collection and vehicular access control areas?
5 fc (approx 50 lux).
259
According to the Reid technique for interviewing, there are at least four objectives of an interview/interrogation. Which are the specific objectives?
To obtain valuable facts To eliminate the innocent To identify the guilty To obtain a confession
260
The purpose question, the “you” question, the knowledge question, the suspicion question, and the vouch question are all techniques used in the:
Behaviour analysis interview.
261
In the course of an investigation interview it may be necessary to make a promise to the interviewee. What is the criterion that applies to making promises?
The interviewer must be certain that whatever is promised can be legally performed
262
What are the characteristics of a post order?
Each order deals with a single subject Each order is as brief as possible Each order is written in simple, easy-to-understand terms. Orders are indexed in detail
263
In the US, there are three classification of evidence that the courts will consider. They are:
Direct, Real, Circumstantial.
264
What is the cyclic operating principle of ISO’s management systems standards?
Plan, do, check, act.
265
What is the general rule when sending away a computer for forensic examination?
Submit only the central processing units and the internal and external storage media.
266
What is often the greatest security threat to the flow of commerce?
Theft and fraud.
267
To what does the following definition refer: Set out in writing by a business unit’s top leadership. It does not focus on day-to-day operations but provides a general direction, and is the fundamental template for decisions that define and support long-term goals:
The organisational strategy
268
Defining a security problem involves an accurate assessment of three factors, as follows:
The loss event profile, The probability of those threats becoming actual loss events, and The effect on the assets or on the enterprise responsible for the assets if the loss occurs.
269
You have need to interview a retail employee suspected of not ringing up items in a cash register. What kind of interview would you undertake?
Investigatory interview.
270
In CCTV systems coaxial cable is commonly used and is generally sufficient for analogue cameras transmitting up to a distance of how far without signal amplification?
1000 feet
271
The most important aspect of a successful interview is:
Rapport
272
In investigative interviewing, if a suspect uses harsh, realistic words such as steal, rape, kill, rob, or stab, this is often an indication of
Truthfulness.
273
In general, effective executive protection requires rings of protection. What best conceptualises this?
An outer perimeter, One or more inner perimeters, and In some cases a safe room
274
One personality assessment designed to gain a better understanding of a person’s weaknesses and strengths, and which is based on four sets of mental preferences, is called:
The Myers-Briggs Type Indicator.
275
What are the underlying concepts in relation to CPTED (Crime Prevention through Environmental Design)?
Improve the quality of life by deterring opportunities for crime and Reducing the fear of crime. As such, It also supports an improved security/asset protection Posture and security awareness for the organization and/or facility where it is implemented.
276
There are several theories and assumptions which have been made and accepted about human behaviour, motivation and morale. Douglas McGregor’s Theory X and Y are amongst these. Which of the following describes a possible attribute of a Type X person?
No initiative and does not accept responsibility
277
A basic problem with fully implementing community policing involves there sources and personnel levels associated with these tasks. That challenge may lead public police to:
Transfer tasks to, or supplement their strength with, private security personnel.
278
Assuming that security officers work 40 hours a week, each post that is staffed 24 hours a day, seven days a week, and compensating for sick, vacation, and holiday leave, requires how many officers?
4.5 officers
279
A common way of classifying risks (especially in the insurance industry) is by dividing them into pure and dynamic (aka business or speculative) risks. Which of the following is an example of a pure risk?
Labour shortage
280
The real value of cost-effective data gathering comes in:
Making periodic cumulative reports to senior management
281
Fences, including gates, constructed entirely of barbed wire intended to discourage human trespassing should not be less than
7 feet in height, plus a top guard.
282
The most important activity for an undercover operative is:
Learning the job and becoming familiar with surroundings
283
Ultrasonic sensors are usually limited to indoor applications where types of movements are less varied than those found in
Typical exterior environments
284
The most popular door sensor is known as a:
Balanced magnetic switch
285
In the event of a large-scale disaster incapacitating so many board members that a quorum is no longer possible, a suggested method for emergency management is:
For board vacancies to be filled by the remaining board members
286
In a very sensitive situation, what method is typically used to shield electromagnetic energy from information processing devices from interception?
Faraday cage
287
In developing an organisational strategy, what is the first step?
To understand what the business currently entails and where it needs to be in the future
288
After employees, which is the second most valuable resource?
Corporate knowledge
289
The efficiency of the security force depends primarily on the:
Adequacy and skill of its supervisors
290
What is the most effective management style for a supervisor?
To acknowledge credit for good performance and be objective when noting deficiencies.
291
Insurance is often divided into two general categories:
Property and liability.
292
Barriers are commonly used to discourage three types of penetration
By accident, By force, and By stealth.
293
Perhaps the most common shortcoming in the security industry is
Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisory training)
294
For a security professional, which of the following demonstrates a recommended way to calculate the Return on Investment (ROI)?
Avoided losses plus recoveries made, divided by the cost of the security programme
295
Who should be responsible for escorting visitors on site?
Whoever invited the visitor.
296
The management practice that separates the ultimate and the operating responsibility for accomplishing tasks is known as:
Delegation of authority.
297
The manifestation of an ability of intent to affect an asset adversely is defined as a:
Threat
298
The employee theft formula includes:
Motivation Opportunity Rationalization
299
The number of subordinates that can be effectively managed by one manager is known as the
Span of control
300
Estimate of investments needed in property, buildings, and major equipment
Capital expenditure
301
The lighting levels for an open area car park and an employee entrance, respectively, are:
2 FC and 5 FC
302
The job of managing involves 5 basic functions. They are
Planning Organising Directing Coordinating Controlling.
303
Another term for a capacitance sensor used to protect a perimeter fence is:
Electric Field
304
Which kind of lock finds continued application in such varying situations as desk, cabinet and locker installations, bank safe deposit boxes and U.S. mail boxes?
Lever lock
305
Which wall fabrics is the most resistant to bomb blast?
Thick, reinforced concrete walls
306
What is the minimum thickness of a 4-hour fire resistive vault with reinforced concrete walls?
8 inches
307
Vaults which are designed to protect large amounts of negotiable, valuable or sensitive information against forced entry should have reinforced concrete walls of what thickness?
12 inches or thicker
308
Which classes of safe is specifically designed to protect its contents against attack using cutting torches, but not explosives?
TRTL-30
309
Which classes of safe is suitable for the protection of magnetic media against fire?
125-4
310
Which types of lamp has a typical re-strike time of 10-20 minutes?
Mercury vapour
311
This kind of sensor may be utilized in outdoor applications as well as indoors because it is not generally affected by heavy fog, rain, snow, sleet, air turbulence, drafts, noise, temperature extremes or atmospheric disturbances. When utilized for area protection, the wave pattern is designed to flood a room or area being protected. When used for perimeter protection, a narrow beam is directed around the area or zone to be protected. What is it called?
Microwave
312
This type of sensor is a large electrical condenser that radiates energy and detects change in the capacitive coupling between an antenna and the ground. In a typical installation, a sensor wire is connected to an object to be protected, such as a safe or file cabinet. What is it?
Capacitance
313
What are the benefits of a business impact analysis
Identifying legal, regulatory, and contractual requirements for the organization’s activities and resources Identifying the potential impacts over time of disruptions resulting from uncontrolled, non specific events on the organization activities and resources Evaluating resource requirements, activity, and external interdependencies to resume operations within the recovery timescales identified
314
What is the name given to glass which is heat-treated to resist breakage and can be utilized for both safety and security purposes, but which is not as resistive, however, as laminated glass?
Tempered glass
315
What is the name given to a plastic or polyester film available in a variety of shades, that is applied to the interior surface of glass, and which has a life up to 10 years and does not deteriorate significantly?
Cement on plastic
316
What abused drug in large doses intensifies the user’s high but may also lead to bizarre, erratic, or violent behaviour, along with tremors, vertigo, muscle twitches, paranoia, or a toxic reaction, with some users reporting restlessness, irritability, and anxiety?
Cocaine
317
If somebody suffers changes in perception, thought, and mood, experiences physiological effects including elevated heart rate, increased blood pressure, and dilated pupils, with sensory effects that include perceptual distortions and psychic effects that include disorders of thought associated with time and space, what type of drug is most likely being abused?
Hallucinogen
318
Insurance is a form of risk
Transfer
319
What is the name given to the drug which comes from the peyote cactus, and certain mushrooms?
Mescaline
320
What is the name given to the unusual condition whereby kidnap victims form an emotional or sympathetic bond with their abductors?
The Stockholm Syndrome
321
The way to detect individuals who are destabilized and seeking control is to:
Assess their mental and emotional levels along a continuum of violent behaviour and then develop a plan to divert them from violence through a case-specific use of Communication, Company resources, Community resources, and The legal system
322
Policies and programs dealing with inappropriate workplace conduct, including harassment, intimidation, and discrimination, should be seen as:
Related to the violence risk assessment program because in some cases such behaviours are early warning signs that can lead to violence
323
When is a vulnerability assessment performed?
After the threats and assets are defined
324
What should be specifically developed during an advance?
Law enforcement contacts
325
To what does the following definition refer? Used to detect lying during the course of an investigation. A device used as a lie detector. It records voice stress as questions are asked. It has no hook-up, so can be used covertly.
Psychological Stress Evaluator.
326
When reviewing applications for employment, all gaps in employment or life history of more than what duration should be investigated?
1 Month
327
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system.
Argvris
328
This theory holds that two worker models can be contrasted. Theory X contends that workers are inherently lazy and tend to avoid work. They lack creative ambition, must be goaded, require constant supervision, and are motivated by fear. Theory Y states that workers are naturally motivated and want to work hard and do a good job. It assumes that workers are thoughtful, eager to perform well, and willing to be guided and taught. Whose theory is it?
McGregor
329
What is the name given to the document that is composed of three elements: functions of a job, responsibility and authority vested in the job, and relationships of the job?
Job Description
330
In the course of an investigation, what is profiling used for?
It is used to exclude people from an investigative pool of subjects so as to conserve investigative resources
331
When recruiting, to deal with the many resumes that may be submitted in response to a public listing, staff must filter the resumes and invite only the most viable candidates for an interview. One recommended way to reduce this labour is:
To hire external recruiters.
332
Staffing decisions should be measured against a detailed:
Job requirements analysis
333
What type of advertisement is recommended for hiring skilled, technical and managerial (non entry-level) personnel?
Blind ad.
334
Fill in the missing word(s). ................... are based on standard operating procedures (SOPs),which should be site-specific. The SOPs are a compendium of procedures for the security group to follow in day-to-day operations. They may also include emergency response procedures
Post orders.
335
What is the primary limitation of financial statement analysis?
It does not directly consider changes in market conditions.
336
This statement summarizes an organization’s investing and financing. The report’s underlying equation is as follows: assets = liabilities + shareholder equity. What is it called?
Balance sheet.
337
Strategy is management’s effort to focus resources on specific targets that lead to business success through proper planning. A financial strategy is:
Management’s financial approach to determining the expected returns of its investments (including its departments and operations) and estimating and managing the relevant risks.
338
Complete the following sentence: The time has come to:
Institutionalize coordination and cooperation between security and police personnel through structural and contractual relationships
339
According to the formula by astronomer Marquis de Laplace, when events are independent of each other, the probability of their simultaneous occurrence is the product of their separate probabilities. Which of the following sentences best illustrates this?
The probability of one detection system in the security system being circumvented is high, but the probability of all the detectors and barriers in an in-depth or redundant security scheme being compromised is very low.
340
What is the most important measure for loss impact (or criticality)
DOLLAR
341
A security countermeasure should be planned if the loss event will produce an actual loss, measurable in some standard medium such as dollars; and:
The loss is not speculative in the sense that non-occurrence of the event would result in a gain.
342
Which type of bond requires that an employee(s) be investigated to limit the risk of dishonesty for the insured?
Fidelity Bond
343
What is the name given to the crime prevention strategy that uses psychology, architecture, and other measures to encourage desirable behaviour and discourage undesirable behaviour?
CPTED
344
The most consistent predictor of employee theft is?
Employee’s perceived chance of being detected
345
Oscar Newman argued that physical construction of a residential environment could elicit from residents behaviour that would, itself, contribute in a major way toward their security. What did he call this concept?
Defensible Space.
346
According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system
Argvris
347
In an emergency which answer best describes the person responsible for initial implementation of the plan?
The senior manager present on site
348
One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers. Liability is obvious when the weapons are issued to:
Proprietary officers.
349
Which terms best describes: “To prevent confusion during an organised effort, no subordinate should report to more than one supervisor”?
Unity of Command
350
Employees are complaining that the low pressure sodium lighting in the car park is slow to reach full output. What would be an acceptable alternative?
LED
351
Which of the following is correct in relation to lighting levels?
Detection 0.5 fc Recognition 1.0 fc Identification 2.0 fc
352
When specifying lighting for indoor precision manual work where good CRI is essential, which of the following will produce the best results?
Incandescent.
353
Lighting is a form of:
Detection
354
What gives the greatest reflectance?
Glass
355
You are required to select external lighting for an area which is subject to power interruptions of up to five minutes. Which of the following would likely perform best?
Low pressure sodium
356
Coaxial cable is limited to transmitting analogue video signals over distances of:
Less than 1,000 feet.
357
Which kind of lens reduces the number of different kinds of lenses an installer needs to carry?
Varifocal.
358
What is the name given to the camera component that compensates for light changes without the use of automatic or manual iris?
Electronic shuttering
359
What is used to minimise the number of monitors security personnel must watch?
Multiplexers
360
What is the name given to the internal video-amplifying system that works to maintain the video signal at a specific level as the amount of available light decreases?
Automatic gain control
361
In a CCTV system, for subject identification to be effective, what percentage of the screen should the subject occupy?
At least 20% of the scene’s width.
362
Which lens has become the standard for camera and lens design?
The DC/LC lens
363
Which has the greatest impact on CCTV system performance?
Lighting
364
If a camera is mounted on the side of a building, 40 ft. from the ground, and the center of the scene is 30 ft. from the building, what is the distance between the camera and the scene?
50 ft
365
Scenario: You are required to protect a safe during daytime in a room in which there is a limited degree of human movement, although not in the immediate vicinity of the safe. Which sensors would be appropriate?
A capacitance sensor
366
Which kinds of sensors would not be suitable where there are draughts passing through the detection pattern and nearby railroad tracks?
Ultrasonic
367
Which types of sensors are grouped as fixed and rate of rise?
Heat
368
In PIR sensors, detection is based on the difference in temperature between the intruder and the background. This difference is called:
The minimum resolvable temperature
369
The most common intrusion sensor is:
PIR
370
The most common type of sensor used to detect intrusion through doors is a:
Simple mechanical switch, using a magnetic reed.
371
What is considered an advantage of volumetric motion sensors?
They will detect an intruder moving in the detection zone regardless of the point of entry into the zone
372
Which kind of internal intrusion sensor will cause problems when used in a room with thin walls?
Microwave
373
Two ways to reduce nuisance alarms on fence-mounted sensors are i) the use of rigid fence posts and tight fence fabric, and:
Installing the sensors on the inner fence of a two-fence system.
374
Which perimeter sensor types would likely generate nuisance alarms if deployed close to a creek (stream)
Ported coaxial cable.
375
The 3 fundamental components of an intrusion detection system are sensor, annunciator and
Control unit
376
Which sensors has the lowest NAR?
Dual tech
377
Complete the following statement: When a high PD is required at all times and under all expected weather conditions…
The use of multiple sensors is recommended
378
The three main characteristics of intrusion sensor performance are:
Probability of detection nuisance alarm rate vulnerability to defeat.
379
The 3 core concepts (first principles) of CPTED are:
Natural access control Natural surveillance Natural territorial reinforcement
380
Shipping and receiving areas should be
Separated to the extent possible.
381
Which crime prevention theory has as its theoretical framework the Rational Choice Theory?
Situational crime prevention
382
Which crime prevention theory, influenced by CPTED, seeks to reduce crime opportunities in all behavioural contexts, not just buildings and other spaces?
Situational crime prevention
383
Which concept, developed by Oscar Newman, became the foundation for CPTED?
Defensible space.
384
What is the name given to the design approach that seeks to reduce crime opportunity and fear of crime through natural, mechanical and procedural means?
Crime prevention through environmental design.
385
The use of a feature criteria approach to PPS design:
Should generally be avoided
386
Having more than one cash register in a retail site is an example of:
Risk spreading
387
A well-engineered PPS exhibits the following characteristics:
Protection in depth, Minimum consequences of component failure, Balanced protection.
388
Why would a compliance-based vulnerability analysis process be inappropriate for assets which are exposed to a high probability of malevolent adversary action and which have a high consequence of loss?
Because in this process the measure of system effectiveness is based on the presence or absence of components, and not the ideal of performance
389
Measures of effectiveness for an entry control system are
Throughput, False acceptance rate, False rejection rate
390
Key measures of the effectiveness for the detection function are: i) The probability of sensing adversary action, and:
The time required for reporting and assessing the alarm
391
The major part of a vulnerability assessment is the
Facility characterization
392
The key factor that differentiates a security risk from a safety risk is:
Malevolence
393
In considering the adversary threat type, tactics, mode of operations, capabilities, threat level and likelihood of occurrence we arrive at the…
Design basis threat.
394
What is the name given to the process that establishes a baseline of PPS effectiveness in meeting goals and objectives?
Vulnerability assessment.
395
The building blocks of a PPS are:
People, Procedures, Technology
396
Threat many be defined as:
The combination of adversary capabilities, equipment, motivation or intent, and likelihood of attack
397
Asymmetric encryption
Is a method of communicating in a network using two different but related keys-one to encrypt and the other to decrypt
398
The function of probability and consequence magnitude and imminence is known as:
Risk
399
Measures the consistency with which the countermeasure achieves its functional objective.
Validity
400
Recommended actions of a security manager in the departmental meeting are
Set the directions Establish professional setting Establish open exchange of information with subordinates
401
The fundamental idea behind an information security management system is
Continual improvement
402
Oscar Newman’s theory is commonly referred to as
CPTED
403
Primary resource of an organization
People/Employees
404
Factors responsible for response time to alarm by police
Increasing numbers of alarm users
405
From a remote location security officer should report to whom
Security manager at the Headquarters
406
The major reasons for the use of locks and key are
Deter entry Reduce numbers of guards Restrict unauthorized access Prevent surreptitious entry
407
The difference between interview and interrogation is
The person being interviewed
408
Advantages of contract security over police are
More flexible use of labour Richer array of incentive and penalties More precise allocation of accountability Less constraint on process more focused on results
409
How would an investigation unit get management support for funding
Demonstrate the unit pays for itself
410
On a large facility where there are multiple alarm sensors deployed and where alarms terminates at a location outside the facility, is what type of alarm transmission
Central alarm
411
Who uses PCI-DSS
All companies involved in credit card issuance
412
The general factors to be considered in setting up a perimeter detection involves what
Uniform detection Combination of sensors Use of multiple lines of detection Complementary detection Continuous line of detection
413
The cyclic operating principle of ISO management system standard is
Plan-do-check-act
414
When an executive is travelling abroad the EPS main role is
Learn the key points of local social custom
415
Budget=capital, salaries and what else
Operational
416
Main task of the EPS is
Prevent and avoid danger and dangerous places
417
Why short down during emergency
Speed-up recovery process
418
The percentage of the total capital system construction cost that is for maintenance and warranty cost is
11%
419
Individuals who don’t know themselves wanting to conduct secure transactions through a non-trusted channel would use what
Certificate
420
Which terms are used to describe assets on the balance sheet
Inventory Accounts receivable Prepaid accounts Accumulated depreciation Cash Property ,plant, equipment
421
Another name for business ethics is
Applied ethics
422
Validity
A verification that a PPS component is able to do what is expected to do and is suitable for the use it is being selected to do
423
If a light burns for 15,000 hrs. the lumen per watt is its efficacy
150 watts
424
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
425
Two types of metal detectors are
Passive and Active
426
Passing through a sensor’s normal detection Zone without generating an alarm is
Spoofing
427
There is serious threat to security and fear of attack in a college, the security measure that would be most appropriate to address this situation is
Utilize the spaces and playgrounds in the college and surroundings areas to establish ownership of space
428
HIPS is
Host intrusion protection system
429
Reason for conducting pre-employment and back-ground screening is
Prevent loses and mitigate damages
430
COOP is used by
U.S federal government
431
A first line manager is
Supervisor
432
Evidence of truthfulness relates to which specific words
Reference to: Rape, Kill, Steal
433
The primary limitation of financial statement is
It does not consider changes in market conditions
434
A sensor that achieves absolute alarm confirmation by combining two technologies is
Dual technology
435
The general purpose of undertaking of a vulnerability assessment is
To establish a baseline of the PPS effectiveness in meeting goals and objectives
436
The light that is good for video surveillance is
Incandescent
437
Accessing a computer remotely by placing malware on it, perhaps while the use is visiting a website is
Hacking
438
A building generally becomes a ‘‘high rise’’ at what point
Higher that the maximum reach of available firefighting equipment approximately 23 meters to 100 feet
439
Maslow first hierarchy of needs is
Physiological
440
In the development of the business continuity (BC) and continuity of operation plan, the most time critical factor of the plan is
To resume critical functions as quickly as possible
441
The time period when a formal audit of the emergency plan is done is
Annually
442
The second level UL fire resistant safe will resist fire for what duration
2 hrs
443
Dynamic element in leadership communication tool in an emergency management program is
Changing of leaders telephone and pager numbers when any of the members is changed
444
A major resource for pre-employment screening is
Application
445
Disguising information as to make it unintelligible to protect proprietary information is
Scrambling
446
The percentage of employees responsible for 95% of workplace theft that requires identification and focus by a security manager is
5%
447
An information communication attacking agent is
Trojan horse
448
‘‘VSAT’’ is
Vulnerability self assessment tool
449
Modern management have come to realize that the most cost-effective way to deal with fraud in the work-place is
Preventing it
450
A technique of excluding people from an investigative pool of subject, so as to conserve investigation resources is
Profiling
451
The main advantage of smart card is
Has large memory and high degree of resistance to compromise
452
The job of the first responders in a workplace violence incident is
Divert
453
The time period a switcher automatically switches from camera to camera is
Dwell-time
454
For each threat, the remaining potential risk after all ISS countermeasures are applied is
Residual threat risk
455
Business related concerns to be addressed by a violence risk assessment are
Liability Workplace morale Productivity Associated costs
456
An organization is constantly experiencing break-ins with most occurring at night times , which sensors would be most appropriately use to address this situation
Vibration sensors
457
The most important in information security is
Management buy-in
458
The culture of a corporate organization is
A pattern of shared basic assumptions that a group learned to solve its problems
459
A critical consensus that must be made when operating a JTF from the onset is
Defining critical information
460
Going after a system by accessing it via normal channels, by exploiting vulnerabilities is
Direct attack
461
A major interior constituent for a record safe is
Moisture
462
Inducing a person to commit a crime is
Entrapment
463
Resolution of a digital camera is measured in terms of
Common intermediate format
464
A technique adopted in information security that prevents individuals access to the actual data is
Cryptography
465
What are the assessment levels of a workplace violence risk assessment
Initial Comprehensive Threshold
466
Initiating a general discussion with an interviewee, before direct questioning in order to accomplish rapport can be achieved by using
Hidden persuaders
467
This is fueling commercial technology theft in many organization
Continued fierce global economic competition
468
The worldwide internet standard for communication over which network PPS communicate is
TCP/IP
469
A business specifies its type of product or services and level of quality in a more concrete statement called
Mission
470
A significant area of vulnerability for U.S national security is constituted by who
Insiders
471
The use of information system to commit crime is
Cyber crime
472
When there is an emergency and a company allows others to have access to its facility, this action is
Rapid entry system
473
The most misunderstood form of investigation is
Undercover
474
How do you protect most valuable information
Encryption
475
Professional ethics is meant to serve
Relate to employees in humanistic manner
476
The type of questioning most appropriate at the primary phase of an interview is
Narrative questions
477
To aid the security professional to better be positioned to measure his departments effectiveness and report back to senior management is achieved by
An incident reporting system
478
The second most important decision in the application of CCTV program is
Choice of lens
479
The broad classification into which information systems countermeasures are divided are
Administrative controls, technical controls, physical controls
480
A popular method of obtaining information from a phone line by eavesdroppers
Inductive/direct coupling
481
A alarm as a result of equipment failure is
False alarm
482
The theft triangle consist of
Desire(Needs or want) Rationalization(Motive) Opportunity
483
Removing all the cash from the register in the night to eliminate the opportunity of robbery is an example of
Risk avoidance
484
The de-facto standard communication mechanism in the corporate arena is
E-mails
485
The sensor that activates an alarm when an intruder is made to go either towards or away from the field of detection is
Microwave
486
When developing security incident response plan, the most important element is
The policy document
487
The best way to reduce internal theft in an organization is
Hire employees with integrity
488
When planning for security, the security professional should always consider
Culture of the organization
489
The advantage stored image has over manual photo I.D system is
Difficult to tamper with stored image as its comparable to badge exchange
490
An interview with an employee who has defrauded the company of a large sum of money is
Interrogation
491
‘‘Vision’’
Specific description of where the business will be in the long term
492
The first and most crucial question in defining business purpose and mission is
Who is the customer
493
‘‘Quality’’
Conformance to customer’s requirement
494
In emergency plan review, what are considered dynamic information whose review must be accurately
Floor plans Contact numbers Key assets Key personnel
495
The three ‘‘I’ S’’ that are referred to as the tools of the investigator are
Information, Interrogation, Instrumentation
496
A comprehensive analysis of a business risk and pure risk in the insurance world is
Portfolio theory
497
The key distinction between safety and security is
Their causes
498
The performing of an analysis of the potential areas of loss is the first step in good security planning is
Profile
499
Sensors most appropriate for deployment in an environment with explosive vapour materials are
Passive
500
Forecasting individual loss event that may occur is the first step in dealing with
Risk assessment
501
In designing a CCTV application, the security manager should keep what in mind
CCTV is a visual tool of security and should be applied accordingly The application should dictate the equipment No matter what, the equipment of the system will become obsolete If the system is obsolete but still performing, it is because the original application was correctly designed
502
A driver who will be in haulage handling would require which pre-employment testing
Integrity test
503
In risk analysis, reducing consequences given the event is
Mitigation
504
Another name for the shift-supervisor is
First line manager
505
What are considered as second factor authentications
Biometrics OTP Encryption
506
If a camera is mounted on the side of a building 40ft from the ground and the centre of scene to be watched is 30ft from the building the distance from the camera to the scene would be
50ft
507
What is the most effective installation parameter for a glass break sensor
Installed directly opposite the protected glass
508
What is another name for capacitance sensor
Proximity sensor
509
A test that verifies that a PPS device is on and performing as expected is
Functional testing
510
Barriers that are always in place and are fail secure is
Passive barriers
511
The term given to the type of operational access control in a high rise described below is ‘‘An hour or two before and after business hours and possibly Saturday the building main entrance door remains unlocked but tenants are scrutinized closely’
Intermediate
512
The magnetic stripe medium mostly used in security credential application is
2,500-4000 Oersted
513
To protect its employees from customers who claims to incur losses and mental negligent injury to them by the employees an organization requires what coverage
Liability insurance
514
The basic steps in report writing are
Gather the facts Record the facts Organize the facts Write the report Edit if necessary
515
The quantity of light emitted by a household bulb rated 100 watts is
1700 lumen
516
The fundamental template for direction that defines and supports the long-term goal of an organization is
Strategy
517
The best light for security lighting is
Halogen
518
The classifications of evidence are
Documentary Physical Oral
519
If a witness sees a driver in an automobile pass through a red light and strike another automobile that had the right of way. The type of evidence this witness will give in a trial is
Direct evidence
520
The first step in assuring life safety in a high-rise is
Comply with applicable local building and fire codes
521
A report written in the cause of an investigation that gives the investigator updates and detail leads is
Progress report
522
The levels of building occupancy in a high-rise are, what
Open buildings Closed buildings Hybrid building
523
. Security lightings serves three main purposes these are
Support the video subsystem Acts as deterrent for criminal activities Provide life-safety as lighting pathway
524
The Human perception of the amount of light that reaches the eye is
Brightness
525
The extinguisher most appropriate for restaurants hood, ducts, looking appliances in kitchens and cafeteria areas is
Dry/wet chemical
526
Any delay before detection serves primarily as
Deterrence
527
An asset protection manager can justify request for additional funds for his programs from senior management by
Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced
528
The key components of alternative services provider would be
Order maintenance operations
529
During an interview if the interviewee makes a specific denial this is an indication of
Deception
530
The quality of an investigation that shows the depth of work done is
Thoroughness
531
A negative variance between the book count and actual count of various items in inventory in a retail investigation is
Shrinkage
532
The cornerstone of any investigative decision is
Evidence
533
The major responsibility of a frontline officer on, duty is
Access control
534
One major obstacle in the implementation of an effective security awareness program is
Creating employee and management buy-in
535
The biggest mistake made when conducting a vulnerability assessment is
Concentrating on individual PPS components and addressing upgrades only on that level, not of the overall system level.
536
The advantage of private policing over public police is
Cost of service delivery
537
This will trigger the destruction of information but will not multiply itself refers to
Trojan Horse
538
A person who has vision, idealist, and more interested in future and timeless is exhibiting a mental preference of
Intuitionist
539
In risk analysis, reducing consequences given the event is
Mitigation
540
In drawing up an awareness training a consideration to make is
Organization business
541
Every employer’s nemesis is
Time theft
542
A major enemy of training is
Budgetary limitation
543
When kidnapped victims form an emotional bond with their abuductors this is
Stockholm syndrome
544
A four digits pin will allow a trial combination of
10,000
545
Measures a potential adversary perceives as too difficult to defeats are called
Deterrence
546
Categories of emergencies are natural and what else
Accidental Man-made Natural
547
The characteristics of old terrorism are
Show discretion and moderation in both selections of targets and means of attack Organizational structures are predictable Have political motivation, use violence as a didactic tool Have traditional motivation
548
The standard that applies to all organization that hold, process and exchange card holder information is
PCI-DSS
549
An interviewee who uses very definitive statements during an interview is a sign of
Truthfulness
550
Important factors in the design of an integrated security system to pin point the best solution are
Anticipated threat/vulnerability Needs of the facility Constraints
551
A protective system is evaluated on the performance and cost-effectiveness of individual measures in doing what
Countering threats Reducing vulnerabilities Decreasing risk exposure
552
What is the most used sensor for intrusion detection
Line/boundary sensor
553
In an emergency, where the response is by multiple agencies, the incident commander is
Senior representative of the lead agency
554
The two most common communication frequencies are sound waves and what else
Microwaves /Radio waves
555
The business impact analysis involves which actions
Identify the organization critical functions Assess the impact of disaster or emergency on these critical functions over time Determine other elements of the business on which these critical functions depends Develop and prioritize recovery strategies
556
An appropriate approach to create a job position for proprietary security is
Job description
557
If a large scale disaster incapacitates so many board members a most desirable approach is
The vacancies can be filled by the remaining members of the board
558
Alarm systems may be communicated on which of the following type of medium
Unshielded pair of direct current (DC)
559
Arrangement for storing vital records should be integrated into the BC and COOP planning list the indispensable vital records
Engineering data Customer data Payroll and personnel data policy Manufacturing process data
560
The most important step when preparing to conduct a security survey is
Planning
561
Measures of return-on-investment are
Time saved Increased productivity Reduced employee turnover Lower liability Greater customer satisfaction
562
Gathering information on the layout of a site, the location of key assets, site operations and production capability and the types of PPS components locations by the VA team is called
Facility characterization
563
The appropriate person to trigger emergency rescue operation if the disaster is on a large scale is
Incident commander
564
Concerns to an enterprise to be addressed by a violence risk assessment which are business related are all the following except
Liability Associated cost Workplace morale Productivity
565
A standard that is voluntary and compulsory is
Mixed standard
566
If an attack is within the reach of the EPS, the action most appropriate is
Cover and evacuate
567
The objectives of an interview are
To obtain valuable facts To obtain a confession To identify the guilty To eliminate the innocent
568
In an organization where series of missing items are been reported, a key record of item movement and control can be adequately sourced from
Well developed security incident data base
569
To measure the effectiveness of the security countermeasures as to show a long-range cost saving to the company’s senior management, a manager should apply what
Efficiency vs cost
570
An appropriate structure to handle an incident that involves multiple agencies from multiple jurisdictions is
Unified command
571
In asset protection the period between major paradigm shift has been
Decreasing
572
In absolute number a High-rise is
23-30 meters 75-100 feet 7-10 stories
573
Legislation that governs the process of background screening in the U.S is
Fair credit reporting act
574
Workplace violence management, monitoring or closeout of the incident is determined by
The company
575
Which information is found in the balance sheet
Company’s operation, financing and investment Company’s use of profit to increase shareholder equity Assets and liability mix and how it relates to shareholder equity
576
The most considered in the planning stage of an emergency management program is
Identifying the key assets of the organization that need protecting
577
Measures of margins are
Gross profit margin Operating margin Net profit margin
578
If a large scale disaster requires a public safety response, the incident commander is usually
A senior member of the responding agency
579
This entails the movement of critical function and personnel to an alternative operating site in accordance with a pre-established plan
COOP plan
580
Modern management has come to the realization that their best option to manage employee theft and fraud is
Preventing looses
581
An insurance cover most appropriate for a facility with high incident of break-ins resulting in theft, embezzlement, loss of equipment
Crime coverage
582
An EPS initial reaction to a sudden violence attempt on the principal is
Evacuation
583
In asset protection the paradigm shift is in the area of technological development and what else
Conceptual shift
584
The major reason for installing light at the perimeter fence is
Deterrence
585
A hybrid budget technique is which of the following
Top-down, bottom-up
586
A type of budgeting technique more likely to be accepted by lower level managers is
Bottom-up
587
This plan is modified annually, but under what other condition can it be modified before annually
Emergency
588
Valid violence risk assessment requires depth of information available only for what
Known subject
589
Financial statements are created in accordance with
GAAP
590
A management financial approach to determine the expected return on its investment is
Financial strategy
591
The level of violence risk assessment which determines whether there is an immediate risk of harm for emergency procedures to be activated is
Initial
592
State the equation of the balance sheet
Assets = Liabilities + Shareholder’s Equity
593
The primary function of the EPS is
Avoiding dangerous persons and conditions
594
Evidence of truthfulness refers to what specific words
Steal, Kill, Rape
595
In the most basic sense, the purpose of an interview is
Aid an investigation into the truth
596
A lighting equipment most appropriate to illuminate a potential intruder while leaving the security personnel concealed is
Fresnel
597
A lighting source that is least efficient, most expensive and have a short life span is
Incandescent
598
This is neither an asset nor a liability in the balance sheet
Shareholders’ equity
599
Which surface have the highest reflectance
Snow
600
An all important but often missed form of identification in a CCTV program is
Scene identification
601
The first key concept that must be understood by the asset protection professional, to be able to design a PPS that will meet identified goals and objectives is
System
602
The most valuable asset of the EP specialist is
Physical acumen
603
The minimum pounds of force required to separate an electromagnetic lock is
500 Ibs
604
The first step in risk assessment process is
Data gathering
605
The theoretical maximum combination for a four-number combination lock is
100,000,000
606
An exception to a hearsay evidence are
Dying declaration Res gestae Banking record
607
A sensor technology that reduces false alarm rate and detection sensitivity is
Dual technology
608
When suspicious activity is suspected by an intrusion detection system, a lighting system most appropriate to deploy is
Standby lighting
609
After the VA is conducted and the VA report is written and analyzed a key principle off this analysis
An initial baseline is established
610
If you move form a lawn tennis court where the light is bright to a covering or underpass, which lighting source should be applied
Induction lighting
611
An analysis most appropriate for assets with lower consequences of loss is
Qualitative
612
A complete collection and range of uncertainties that affect an organization’s future is
Risk portfolio
613
An analysis of past security incidence and their patterns is called
Trends
614
Who is more concerned with the implementation of the organization’s policies and procedures
First line manager
615
A spoken statement regarding a person’s knowledge, which may be direct or indirect and gained through any manner is
Oral evidence
616
Categories of physical evidence are and what else
Corpus delicti, Identifying Associative Trace, Tracing
617
How is residual risk calculated
Threat X vulnerability ÷ countermeasures
618
Who has the primary responsibility of determining the classification level for information
The owner
619
What does a retina scan biometrics system do
Examines the pattern of blood vessels at the back of the eye
620
Most computer-related documents are categorized as which types of evidence
Hearsay evidence
621
What best describes the ALE calculation
It estimates the loss potential from a threat in a one-year time span
622
In the PPS what may serve as a first line of defense
Deterrence
623
When is a security guard best choice for a physical access control
When discriminating judgment is required
624
List what are considered delaying mechanism
Passive barriers Redundant scheme Dispensable barriers Access controls Security officers
625
The choreography for the EPS is called
Working the Principal
626
The distance of the perimeter to the building inside, if it does not form part of the building is
50 feet
627
If an earthquake strikes, what to do if inside the building
Stay under a sturdy material
628
The sensor that emits human energy
PIR
629
Which sensors are also known as proximity sensors
Capacitance/Pressure mat
630
The quick ratio is also known as what
Acid test
631
What you are, what you have, and what you know refers to
Personnel Entry control
632
Distance required for bomb evacuation
300 Meters/328 yards
633
Which sensor can detect the presence of a suspected arsonist
PIR
634
Which are the HID family of lights
High Pressure Sodium Mercury Vapour Metal Halide
635
The first step of an investigator is
Establish rapport
636
What is the function of the budget in management
Planning
637
Main function of the EPS
Preventing harm and dangerous conditions
638
The weight of a safe that require anchoring on the structure is
750 Ibs
639
The temperature for paper in a safe against fire
350 Deg F
640
The major interior constituent of a safe resistant to fire
Moisture
641
The primary purpose of a private sector investigator is
Protect the interest of the employing agency
642
A first line Manager is
Supervisor
643
The main motive for intrusion detection deployment
Early warning
644
What is the cause of the cry wolf syndromes
Nuisance alarms
645
Which sensor is good for preventing burglary incident
Vibration
646
What is the secondary function of the physical protection system
Deterrence
647
Which documents should be kept as separate from the emergency management plan
BC and COOP
648
Applied ethic is for which in the society
Humanity
649
Which glass type is strongest against blast
Polycarbonate
650
The percentage of the scene width for action identification is
20%
651
What substance acts on the central nervous system and also serves as a sleep inducer or depressant
Alcohol
652
Which drug is also referred to as ‘‘ICE‘‘
Methamphetamine
653
What substance drastically alters the user mood, sensory perception and ability to reason
Hallucinogens
654
PCP (Phencycledine) is often called what
Angel dust
655
What is the most common drug of abuse in the workplace
Alcohol
656
The most common prescription drugs of abuse sold at the workplace belongs to which family of drugs
Benzodiazepines
657
An employee who appears to be more alert, eager to work and productive is a suspect of which family of drugs
Stimulants
658
Which drug acts on the central nervous system that results in dilated pupils, elevated blood pressure and increased heart rate
Cocaine
659
An employee who experiences frequent severe mood swings and has trouble getting along with others and thus. Become difficult to manage is a victim of which family of drugs
Stimulants
660
An uncontrollable repeated use of a drug by an employee is called
Addiction
661
Overreliance on security technology tends to place the principal in what
Vault
662
A theory that suggests that the presence of a capable guardian may deter crime is
Routine activity theory
663
What does the most critical stage of PDCA entail
Identifying and analyzing the organization’s problems
664
What is perhaps the most frequently overlooked and most difficult to identify and evaluate threats
Inadvertent threats
665
Which lights are none HID family of lights
Incandescent Florescent Halogen
666
What is the second most commonly used drug in the workplace
Marijuana
667
Which substance tend to relieve malaise and increase alertness when used in moderation
Stimulant
668
The retinal scan which uses low intensity light to scan the eyes measures what
Blood vessels patterns
669
The two types of explosive detection are
Passive/Active
670
Which substance acts on the central nervous system and also serves as a sleep inducer
Alcohol
671
What action is taken by an organization to prevent an employee who just gained employment into a competitor’s firm from disclosing proprietary information to his new employer
Non-competitive covenant
672
What is described as a practical document that is shared with all relevant unit and fairly enforced
Information security policy
673
What is fundamental to the protection of information
CIA triad
674
Which sensor will be imparted if the temperature in a room rises by 370C at 11 am in the morning to 550C by 6pm
PIR
675
Which sensors are best to provide early warning of a forced entry
Vibration sensors
676
What sensors are best to measure temperature changes in a room caused by the human presence
PIR
677
Which sensor are best suited for protecting metal cabinets and safes
Capacitance
678
Which lights have instant re-strike time
Fluorescent Halogen Incandescent
679
Which lights has the highest re-strike time
Mercury vapour Metal Halide High Pressure Sodium
680
What is the first step an interviewer should take to ensure a good session is achieved
Establish rapport
681
Which measures are covered by a security manager using CPTED
Mechanical measures Organizational measures Natural measures
682
A building considered a high rise would be exposed to which kinds of risk
Fire Explosion Contamination of life support system
683
What is considered the most important aspect of personnel selection
Interview
684
Which theory believes that punishment or threat of punishment motivates a worker
McGregor’s theory X
685
Which are the important tools in crime prevention
Management Evaluation Planning
686
What device can be place between the internet and the system one wants to protect
Firewalls
687
Which kind of attack makes several direct attempts at the password of a system with the intention of compromising it
Brute-force attack
688
Which lock has the longest delay
Pin tumbler lock
689
What factor can adversely affect the response time by police to alarms
Increase in the numbers of alarm users
690
When a company allows another to make use of its warehouse during an emergency, what is in play
Mutual Aid
691
What does a fire safe rating imply
Ability to maintain a certain internal temperature for the specified period
692
What model appears to be the future of security management
Proprietary staff supervising contract staff
693
Which groups of lights are classified as outside lightings
Emergency light Continuous Controlled Standby Portable Glare projection
694
What are the types of locks
Mechanical/Electromechanical
695
The process of an EP specialist moving around with the principal is
Working the principal
696
What can be considered as the major cost of workplace violence to a company
Loss of productivity and morale
697
Which record has in it a documentation of every major security incident on the premises
Security log
698
What are the major types of line connections
Loop Point-to-Point Multiplex
699
What is the major difference between HIPS and IDS
HIPS is like an IDS except that it operates on a host and protects it from antivirus
700
What are the types of explosion
Chemical Mechanical Nuclear
701
All gaps in employment history if more than what period should be investigated
30 days (1 mth)
702
What tool is appropriate to ascertain the reason for an incident, so as to prevent same from reoccurring
Root cause analysis
703
What tool is appropriate to determine what steps might need to be taken for organization’s capacity to conduct risk assessment to move from current state
Gap analysis
704
Budget the equivalent of pro-forma invoice, projects future cost and what else
Revenue for a defined period
705
List what are dispensable barrier
Chemical fogs Smokes Irritants Foams
706
What are the characteristics of a post order
Each order deals with a single subject Each order is as brief as possible Each order is written in simple easy-to understand terms Orders are indexed in detail.
707
A company investigator who checks the financial records of another company and their history ahead of a planned acquisition is doing what
Due diligence investigation
708
Difference between a social drinker and an alcoholics
A loss of control over the time, place and amount of drinking
709
High-rise buildings are generally divided into public Access, Rented Spaces and what
Maintenance space
710
With whom does ultimate responsibility for shutting down a facility be in an emergency
Those trained/familiar for that responsibility
711
Which sensors would be affected by the Doppler principle
Microwave Ultrasonic
712
The members of the incident management team are
A senior Human resource manager A senior management representative A senior security manager A legal representative familiar with labour and employment laws
713
The primary elements of violence risk assessment program are
Behavioral recognition Notification Assessment Intervention through Planned disruption
714
What are the stages of a behavioral dynamics of workplace violence
First the determination of violence as an acceptance means to establish control and re-establish control Next selection of targets and location for violence Then the act of violence can occur
715
What are the illegal means to acquiring information about a competitor without directly stealing it
Directing an agent to establish a fake business arrangement with a company to learn details of its manufacturing process. Conduct fake job interviews Directing an agent to befriend employees of such a company to collect information on proprietary manufacturing processes. Recruiting an employee of the company to provide information on manufacturing processes. Performing reverse engineering.
716
Who would be regarded to use the incident command system
Private and public agencies
717
What are the elements of the incident command system
Command Operations Logistics Planning Finance and Administration
718
Errors are discovered after an interviewee has given his written statement, what action should an investigator take to address this
It should be initialed with an ‘‘OK’’ written in the margin by the suspect
719
A balanced system should have what in addition to detection and assessment
Communication/deployment
720
In the plan-Do-Check-Act operating principle, the check stage involves what
Examination of devised solution to address a company problems
721
An organization who decides keeping important assets at a separate location is doing what
Risk spreading
722
Fastening bookshelves and file cabinets to the walls to keep them from falling during an earthquake is
Mitigation
723
In a high-rise which access type requires credentialing
Closed building
724
What are the verbal behaviors of a truthful person
Offers unqualified direct, answers Makes a sweeping denials Gives spontaneous answers Offers unqualified answers Responds to questions in a rational and clear tone of voice
725
What are the verbal behaviors of a deceptive person
Exhibits an unusually poor, selective, or remarkable memory Avoids realistic words Makes seemingly irrelevant comments Gives delayed, evasive, or vague answers Offers a specific denial
726
Whose theory is based on the premise that the opposite of satisfaction is not dissatisfaction but simply no satisfaction
Herzberg
727
Criticality in an emergency is measure in terms of what of
Financial loss
728
A,B and C were pooled together from logistics, security and HR for a project and then disbanded, what is this practice
Network Model
729
What type budgeting technique is when funds are placed only to the extent that planned expenditures are justified in detail
Zero-based
730
What type of budgeting technique is when the top management appropriates and allocates money to the security department
Top-down budgeting
731
Testing after installation or upgrade of the PPS is
Functional testing
732
The only answer for an employee who has surrendered to substance abuse is
Progressive discipline
733
The space between an asset and an explosive threat is
Stand-off-distance
734
Protection from a bomb is achieved through what
Distance and cover
735
A major factor in the design and implementation of security systems and programs is
Organization’s culture
736
A maintenance that corrects faults and returns the system to operating capacity
Remedial maintenance
737
What should be developed to ensure that preventive maintenance tasks are performed adequately
Checklist
738
To ensure that security systems operate at its optimum capability with minimum downtime, is what major goal
Service level agreement
739
Layers in an asset’s safe guide in relation to protection-in-depth is referred to what
Redundant scheme
740
What is the greatest exposure to a corporation in terms of loose
Employee misconduct
741
A chief executive praised a staff performance in an end of year party whose theory is being projected
Herzberg
742
A colour rendition of 70 to 80 percent is considered what
Good
743
A coverage intended to guarantee the performance of some obligation by an individual is
Surety coverage
744
A process that is used to identify an entity’s critical function as to identify the effect of a disaster on those function is
Business impact analysis
745
A coverage to protect an employer from the dishonesty of employees
Fidelity coverage
746
What are the components of a mechanical lock
Key/Unlocking device Tumbler array/Revolving Device Bolt or Latch
747
What provides a definitive certification guidance for an organization information assets
ISO 27001/2
748
The centre piece of ISO 27001 is
ISMS
749
Which employee would be more appropriate to deploy for a crowd control function and to ensure order in a crowded environment
Extroversive
750
A scheduled activity to keep the system in good operating condition is
Preventive maintenance
751
This associates the immediate image capture with a sensor alarm to determine response
Assessment system
752
A level of violence risk assessment that provides the basis for the design and implementation of a non-immediate emergency resolution plan is
Comprehensive
753
An illegal acquisition of a competitor patent information is
Industrial espionage
754
Words, names, symbols or images applied to products to identify their source is
Trademark
755
Computers on the internet communicate via a protocol called
TCP/IP
756
An alarm connected by a telephone line to the police/fire station is
Auxiliary alarm
757
When a supervisor is having problem supervising officers under him is due to what
Span of control
758
What constitutes cost of goods sold
Cost of creating a product and service
759
A required guarantee from a contractor to response to site to handle a maintenance is
2 to 4 hours
760
A property right granted an inventor to exclude others, from making, offering for sale the invention for a limited time refers to what
Patent
761
What communicates a business functionality and operational methods
Mission
762
The adaptive capacity of an organization in a complex and changing environment is
Organizational resilience
763
After assessment of vulnerability and the implementation of countermeasures what is next
Review of effectiveness
764
Outsourcing of the production of a major component to company X due to security issues and then buying the component from company X is what
Risk avoidance
765
When access control into a facility is impossible due to bomb threat, what is recommended
Control access to critical assets
766
In an account department the best practice to ensure proper accounting practice is
Separation of responsibilities
767
The manipulation of people to get them to do something that weakens their security on the network is
Social engineering
768
When a drug abuser agrees that they cannot help himself out of the situation an employer best approach is
Referral to EAP
769
Most common specimen used for drug test in the workplace
Urine
770
Whose support should the security manager get involved in the final protection measures in a high-rise structure
Owner and Tenants
771
A security design program is implemented by who
Security manager
772
A code used for electro-mechanical locks using timer is
Switch code
773
A sensor that is activated when the passage of air from the body of a person crosses the line of the protected area is
PIR
774
A type of advert most appropriate for non-entry technical/professional person’s is
Blind-ad
775
When presenting information to decision makers with limited time, the security manager can convey his key points in what way
Graphical display
776
The type of evidence that links a person to a scene of crime is
Associative evidence
777
Protective barriers against bomb-blast is
Thick reinforced concrete
778
The historical origin of mug photo shots is
Private agency
779
A device that record the calls/caller number in a telephone is
Pen register
780
An analysis more appropriate for assets with unacceptable consequences of loss is
Quantitative analysis
781
In a facility, when the primary power source becomes non-functional, and the secondary source is utilized, some lamps takes long time to reach full brightness, the best light suited to handle this situation is
Halogen /Incandescent
782
In an alarm system, contact device means
An alarm is triggered when the contact is broken
783
The correct sequence of choosing a camera is
ANS Sensitivity, Resolution, Features
784
An organization that sends an e-mail to an outside organization requires what to protect the e-mail
VPN
785
If a building wall is made of gypsum plastic, or plywood, the sensor most inappropriate is
Microwave
786
After analyzing the facility data and conducting a vulnerability assessment and the VA report is written, the next appropriate response should be
Determine baseline risk
787
If a loose would have a noticeable impact on earnings, the rating recommended is
Moderately serious
788
To handle frequent reports of stolen haulage item in a distant location, a security manager should apply what
Use intrusion detection system
789
What are the characteristics of policies in an organization
Policies provide a board description of how operations will be conducted Policies cover items that organization monitors Not all policies requires written procedures Some policies are driven by government regulations
790
The financial reports that have become accepted as standard are
Income statement Balance sheet Statement of cash flow
791
A wife who continuous to stay in a abusive relationship because of what
Economic assistance
792
Action taken by a business before, during or after an emergency to minimize the emergency negative impact on the organization’s operation is encompassed in what
Business continuity
793
The recommended spacing distance between pillars in a chain link fencing is
10 feet
794
When a grandmaster key is lost, re-keying should start where
From the perimeter to the interior
795
A report that is often concise, well written and interesting to read is
Structured narrative
796
An analysis approach that depends on for conformance to specific policies and regulations is
Compliance based
797
The distance of the outer perimeter fence to the structure inside, if the building itself is not part of the perimeter
50 feet
798
The greatest problem in an investigation is
Objectivity
799
When two sensors are logically combined, the probability of detection of the combined detectors is
Less than the probability of detection of the individual detectors
800
This test measures the numerical perception of a job applicant
Aptitude test
801
This process should be cost-effective and the most experience component should be conducted last is
Policy on a comprehensive pre-employment screening program
802
In a simple case…………………report may be the final and opening report
Initial report
803
The maximum delay time for an emergency exit is
15 Secs
804
When preparing an initial budget, the percentage of the final bid price, generally allowed as a margin of error is
15-20%
805
The technique of transmitting several messages simultaneously on the same medium is
Multiplexing
806
The distance of the outer perimeter to the structure inside if the building itself forms part of the perimeter
2 inch
807
A report that documents events observed by an undercover operative other than the normal happening in the course of the investigation is
Special report
808
The alarm that operates from residential location with guards in charge is
Proprietary alarm
809
The best approach to adopt during the pre-planning stage of an executive protection program
Crisis management team
810
The percentage of illicit drug users in the U.S that are on full time employment is
8.8% (approximately 9%)
811
When it is difficult and time consuming to test the entire system at one time, a recommended test is
Limited scope testing
812
The cornerstone of any construction project is
Drawings
813
A lighting system that duplicates other lighting systems but depends on an alternative power source is
Emergency lighting
814
The most valuable asset of the EPS is
Physical acumen
815
The identification of different components of the PPS and their functionality is
Vulnerability assessment
816
To mitigate against tailgating in access control, an appropriate measure is
Turnstile
817
Fire resistant safes will keep the documents inside it safe under a burning fire at a temperature of
350 Degf
818
Sensors are generally classified into two major categories namely
Passive and active
819
For resolution that is clearer and can see larger range of colours and high sensitivity, the best recommended for observation or assessment is
Digital camera
820
Giving motivational feedback to improve performance is
Coaching
821
What are the secondary elements of the violence risk assessment
Diversion Delay Response
822
When a senior management directs a security manager to perform certain functions, this relationship is
Functional authority
823
What are the early warning signs that can lead to violence
Harassment Intimidation Discrimination
824
For security professionals, CPTED is a set of management tools targeting what components
Places Behavior Design and use of space
825
A detailed-in-depth examination of all revealing security defences and defensive activity, measured against current and projected risk is
Security survey
826
Dividing of video images into grid sections is
Masking
827
For each threat, the remaining potential risk after all ISS countermeasures are applied is
Residual threat risk
828
The most visible sign of a PPS when you approach a facility is
Uniformed security officer operation
829
Response force personnel if deployed in a fixed and well protected position are considered elements of the PPS
Delay
830
The decision to shut the plant in an anticipated bomb attack is taken by
Threat evaluation team leader
831
The components of a good PPS are
People Procedure Technology
832
In executive protection, when an adversary strikes salvation lies in
Agents conditioned response
833
A lock recommended for safety and security on an emergency exit is
Electromagnetic lock
834
A logical method of problem solving in which a comprehensive solution is developed in relation to a problem having several dimension is
System approach
835
A fully integrated security program blends what into a flexible responsive elements
Architectural Technological Operational
836
An easy going entry control card technology is
Proximity card
837
The theft triangle concept is
An explanation of why people steal
838
The function of a guard on patrol duties is
Observation
839
Applied ethics is to serve
Humanity
840
The backbone of a security survey is
Checklist
841
A line transmission technique in which the installation is connected directly to a control by a pair of wires is called
Point-to-point
842
Sensors are generally categorized into classes of
Perimeter, Space, Object
843
The type of lighting that would best serve for video surveillance if colour rendition is a major consideration is
Metal halide
844
Using the following scenario, answer questions 845 - 847 A security manager for company X has been asked to oversee the installation of a fire suppression sprinkler system as recent unusually dry weather has increased the likelihood of fire. Fire could potentially cause a great amount of damage to the organization assets. The sprinkler systems is designed to reduce the impact of the fire on the company
845
In this scenario, fire is considered what
Threat
846
In this scenario, the sprinkler system is considered what
Countermeasure
847
In this scenario, the likelihood and damage potential of a fire is considered what
Risk
848
What volume of sales is required by a company with net profit of 5% to offset a loss of $50
1,000
849
What will make better chain of custody for an evidence
Evidence collected and marked with a permanent ink by the same person
850
A situation where your body cells adjust to the presence of a drug is
Dependency
851
Lock with the highest delay
Pin Tumbler
852
What part of the pin tumbler is called the revolving device
The tumbler array or revolving device
853
What kind of video Camera can be installed at a Jetty bay to monitor activities
Standard lens camera
854
Perimeter lighting should be installed to face where
Down and away from the protected area
855
The relationship between private security and public policing offers what advantage
Cooperation
856
A drug that works on the central nervous system but can also be used as a sedative in little dose is called
Benzodiazepines/Depressant
857
The type of light used in residence
Incandescent
858
Type of sensor that emits an electrical energy around the protected object is
Capacitance
859
Classification of smoke sensors are
Photoelectric and Ionization sensors
860
What training should be given to workers to help them from contracting infections from body fluids and blood borne pathogens
Disease control/Concept of Universal Precaution
861
What is the process of evacuation during earthquake
Duck under a sturdy material
862
Types of spaces in High rise are
Public or Common areas Rented or assigned space Maintenance space
863
This communicates business functionality and operational methods
Mission
864
Distance between perimeter wall and building if the building is part of it.
2 inch
865
Margins are
Gross profit, Operating and Net profit
866
Personal entry control is what you have, what you know and what else
What you are
867
What are based on past performance and projected future performance
Financial decisions
868
What sensor can detect even outside a gypsum wall
Microwave
869
CCTV design considers what
Camera, cable, monitors
870
What light is best used for CCTV for good colour rendition index
Metal Halide
871
A drug that attacks central nervous system and sleepy
Narcotics
872
Security light that is turned on when suspicious activity is detected is
Standby
873
Two types of infrared sensors are
Passive/Active
874
Sensor to protect safe is
Capacitance
875
Percentage of scene width for action identification is
20%
876
What temperature would a paper endure in a record safe before it is charred
350 Degf
877
How do you pick a spent cartridge at a crime scene
Pick it up by the open end using tweezers so as not to destroy any partial fingerprint or other evidence that may be on the outside of the cartridge
878
The principal was going to a function and en-route there was a crisis and an alternative route was taken, who was responsible for this decision
EP, Specialist
879
Who is responsible for the implementation of program after design and installation
Security Manager/ safety
880
The most common mistake of inexperience investigator is
Failure to corroborate evidence
881
An illumination device deployed in a series that maintain uniform lighting during the hours of darkness is
Continuous
882
An employee misassembled a device and caused harm to a customer is covered by
Liability insurance
883
Types of explosive products are
Blast, Fragmentation and Heat
884
Private system in place to guide the implementation of SOX is
An integral reporting system that is non-retaliatory so employee can report suspected violations/Employee Hotline/Compliance Investigation
885
What is the second greatest threat to an organization in terms of loss
Employees’ theft and fraud
886
This uses a plain-text mechanism and connects with a control panel, what is
Magnetic stripe card
887
Types of glass used in security are
Acrylic and Poly Carbonate
888
A drug test that turns positive when the drug is not present is
False positive
889
Why is functional Authority only allowed for one step below
To Maintain the Unity of Command
890
For a woman that runs a restaurant how does she hide her secret sauce recipe and what can her secret sauce recipe be referred to
Trade secret
891
Which aspect of the Plan –Do- Check –Act deals with total quality control
Check
892
What are considered account payable
These are accounts on which an organization owes money, e.g. utilities or services acquired under informal agreements
893
An organization greatest threat in terms of loss is
Competition/Industrial espionage
894
Questioning approach most appropriate at the primary phase of an interview is
Open-ended or Narrative questions
895
The use of private security personnel to provide services within public areas is
Public safety policing
896
How well a company uses financed assets to generate income is
Return on Equity
897
What is recovery time objective(RTO
The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days
898
A relationship for an institutionalized coordination and cooperation between security and police personnel should be through what framework
Structural and Contractual
899
The purpose of a security audit/survey is for
A thorough physical examination of a facility and its system and procedure conducted to assess The current level of security Locate deficiencies Gauge the degree of protection needed
900
List exterior security lightings
Continuous, Standby Controlled, Portable, Emergency Glare Projection
901
What is the purpose of a vulnerability assessment in a disaster recovery plan
To establish/ identify weaknesses at the facility before the emergency occurs
902
What is the most common form of workplace embezzlement and what can be done to stem it
Cash disbursement A separation of duties so that an accounts payable clerk doesn’t have access to add names or delete names to the master vendor files
903
The second most valuable resource of an organization is
Corporate knowledge
904
What are considered account receivable
The amount due by customers for goods and services already delivered
905
A significant loss event occurring thus resulting in a planned activity not achieving its expected outcome will result in what analysis
Root cause Analysis
906
Borrowing capital to purchase asset that can increase revenue is
Leveraging
907
A search following a bomb threat most suited for offices and manufacturing sites with little public access is
Occupant Search
908
What is the required clear zone between the outer environment and the perimeter fence
20 ft
909
Risk ratios are
Current, Quick and Equity
910
Practices that provides analysis and decision tools that allows businesses to monitor the financial operations is
Financial Management
911
An evaluation of the suitability of the current process in assessing risk and its sufficiency to manage risk is
Gap Analysis
912
What is recovery point objective is (RPO)
The point in time to which an organizational activities in a known integral state can be restored from
913
An employee whose continued performance shortcoming due to drug policy violation should attract what, explain the sequence
Documented progressive discipline such as Oral warning, Written warnings, Suspension and ultimately Termination
914
What are work place violence spectrum
Behavioral recognition Notification Assessment Intervention by planned disruption
915
What are work place violence spectrum
Behavioral recognition Notification Assessment Intervention by planned disruption
916
Which kind of sprinkler is positioned at the centre of a building against fire out break
Wet pipe sprinkler
917
How is the brightness of light measured
Lumen
918
What is the most essential part of the CCTV project
Camera
919
Security is moving towards the use of hybrid security, what does this entail
Proprietary supervisors (first line managers) oversee contract front -line officers (Guards)
920
Security is moving towards the use of hybrid security, what does this entail
Proprietary supervisors (first line managers oversee contract front -line officers)
921
What kind of lightening have a high re strike time
High intensity discharge family of lamps
922
What is the problem faced by security department in an organization
Low credibility
923
The security of an organization rest squarely on who
The practices of employees
924
The most expensive fee in design is
Projected system construction costs
925
What is international standard for ISO 27001 and ISO 27002
FOR Management of information security and other information technology
926
An alarm that sound within a compound
Local alarm
927
What is the most essential job requirement for a person loading a dock in a shipping company
Direct requirement
928
An undercover investigator wrote in his report ‘I saw the suspect passed some parcels; containing white substance suspected to be heroine to an employee’ What is wrong with the report
Name of suspect not clearly mentioned Time of exchange not mentioned Substance exchange has no validation
929
Who are the first line of defense in the recruitment and selection of quality and risk-free applicant for the organization
Human Resource Personnel
930
At what point would you withdraw an undercover agent
When the investigation, has yielded enough information to allow the operative to be removed
931
This provides a method for evaluating and comparing the value and cost of risk treatment options
Cost-Benefit Analysis
932
The role of the security investigator in pre-employment screening
Verification of all information provided by the applicant in his signed application
933
What has historically been associated with reactive, rearwards-looking reviews situations
The use of RCA (Root cause analysis)
934
How many days period between pre-adverse action and adverse action
60 Days
935
What is the best cover to adopt when disengaging an undercover operative
When the operative has been named as an offender If named as a co-offender by enough interviewees
936
Who developed the concept ‘‘Eyes on the street’’
Jane Jacob’s
937
What is another name for the cause and effect analysis diagram
Fishbone diagram or Ishikawa Programming
938
How should the shipping, receiving and warehouse departments be designed
They should be separated as much as possible to minimize collusion and pilferage opportunities
939
What theory suggest that unmaintained space can lead to the impression of abandonment and increase crime opportunity as no capable guardian is observed
The ‘‘Broken Window’’ theory
940
To align specific actions with specific risks as a means of leveraging or overcoming existing dependencies, what tool is required
Force field analysis and influence diagrams
941
What process assess the likelihood and consequences to determine the level of risk and prioritize risk treatments
Risk Analysis
942
An evaluation of the suitability of the current process for assessing risk and its sufficiency of the current process for assessing risk and its sufficiency to manage risks is
Gap Analysis
943
What is designed to pictorially show how relative strength of the risk can impact each other
Force Field Analysis
944
A provision that once an employer obtains consent, consumer report may be procured at anytime during the employee’s tenure without tenure without having to obtain another consent
‘‘Evergreen clause’’ or ‘‘Blanket’’ Authorization
945
The longest period of time that a critical process can be disrupted before recovery becomes unlikely is
Maximum Downtime
946
A visualization tool for categorizing the potential causes of a problem in order to identify its root cause is called
Fishbone Diagram
947
A two-dimensional means of representing the risk level using a matrix showing risk events, defining likelihood and consequences is called
Heat Map
948
How many days period between adverse and pre-adverse response
3 Days
949
The Fishbone diagram or Ishikawa Programming is also known as what
The cause and effect analysis diagram
950
Words, phrase, and graphic symbols are used for protection as what
Trade Mark
951
You are the team leader of a search team you discovered a computer unit during search, how would you go about it
Isolate Photograph and Document the computer system
952
A type of light to be used when one is coming out of a tunnel is
Induction lamps
953
What type of cabling is regarded to be used when installing a camera with a distance of 1000ft
Coaxial Cable
954
A key principle of PPS analysis is
An initial baseline must first be established, upgrades are then considered if the baseline shows the PPS does not meet goals and objective
955
A budget that generates revenue is
Zero-Based budgeting
956
When installing a camera with distance of 2,500ft to the control room what type of cable is recommended
Fibre Optics / Type RG-11
957
Tank fire extinguisher is used for which type of fire
Class B Fire
958
The process for planning and allocation of money to be used for the year is
Budgeting
959
How should the undercover report be written
Third Person
960
What is the most expensive and last stage of the employment process
Back grounding
961
A key element of an information asset protection risk assessment model is
A thorough study of existing and projected threat
962
Water pump is best to extinguish which type of fire source
Wood, Papers, Fibers (Class ‘A’ Fires)
963
Emergencies are categorized as
Natural, Human and Accidental Threats
964
The fire extinguisher used in restaurants is
Dry Chemicals and Wet Chemicals
965
The process for planning and allocation of money o be used for a year is
Budget
966
Intent of damage or an indication of something impending is
Threat
967
An ordered series of actions against a facility which if completed, results in a successful malevolent outcome is
An adversary path or fault tree
968
What is the primary objective of the logical network access control
To preserve, and protect the; Confidentiality, Integrity and Availability of information system
969
A technique used to identify the conditions that initiate the occurrence of an undesired activity is
Root Cause Analysis
970
Deliberately and knowingly making a false and damaging statement about the subject of an investigation is called
Tort of Slander
971
When considering entries to be used during strike, what parameter should guide this decision
They should be situated so that loss of control by police would produce a public traffic control problem to facilitate the application of more law enforcement pressure promptly
972
Altering and encoding information in a way that it can only be decoded by whom it is intended is
Encryption
973
High-rise facility is associated with space challenges in which areas
Public access or common areas Rented or assigned occupancies Maintenance spaces
974
A very expensive type of light with very short life span is
Incandescent light
975
The possibility of loss resulting from threat event or incident is
Risk
976
Dry powder is best to extinguish which type of fire source
Gasoline Fire or Class B Fire
977
How should communication with the press be handled during an emergency situation
Through prepared press releases and oral briefings through a single source in the organization
978
A type of budget where senior management dictates the figures is
Top-down budget
979
How should the undercover narrative report be written
Third Person
980
The duration of a failsafe lock on an emergency doors of High-rise building is
15 To 30 Seconds
981
When can an emergency door be locked
To practice the use of alternate exits during drills.
982
The most important consideration in the budget of CCTV installation is
It is best to design the application before establishing a budget After the design is completed, the cost can be calculated
983
The lumens of incandescent light is
1700 Lumens
984
Tank fire extinguisher is used for which type of fire
Class B Fire fuelled by gasoline, flammable liquids
985
An important aspect of internal human relations as well as public relation during an emergency is
The handling of information concerning casualties
986
A crime scene investigation is what measure in an investigative activity
Reactive Measure
987
The investigation report that can be either initial or final is used when
In a simple case
988
The appropriate time to withdraw an undercover operative is
When He/She has been named as a co-offender or Before the operation is compromised.
989
What is a requirement for release of names of those who have been killed or injured during an emergency
Relatives must be informed before such information can be released to the public
990
What should the undercover keep record of and how often
Make daily reports on his observation and experiences, after each shift
991
What is the major function of CEO as regards SOX laws
To personally certify financial reports that are released to the public
992
What is also referred to as a ’’Risk Universe’’
Risk Portfolio
993
What is the purpose of the undercover operatives report
They are ultimately used to make decisions. Serves as the basis for post investigation administrative action
994
List what are considered hard cost due to high number nuisance fire alarms In an organization
Lost productivity for employees evacuating the building Cost of fire department fines
995
The investigative capabilities of the public sector is frequently measured in what term
Numbers of arrests and convictions
996
A company’s effectiveness in using financed assets to generate income is called
Return on Equity
997
What type of risk method is keeping money in the bank
Risk Transfer
998
Primary resources of a business is
Its people/Employees
999
What are the primary elements of incident management system
Command Operatives Planning Logistics Finance and administration
1000
Avoiding answering questions from the press with the phrase ‘’ No Comments’’ will result to what
Leads to the propagation of rumors, conjecture and speculation from sources with little or no information
1001
What are considered soft costs due to high rate of nuisance fire alarms in an organization
Wear and tear on building mechanical system when alarms activate Tendency for employees to learn to ignore alarms thereby placing themselves in jeopardy The potential for staff injuries during evacuation The frustration of the organizations staff and fire department personnel due to the high number of alarms
1002
In a series of robberies occurring in an environment list two strategies that can be adopted by the public sector investigation
Proactive strategy – Surveillance Reactive Strategy – Assigning more manpower to solve cases
1003
Which organization model consists of third party suppliers who has been chosen for their expertise and ability to provide quality service to the organization
Shamrock Model
1004
What are the characteristics principles involved in internal theft
Diversion Conversion Disguise Divergence
1005
The expected first step of an executive protection program is
Establishing a Crisis Management Team
1006
The Sarbanes-Oxley Act (SOX) is officially known as what
The public company accounting reform and investor protection Act of 2002
1007
In an organization, these highlights specific goals that the organization wants units to achieve
Objectives
1008
What is the best cover to adopt when disengaging an undercover operatives
When named as co-offender by enough interviewees
1009
Elements of a post order are
Each order deals with a single subject Each order is as brief as possible Each order is written in simple, easy-to understand terms Orders are indexed in details
1010
The commonest type of loss in any organization is
Employee theft/Internal Loss
1011
List what records are admissible in legal proceedings as entries made in the regular course of business and are therefore an exceptions to the evidentiary rules against hearsay
Security Logs and Reports
1012
The most outstanding quality of an investigator is
The ability to obtain information from individuals through questioning
1013
Method of recruiting non-entry level staff is
Blind -ad
1014
The most costly item in an security department budget is
Security Officer (Personnel)
1015
What conveys a general understanding of the business, its culture and its future goals
Vision
1016
What is the required time period to inform an applicant about an investigative consumer report on him by the employer
3 Days
1017
Type of light recommended for a residence is
Incandescent/ Halogen
1018
During strike action the standard is to have how many entries
The fewest entries possible consistent with the realistically estimated operating status preferably 2 entries (One-in One Out)
1019
For security professionals planning for a strike should start when
The commencement of the 60days as effective notice of the possibility of a strike
1020
When a receiving dock personnel counts a shipment without knowledge of the stated quantity this is called
Blind-Tallies
1021
In an organization what states objectives and business goals
Vision
1022
The first notice of an intended decision not to hire an individual based in whole or part on a consumer report before it is taken is called
Notice of pre-adverse action
1023
What is designed according to an entity’s risk appetite, risk tolerance, timeframe and return objectives
Risk Portfolio
1024
The longest period of time that a critical process can be disrupted before recovery becomes unlikely is
Maximum Downtime
1025
What serves as the basis for post-investigation administrative action
The Investigation Report
1026
When an abductor develops interest in the victim, this is
Lima Syndrome
1027
The process of removing data on a storage medium before the medium is reused is
Sanitizing
1028
An organization most valuable resource is
Employees
1029
When is a strike by employees considered illegal
The absence of a ‘’60 days’’ notice of intent to modify the collective bargaining agreement
1030
Magnetically erasing a storage medium such as a Hard Drive is called
Degaussing
1031
If an investigator makes a racial statement about individuals involved in a case under investigation what is the recommended
It may be best for another investigator to conductor the interview with the individuals
1032
The potential that a given threat will exploit vulnerabilities to cause loss or damage is
Risk
1033
A complete collection and range of uncertainties that affects an organization’s future is
Risk Portfolio
1034
A person to whom sensitive company information is entrusted is called
Fiduciary
1035
Open/ closed questions @ the beginning of interviews is to do what
To put interviewees at ease
1036
What tool is used to determine how a particular undesired event may occur
Logic diagrams
1037
What is the first step required of an investigator in a due diligence investigation
Examine the issue at hand, Better still look at the question at hand and determine what is important for the particular problem
1038
What is the critical element in an interview
Ability of the interviewer to establish favorable rapport with the interviewee
1039
To trace an initiating event through a sequence with different possible outcomes, what tool is required
Event trees
1040
What is the key to a due diligence investigation
Understanding the needs of the client and the transaction at hand
1041
The most outstanding quality of an investigator is
The ability to obtain information from individuals through questioning
1042
A search for discarded intellectual property or prototypes from a waste bin is called
Dumpster diving
1043
When should undercover investigation be used
When no other alternatives are available When the company can reasonably expect return on the investment
1044
You have been appointed as the new security manager of a storage facility where high theft rate is recorded, what is the first step you would take
Setting up shipping, receiving and warehousing as individual departments (SMM 151) Shipping and receiving areas of the loading dock should be physically separated (PSM 64) Separate the two functions of shipping and receiving to minimize collusion and pilferage opportunities
1045
List what are sources information asset threat
International threats Natural threats and Inadvertent threats
1046
A tool used to determine the basic causes events is
Fault trees
1047
What is the greatest exposure to a corporation in terms of threat outside competition
Employees theft and fraud
1048
An employer failure to conduct pre-employment screening is liable for negligent hiring and
Discrimination
1049
How would foreign competitors criminally seek economic intelligence from U.S industries
Establishing, seemingly innocent business relationships between foreign companies and U.S Companies to gather economic intelligence including trade secrets
1050
What is the second greatest cost in an internal investigation unit
Overhead cost
1051
Types of emergency are natural, accidental and what else
Man-Made
1052
In analog view what percentage of the overall scene width does a subject occupy at the point of recording
20 Percent
1053
What measures can be changed without the tedious review from management before it can be implemented
Procedures
1054
The advantage of private policing over public policing is
The objective of service delivery
1055
What best describes a post order
Each order deals with a single subject Each order is as brief as possible Each order is written in simple easy-to understand terms
1056
The members of the incident management team are; (1) A senior human resource manager (2) A senior management representative (3) A senior security manager and who else
A legal representative familiar with labor and employment laws
1057
How do you pick a spent cartridge at a crime scene
At the open end using tweezers
1058
Planning for emergency preparedness need to be documented and what
Ensure recovery from business interruption and to protect the profitability of the enterprise Reviewed and updated regularly
1059
What is the main objective of executive protection
Preventing and avoiding trouble/danger
1060
What has broader scope in the recruitment process
Background investigation or screening/pre-employment screening
1061
Who in the event of high impact emergency is needed to establish the incident management system
Public and private agencies
1062
When should an interviewer observe non-verbal response
Throughout the interview process
1063
How does multiple sensors experience nuisance alarms
Decrease pattern
1064
How is fire resistant safes rated
To indicate the hour of protection and the temperature of the inside of the container can withstand
1065
What is essential in any emergency response
Communication
1066
One company experience theft with low loss but high frequency, another company experience high loss low frequency what type of assessment should be conducted
Qualitative risk assessment
1067
What is field of view
The height or width of the area being viewed, which determines the appropriate focal length of the lens.
1068
What human factors make people commit industrial espionage
Social engineering
1069
What type of questions limits the amount or scope of information that the witness can provide
Closed-ended questions
1070
After the threat and assets are defined, a vulnerability assessment is generally performed to achieve what
Establish a baseline of PPS effectiveness in meeting goals and objectives
1071
What sensor is affected by Doppler principle
Microwave
1072
What insurance should be purchased to protect employees for injury incurred to customers for not properly assembling products
Liability endorsement/liability policy
1073
Typically to whom should the security director report to
Directly to senior or executive management (CEO)
1074
What best describes a strategy
The fundamental template for direction that defines and supports long-term goals
1075
How will management support funding of the investigative unit
If the unit shows value to the organization and demonstrate that the unit pays for itself
1076
What measures tends to remain in place for an extended time once established as it is aligned with the overall business objectives of the organization
Policy
1077
How will the investigative units significantly improve response from management for its funding request
By carefully tracking and managing operational and over head costs
1078
The most common tool for controlling the brightness of an image focused onto a chip is called
Auto-Iris Lens
1079
List deceptive actions exhibited by an interviewee
Significant posture change grooming gesture and cosmetic adjustment supportive gesture
1080
A person who likes to be in large crowd, socialize, like to be in charge
Extrovert
1081
What concept is when a member of the crisis management team is vacant, there will be someone to take over
Alternate designate or member
1082
What does ISO standard propagate
Voluntary standard
1083
What is the two classification of bomb
Incendiary and explosive
1084
During an interview, what responses from a witness tends to be more accurate and promote more effective listening on the part of the investigator
Open-ended response
1085
What is a fundamental tool to most security officers positions
Keys
1086
Who in the organization is most concerned with security activities as its effects performance
First-line supervisor/managers
1087
To access a computer what is essentially needed
What you know (password) What you have (access card) What you are (biometrics)
1088
To increase information security IAP awareness what must be done
Develop, Promulgate and enforce practical policies for IAP Conduct security awareness and training
1089
When employees are given emergency response training, this training must be
Reinforced and tested with periodic drills and exercise
1090
If an incident of concern is received, the threat management team will first do what?
Evaluate the risk
1091
Threat and vulnerability are sometimes interchanged with what word
Risk
1092
Two types of maintenance are
Preventive and remedial maintenance
1093
Right design and less crime is synonymous with what concept
CPTED (Crime prevention through environmental design)
1094
Vulnerability to defeat involves what
Bypass and spoofing
1095
Absolute alarm confirmation is ideally achieved by combining two technologies, each with a high probability of detection and no shared susceptibilities to nuisance alarms, what sensor replicates this features
Dual technology
1096
Assurance of the management that their partner-company, during emergency will back them up is called
Mutual Aid
1097
Right design of perimeter security
Consistency in detection
1098
The adversary against which the facility must be protected is referred to as
Design basis threat
1099
What are open-ended question
This allows for an unlimited response from witness, in his or her own words, thereby generating a greater amount of unsolicited information
1100
What are the three general methods for valuing assets
Monetary value, Consequence criteria, Policy
1101
What is the optimal relationship between police and private security
Institutionalized coordination and cooperation through structural and contractual relationships
1102
What three questions should a risk assessment answer
What can go wrong? What is the likelihood it could go wrong? What are the consequences?
1103
Who should be involved in developing a standard
A broad group of stakeholders and interested parties, working collaboratively
1104
What type of specimen is analyzed most often in drug tests?
Urine
1105
Which stakeholder group drives the ANSI standards development process?
Standards users
1106
In Pastor’s public/private, substitute/ supplement model of policing, which cell represents the rarest scenario?
Public/Substitute
1107
What is the principal value of security awareness to executive management?
Awareness of the security program’s financial contribution to the bottom line
1108
What are the elements of a systems approach to developing a physical protection system
Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness
1109
What are the four main strategies of second generation CPTED (Four C’s)?
Cohesion, Capacity threshold (tipping point), Community culture, Connectivity
1110
At what size and how far above the ground should an opening in a building’s shell be protected?
96 square inches and under 18 feet above the ground
1111
What two values describe sensor effectiveness
Probability of detection and confidence level
1112
What are the three ways to measure profit margins
Gross profit margin = (revenue – cost of goods sold – general and administrative costs)/ revenue Operating margin = EBITA (earnings before interest, taxes, and amortization)/revenue Net profit margin = net income/revenue
1113
What is the major exterior application of bistatic microwave sensors
Detecting a human being crawling or rolling on the ground
1114
What is the most accurate confirmatory drug test?
Gas chromatography/mass spectrometry
1115
What determines the appropriate focal length for a CCTV lens
The field of view
1116
What are the five pillars of ISO standards
Equal footing of members market need consensus voluntary participation and application worldwide applicability
1117
The first step in the risk assessment process is
Data gathering
1118
What kind of lens has become the standard for camera and lens design
DC/LC (Direct circuit, logic control)
1119
Which two types of lamps take the most time to restart after a power outage
Metal halide and Mercury vapor
1120
What are the general rules of thumb for lighting levels for detection, recognition, and identification?
Detection – 0.5 fc Recognition 1.0fc Identification – 2.0fc
1121
What is the biggest vulnerability of a loop system?
All the detectors in an area could be disabled by interrupting the loop at the proper location
1122
What are the shortcomings of magnetometers
They only detect ferromagnetic materials, so they don’t detect metals such as: Copper, Aluminum, and Zinc.
1123
What bulk explosives detection technology uses pulsed low energy radio waves to determine the presence of nitrogen-rich materials?
Quadruple resonance
1124
What is an effective way of setting the value of line items in a budget
Look at each budget expense as an investment and calculate the expected return on that investment
1125
What technology is considered the gold standard of trace explosives detection but is hampered by high costs, high maintenance requirements, and the need for expert operators?
Mass spectrometry
1126
To be fire resistant, what are the minimum wall thicknesses for 4-hour vaults and 6-hour vaults
4-hour vaults: 12 inches of brick or 8 inches of reinforced concrete 6-hour vaults: 12 inches of brick or 10 inches of reinforced concrete
1127
Above what weight should safes be anchored, according to UL
750 s
1128
What are the three steps in creating an adversary sequence diagram
Describe facility by separating it into adjacent physical areas Define protection layers and path elements between adjacent areas Record detection and delay values for each path element
1129
In which type of procurement process is it usual for prospective contractors to submit sealed bids that are publicly opened
Invitation for Bid
1130
In EP, what is an advance?
The process of researching a destination before the principal arrives
1131
What is the range of light sensitivity for standard analog CCD cameras
.005 lux to 10 lux
1132
What is “working the principal”?
The choreography used by an executive protection specialist to physically move about with the principal
1133
What are the three basic stages of addiction
Craving, Loss of control, Physical dependence, Tolerance
1134
What are the four symptoms of alcohol dependence
Increased tolerance to the drug Increases in rationalization, lying Obsession
1135
What is the most accurate preliminary drug test?
Radioimmunoassay (RIA)
1136
How does situational crime prevention differ from CPTED and defensible space
Situational crime prevention seeks to reduce crime opportunities in all behavioral contexts, not just in the built environment.
1137
What business-related concerns should a workplace violence program address
Liability, Productivity, Workplace morale, Associated costs
1138
What is “the second injury?”
Emotional harm to employees caused by unconcerned or callous management in the wake of a workplace violence incident
1139
What is the name for the process by which an employer verifies the experience and qualifications presented by a job candidate?
Credentialing
1140
What are the most challenging problems in international investigations?
Cultural differences
1141
What is one of the most common errors in “friendly” due diligence investigations?
Relying on information provided by the target
1142
What is typically the initial question in an interview?
A request for the subject to relate the events in the matter under investigation
1143
How should obsolete prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reverse engineered
1144
The three methods of sanitizing electronic media
Overwriting, Degaussing, Physical destruction
1145
What are the two primary aspects of recovery after an information loss?
Return to normal business operations ASAP and implement measures to prevent a recurrence
1146
What is the difference between embedded and host-based systems
Embedded systems are typically programmed at the manufacturer and run proprietary or nonstandard operating systems, e.g. cameras, card readers, and video converters. Host-based systems run on more standard operating systems such as Windows and Linux and are easier to change
1147
What is the “A triad” of information security with regard to access con
Authentication, Authorization, Auditing/accountability
1148
What are the three types of emergency operation plans?
All hazards, Standalone (different for each emergency), Combination of all hazards/standalone
1149
Who should be assigned the role of an organization’s emergency coordinator
Someone regularly responsible for handling emergencies, such as the head of security or engineering
1150
What security measures can help prevent or limit the effect of bombings if sufficient standoff distance is impossible?
CCTV, Security patrols
1151
When conducting risk identification, what should be consulted as a key impute
The business SWOT analysis
1152
An organization that sends and e-mail to an outside organization requires what to protect the e-mail
Virtual private network (VPN)
1153
What is a collaborative technique for building consensus involving independent analysis and voting by experts
Delphi methodology or facilitated workshops
1154
What is the key question in a bomb threat assessment
Whether the threatener could have done what was claimed
1155
What is the most important and most difficult phase of bomb threat evaluation
The review phase
1156
What is the primary cause of nuisance alarms for bistatic microwave sensors
Standing water
1157
What are the two goals when dealing with possible chem-bio mail attacks?
Limit distribution of the material, look after any staff who have been exposed
1158
What does a balance sheet show
A summary of an organization’s investing and financing
1159
What should a full set of PPS procurement documents (contract documents) contain?
Contractual details, Construction specifications, Construction drawings
1160
What three elements are depicted in a cash flow statement
Net operating cash flow, Net investing cash flow, Financing cash flow
1161
Which two ratios show how an organization has done in making money during a reporting period?
Return on assets = net income/total assets Return on equity = net income/shareholder equity
1162
When should fiber optic cable replace coax cable in video systems
For distances greater than 1,000 feet.
1163
What is used to conduct threat analysis
Threat tree analysis
1164
Should the deliberations of a threat evaluation team be recorded
Yes, to assist with subsequent investigations, to justify actions taken, and to provide a basis for future training and process reviews
1165
What is the quick ratio
A measure of an organization’s ability to cover current liabilities with current assets that can be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/current liabilities
1166
What is generally the most practical approach to budget development
Top-down bottom-up
1167
In a security services contract, what should the scope of work specify
Security tasks, Days and hours of performance, Total number of hours to be worked
1168
When conducting risk identification, what should be consulted as a key impute
The business SWOT analysis
1169
What is the first criterion in evaluating bids for security services
Complying with the submission deadline
1170
For executive protection, the decision for using of vehicle should be based on what
Risk Assessment
1171
In establishing financial strategy what benefit does it provides to the organization
It identify expected margins the businesses generally make
1172
What is dependent on the risk control measures deployed to manage the risk events
Vulnerability
1173
When numerical data is inadequate, uncertain or unavailable to properly describe a given risk, which analysis approach is most suitable
Qualitative analysis
1174
What is the current ratio
A measure of a company’s ability to cover short-term obligations Current ratio = current assets/current liabilities
1175
A threat to impartially that arises from complacency or over familiarity with the context of operating conditions is
Habituation
1176
Who assumes that workers are thoughtful, eager to perform well and willing to guide
Mc Gregor’s Theory
1177
What is EOC
Emergency operation centers
1178
What in an organization specifies type of products, and level of quality
Mission
1179
Informing an emergency management what does a management analysis to partner a supply chain to provide the emergency assistance
Mutual Aid
1180
What should provide a structure for the various assessment activities
Checklist
1181
Where is the executive most vulnerable
At home
1182
What is the most important consideration when developing emergency management plan
Management involvement in the identification and evaluation of key assets of the organization that need to be protected
1183
What drives the findings and conclusions of any investigation
Information and evidence gathered
1184
What best describes the performance measurement and training in a job requirement analysis
This is to aid employee development and retention through review and reward of performance and provide training mechanism for employee growth
1185
A data gathering process that uses descriptive models to ascertain and analyze possible events that may occur in the future and their potential outcomes is called
Scenario analysis
1186
In case of destruction of the EOC, what is necessary
Designation of an alternate building location outside the building of the primary EOC
1187
During the preplanning stage of the EP program, what is the best approach
Establish a crisis management team
1188
Analysis of vulnerability involves what
Analyzing the attributes of the event and assets, services and activities
1189
What does timely response, resumption of critical business function and recovery show in the business continuity
BIA (Business Impact Analysis)
1190
What conveys the general understanding of the business, culture and future goals
Vision
1191
Which form of test is used to determine reaction to different situation through a form of stimulation
Stress analysis test
1192
What best describes the financial strategy
A management financial approach to determining the expected return of its investment
1193
For continuity of operation what should an EOC must have
Should have back-up power and an independent supply of potable water, Sanitary arrangement that are not dependent on the normal water supply must also be considered
1194
In which financial statement is EBITA clearing shown that is earnings before interest, taxes, and amortization
Income statement
1195
What are technical controls in information security
Network log-ins and passwords, Firewalls audit logs, Encryption, Antivirus and Spam filters.
1196
Standards that are binding under the law and can be enforced by formal authorities
Statutory standard/regulatory standard
1197
What does Gap analysis mean
A technique that can be used to determine what steps might need to be taken to improve the organization capacity to conduct a risk assessment to move from current state to a desired future state
1198
What should a security manager do to maximize cost-effectiveness
Ensure that operations are conducted in the least expensive, but cost effective way Maintain the lowest cost consistent with required operational results Ensure that the amount of money spent generates higher return
1199
One of the most important ingredients in effectively managing an emergency event is what
Communication
1200
In what analysis should the staffing decision be measured in a detailed job analysis
Job requirement analysis
1201
The range of threats to a principals safety and well-being are vast, what is perhaps the most troubling event
Events that have been known to occur but are unexpected
1202
What metrics shows when assessing employees overall contribution to the company
Extra sales, extra hours, work on several projects Work on task outside the position requirements Contribution towards improvements in the business process Leadership
1203
Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk
Sensitivity analysis
1204
Information on how much money an organization generates (Revenue) how much it spends (Expenses) and the difference between those figures (Net income) is obtained where
Income statements
1205
What is an integral part of the business continuity
Business Impact Analysis
1206
What threats to impartiality arises from complacency or over-familiarity with the context of operating condition
Habituation
1207
After the emergency the plan should given priority to what
Facility structure
1208
What elements are required for a successful bombing
Motive Knowledge Materials Opportunity
1209
An indication of the effectiveness of incident prevention effort is
Quick and accurate reporting of suspected incidents
1210
Which consultant does the investigation, identification and collection of evidence, identification of vulnerabilities in an assessment
Forensic security consultants
1211
A simple technique for prioritizing possible changes by identifying the problems that will be resolved by making these changes is
Pareto analysis
1212
In financial decision, what does financial analysis considers
Profitability measurement and business risks
1213
What specifics does the vision gives to an organization
Description of where the business will be in the long term
1214
In a risk assessment, how is risk ranks measured
Low, Moderate High Critical
1215
When does an EPS need to do the advance in executive protection
Before the principal arrives
1216
What training may promote innovative approaches to work tasks
External training
1217
In designing primary and alternative EOC/CMC what should be the primary consideration
They should be able to accommodate the CMT and should provide redundant communication capabilities
1218
Which method of data collection involves observations, interviews, checklist and reviews of historical data
Evidence-based methods
1219
The category of security consultants that form the largest group within the consultant profession is
Security management consultants
1220
Gap analysis consists of three steps list them
Noting currently available factors Listing success factors needed to achieve future desired objectives Highlighting the gaps
1221
What does the most visible component of the EP program involved
Physical acumen
1222
What provides a basis for making decision in the context of the different conditions and outcomes
Scenario analysis
1223
What is a requirement to arrive at an appropriate threat level for a particular executive
EP risk assessment
1224
What is the purpose of mutual aid association
An agreement of business and organization to assist each other by providing materials, equipment and personnel’s for disaster control during emergency
1225
What is the most effective means of preventing workplace violence for security professional
Early detection
1226
What will provide an insight into how the defined alternative differ from one another and provides a basis for considering new and improved alternatives
Decision analysis
1227
In the balance sheet what value is neither an asset or liability
Shareholders’ equity
1228
Which two ratios demonstrate how well a firm has done in making money for a reporting period?
Return on assets = net income/total assets Return on equity = net income/shareholder equity
1229
What encourages the employee to reporting incidents
Fostering a culture of integrity and honesty
1230
Who decides on the security vs convenience continuum where the executive should be and what trade off to make
The principal and the agent
1231
What is the goal of a risk assessment program
To review the risk management controls and system as well as identify opportunities for improvement
1232
What helps employees to do their job better
Internal training
1233
List three risk assessment approaches/methods
Operational risk assessment Strategic risk assessment Project risk assessment
1234
An organization that sends and e-mail to an outside organization requires what to protect the e-mail
Virtual private network (VPN)
1235
What do investigators often find is a precursor to an organization’s theft problem
A substance abuse problem
1236
Which risk assessment method is limited to uncertainties associated with existing assets, people, processes and systems-in-place
Operational risk assessment
1237
The risk of an organization is ready to bear after the risk treatment is
Risk tolerance
1238
Which sampling method requires sample selection process to be based on probability theory
Statistical sampling
1239
When evaluating the potential for intentional threats, consideration should be given to what
Presence and proximity of ‘‘hard’’ and ‘‘soft’’ targets
1240
What descriptive terms are used to describe potential likelihood and consequences of risk events during qualitative analysis
‘‘Minor’’ ‘‘Moderate’’ ‘‘Major’’ ‘‘Critical’’
1241
Any systematic technique used to understand how risk estimates and risk based decisions are dependent on variability and uncertainty in the factors contributing to risk is called
Sensitivity analysis
1242
Which theory believes that punishment or threat of punishment motivates a worker
McGregor’s theory x
1243
What is recovery time objective (RTO)
The period of time a business activities and resources must be recovered to an acceptable capability after a disruptive event, often defined in hours or days
1244
What should be established at the beginning of the risk assessment process
Risk criteria
1245
Which kind of attacks makes several direct attempts at the password of a system with the intention of compromising it
Brute force attack
1246
A non-statistical sampling method wherein samples are selected based on convenience but preferably should still be chosen as randomly as possible is
Haphazard sampling
1247
A helpful tool in evaluating the vulnerability of an asset is
Event tree
1248
When scenario analysis and event tree logic diagrams are used in data collection, what technique is being applied
Inductive reasoning technique
1249
What is the key task of the person planning and conducting the risk assessment program
To develop an understanding of the organization to be assessed.
1250
What are the main two categories of sensors
Active Passive
1251
What are less conventional and more difficult to define nature of modern day threat
Asymmetric Threats
1252
Security director should report to whom
A Key Senior Management Level Executive
1253
Criticality is measured in terms of what
Financial Cost/Currency
1254
The most important in pre-employment process is
Employer Application Form
1255
Types of techniques of communication transmission
Point-to-point, Loop, Multiplex
1256
What is common about workplace violence and drug abuse behavior
Although the rate illicit drug use is highest amongst unemployed, most drug users are employed
1257
The new task of first-line supervisor
Mentoring and advising
1258
What does it mean to divide video images to grid section
Masking
1259
Another word for business ethics
Applied Ethics
1260
Reason for non-entry technical/professional person
Blind – ad, its designed for career people
1261
What rule has been violated if a security officer is reporting to two superiors
Unity of command
1262
A person who likes to be with people, acts rather than rationalize is
Extrovert or Extroversion
1263
Which light the least re-strike time
Incandescent Halogen Florescent
1264
Lock with the highest delay
Pin Tumbler Lock
1265
Perimeter lighting should be installed to face where
Down and away from the protected area
1266
Type of space in High-Rise are
“Open” building, “Closed” building “Hybrid” building
1267
What to do during earthquake
Take cover under a desk, or table or sit or stand against an inside wall
1268
Types of light used in residence
Incandescent/Halogen
1269
Types of smoke detector
Photoelectric detector Ionization detector
1270
Personal entry control is
What you have, what you know, what you are
1271
What does plan in the PDCA implies
To define and analyze a problem and identity the root cause
1272
What is the greatest threat to an organization
Industrial espionage
1273
What determines the use of a car and driver in an EP program
Risk assessment
1274
Verifying the experience and qualification that are presented by an applicant is
Credentialing
1275
How do you handle a spent cartridge
Pick it up by the open end using tweezers
1276
Two classifications of bombs is
Explosive Incendiary
1277
Difference between safety and security is
Unintentional or natural abnormal events vs malevolent intentional human caused event
1278
The three primary products of explosion are what
Heat
1279
Forms of explosions are what
Mechanical Chemical Nuclear
1280
An illegal means of obtaining information about a competitor outside stealing it from him is
Performing reversed engineering Directing an agent to gain employment with a suspected company under false pretenses. Directing an agent to befriend employees of such company to collect information on proprietary manufacturing process. Recruiting an employee of the company to provide information in manufacturing process. Fake job interviews
1281
A key element of the ISS risk assessment model is
A thorough study of existing and projected threats
1282
What ensures there is no gap in plan maintenance of the emergency management structure
An alternate designate, for the designated organization’s emergency coordinator
1283
A glazing material composed of two sheets of ordinary glass bonded in a middle layer of plastic sheeting materials thus mitigate against blast force
Laminated glass
1284
What is based on the risk assessment and should consider both tangible and intangible assets
Cost benefit analysis
1285
Security risk control and counter measures should be measured using what
Effectiveness and efficiency
1286
What is the greatest mistake of an inexperienced investigator when interrogating a suspect
Neglecting the skill of listening
1287
What type of questions can investigator ask an interviewee that will make him continue to talk more
Open-ended questions/narrative type questioning
1288
What light is good for clearer and colourful video surveillance system (VSS)
Metal halide
1289
Taking your money to the bank is what kind of risk measure
Risk Transfer
1290
Surveillance, undercover and misconduct are what investigation
Constructive incident investigation
1291
Function of “check” in PDCA is
Confirm outcomes against plan; identify deviation and issues, (quality control)
1292
What information is contained in account payment
Account on which an organization owns money
1293
EPS Choreography is
“Working the principal”
1294
The principal and agent must agree on what
Where on the continuum the executive should be and what tradeoff to make
1295
The most important task of an EPS
Preventing and avoid danger
1296
The relationship between public and private policing should be
Structural and contractual/institutionalize, coordination and cooperation
1297
Why the response to alarm by police is reduced
Increase in the number of alarm users
1298
Security manager should report
A key senior level executive of the organisation
1299
List key success factors of a security manager
Ability to build sustainable competitive advantage Demonstrated integrity and ability to maintain principles under internal and/or pressure High-quality analytical skills, management experience Exceptional relationship management competence Qualitative experience in strategic planning and policy development.
1300
What provides a behavior based protection to the computer or server
Host intrusion protection system (HIPS)
1301
What device operates on a computer or server to be able to look at both signature and behavior to protect the machine
Host intrusion protection system (HIPS)
1302
List statements made by a deceptive person
Offers specific denials Avoids realistic words Qualifies answers Uses religion or oaths to support statements Gives delayed and evasive or vague answers
1303
When a company lose $50, and makes a 5% profit margin, what amount of sales in dollar will be required to write off the stolen amount
: $1000 i.e 𝟓𝟎/𝟓 -: 5/100 = 50/1 x 100/5 = = $1000
1304
Why employ employees with integrity
Best way to reduce internal theft in an organization
1305
Taking your money to the bank is what kind of risk measure
Transfer
1306
What is personified in the hard-driving authoritarian manager
Theory x
1307
Security officer should be managed by who
Asset protection management and not placed as the sub-operation of another department
1308
Giving responsibility with commensurate authority and holding the employee fully accountable for the use of the authority is
Delegation
1309
Security manager assigned operational responsibility to a security officer is what
Delegating authority to see how he handles responsible decision making and security oversight
1310
Gaps in employment history of more than what period should be investigated
One-month/30 days
1311
In collecting which evidence/exhibits would you use tweezers
Spent cartridge
1312
What is the most common in security function in modern time
Access control
1313
Surveillance is
An overt monitoring to prevent a crime or misconduct
1314
VSS (Video surveillance system) at the Harbor is
Standard lens (black and white)
1315
A common characteristics of an inexperienced investigative Interviewer is
Impatient
1316
What will help the CCTV function better
Operator’s capability
1317
When conducting an interview what is the initial thing to do
Establish favorable rapport
1318
The future of policing is
Proprietary supervisor oversee contract front-line officer
1319
A manager that gives a task to someone immediately under him did so because he wants to do what
Motivate his subordinate
1320
Which sensor is passive, covert, and can detect a change in electrostatic field when someone touches the protected object
Capacitance
1321
The behavior spectrum of workplace violence
Harassment Intimidation Discrimination
1322
For effective security measure of critical information, which security is best
Operation security
1323
What security measure do you provide for an investigator
Operational security
1324
How can a security manager convince management to approve his security
Talk about return on investment measurable in financial terms
1325
In Investigating embezzlement, where to check the transaction of inflow and outflow over a period of time
The account payable and account receivable
1326
Before conducting a security program what must you check
The organization strategy and goal
1327
What the difference between vulnerability and risk assessment
Vulnerability assessment is the process of identifying and quantifying weaknesses.
1328
Which pattern can give the best insight to an investigation
Asking for the interviewee's understanding of the reason for the interviews
1329
Which is the action of inexperienced investigator
Neglecting the skill of listening when interviewing suspects
1330
How does an organization determine on whether to outsource an investigative unit
Cost benefit analysis
1331
Statements of a deceptive person
Offers specific denials Avoids realistic words Makes seemingly irrelevant comments, Gives delayed, evasive or vague answers Qualifies answers or uses religion or oaths
1332
An organization that has an alternative business location is called what
Hot Sites
1333
When you put your item in a locker of a bank before going in, could be described as
Risk Avoidance
1334
Which type of risk is achieved when EPS diverts The principal from riot scene
Risk avoidance
1335
The threat that directly attacks password and also lure system user to reveal their Credential are what and what
Social Engineering/Brute force attack
1336
What best describes asymmetric threats control
This is the bypass/sabotage of a victim Strengths while targeting their vulnerabilities
1337
CPTED is aimed at achieving what
Deterring Detecting and Delaying likely offenders
1338
Why should a Security manager decides to hire an insurance broker
Reduce risk by transferring the risk to the insurer
1339
When an organization put in place protection in-depth in concentric layers, this could also be described as
Redundant schemes
1340
Strategic planning, provision of resources, policy emplacement is a responsibility of
Managerial task/actions
1341
A personnel is being considered for a supervisory and managerial role which should be factors to consider
Work on several projects, Work on task outside position requirements, Contribution towards improvement in the business process, Leadership
1342
A personnel has more than two superiors to report to which rule has been violated
Unity of Command
1343
A supervisor has over 30 personnel’s to supervise, what are the challenges with this?
Span of Control
1344
What motivates a worker to keep his work despite unfavorable working condition and whose theory
Job Content (motivators) Herzberg’s Motivation - Hygiene theory
1345
The recommended way to pick a bullet Shell is
Picking it up by open end using tweezers
1346
The last stage of the recruitment exercise
Back grounding
1347
Who should be interviewed last
The offender or offending group
1348
Concentric layers of security is also known as what
Protection - in-depth/Redundant Scheme
1349
Types of exterior lightings are
Streetlights, Searchlights, Floodlights, Fresnel and High mast-lightening’s
1350
Best light for residence
Incandescent/Halogen
1351
The interior of a safe to control temperature requires
Moisture
1352
How much sales is required to cover a loss of 5% on a profit of $50
𝟓/𝟏𝟎𝟎 X 𝟓𝟎/𝟏 = 𝟏𝟎𝟎/𝟓 X 𝟓𝟎/𝟏 = 100 X 10 = $1000
1353
EPS that noticed riot and takes another route is doing what
Avoiding danger
1354
The construction of container to store sensitive information should be based on
General Service Administration (GSA) Approval
1355
Why lower management prefer bottom-up budget
They had a stake in developing it/they had an input in its development
1356
When management generates an expenditure and allocates money to lower management what type of budgeting practice is described as
Top-down budgeting
1357
In a technical surveillance situation, what should the security manager consider
Offices, meeting rooms be inspected for technical surveillance vulnerabilities He should also obtain floor plans and details the sites telecommunication and audiovisual infrastructure
1358
Most effective protection approach for a IT environment is
Integrating physical, procedural and logical protection measures in a layered approach
1359
A building with wooden structure without windows experiencing temperature changes in the morning and evening all through the summer, which sensor detection will be most affected when applied
Passive infrared (PIR)
1360
When is a victim most likely to be kidnapped?
On transit/when travelling
1361
The decision to outsource and outsourcing approach of the investigative unit should be based on what
Cost benefit analysis and projected overall investigative needs
1362
Who should be interviewed first during investigation
Persons who are not likely to be readily available later
1363
Putting sensitive documents in a safety deposit box of a bank is which form of risk option
Risk transfer
1364
The most cost-effective emergency management response drill
Tabletop exercise
1365
Minimum time for lock delay during emergency is
15 – 30 second
1366
Why is the facility shutdown during emergency
Speed the recovery operation
1367
What cable is used for CCTV connection of 2,200m
Fiber optics
1368
Criticality is measured in
Financial terms/Currency/Money
1369
A means of proactively managing risk before they can affect planned objective is
Root Cause Analysis
1370
To identify what failure mode gave rise to the loss event to support future preventive actions describes what
Root Cause Analysis
1371
Words, phrases, logo or graphic symbols to distinguish products describes
Trade Mark
1372
A property right in an original work of authorship giving the holder the exclusive right to reproduce, adapt and display the work defines
Copyright
1373
What is used to identify the condition that initiate the occurrence of an undesired activity
Root Cause Analysis
1374
Information that has the government grant of a right to exclude others from making an invention for a specified period describes what
Patent
1375
Which CPTED solution is also known as target hardening
Mechanical measures
1376
Removing data on a storage medium before it is reused describes
Sanitizing
1377
When body cells adjust to the presence of drugs is
Chemical dependency
1378
Tapping into a communication line is
Inductive coupling/Direct coupling
1379
Best source of information for employment screening
Application form
1380
When the adversary strikes, removing the principal from harm’s way is based on
EPS conditioned response
1381
Definitive statements proves what
Truthfulness
1382
Family of drugs for opium and cocaine is
Schedule II/Narcotics
1383
Initiating a general discussion before direct questioning to accomplish rapport uses
Hidden persuaders
1384
Who implements disciplinary action after an investigation in an organization
Organizations decision maker/Human resources
1385
How do you get management support for an investigation
Show value to the organization and demonstrate that the unit pays for itself
1386
Why a woman stays in an abusive relationship
Economic assistance
1387
A written coverage to protect the employer from the dishonesty of the employees describes what
Fidelity coverage
1388
To guarantee the performance of some obligation by an individual requires
Surety coverage
1389
What is meant by chain of custody in evidence collection
All persons who came in contact with the evidence from collection to storage
1390
When employees are manipulated to give up important information and when the system is remotely accessed without authorization is known as
Hacking/Social engineering
1391
The most expensive part of an investigation process
Cost of personnel and outside services
1392
Why do you inform the applicant that you want to conduct a credit check during background screening
Encourages applicants to be honest because they know that the information they provide will be scrutinized
1393
Difference between covert surveillance and overt surveillance
Covert surveillance is hidden/unknown method of gathering intelligence unknown to the subject. Overt surveillance is open method of preventing crime or misconduct.
1394
Whose theory connects job motivators to work conditions
Herzberg
1395
What are the characteristics of post orders
Each order deals with a single subject Each order is as brief as possible Each order is written in simple, easy to understand terms. Orders are indexed in details
1396
Which sensor works with Doppler principle
Microwave
1397
HIPS is different from IDS, how?
HIPS operates on the host system such as computer or server
1398
The qualities of a security manager
Business process enabler Creative problem solver Subject matter expert Risk manager Strategist Relationship manager Executive management leadership Governance and Team member
1399
Giving responsibility with commensurate authority and holding the employee fully accountable for the use of that authority describes what
Delegation of authority
1400
The crisis management team should be as part of the emergency planning do what else
Review, update and test the plan regularly
1401
In setting up a proprietary investigative unit, the most important aspect to consider is
Selecting professional personnel’s
1402
A technique used to disguise digital data during transmission is
Encryption
1403
Copies of investigative report should be distributed to whom
Only to those with a need-to-know
1404
A critical onsite examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excess in determining the protection needed to make recommendation to improve overall security is the definition of
Security survey
1405
Between the perimeter barrier and the exterior structure should be a clear zone of
20 feet
1406
The intrusion detection system that is used on safes, desk, vaults is
Capacitance
1407
The least in counter measure in terms of expense
Procedure
1408
A barrier considered the most resistant to a blast explosion
Reinforced concrete
1409
The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives of behavior is known as
Maslow theory
1410
The difference in the physical stock of products and the number recorded in the book is called
Shrinkage
1411
Many experts agree that the most important deterrent to internal theft is
Employees perceived chance of being detected or fear of discovery
1412
According to estimates, about one third of all business failures are caused by
Theft from employees
1413
Store inventory shortage are mainly caused by
Employee theft
1414
Outsourcing of investigation unit is for what
Cost benefit analysis Projected overall investigative need
1415
The possibility of loss resulting from a threat is
Risk
1416
A model for analyzing proposed organizational project is
SWOT
1417
How would you demonstrate cost effectiveness to senior management
Show return on investment measurable in financial terms
1418
Risk ratios are
Current Quick Equity
1419
The three main categories of expenditures when developing security budget are
Salaries Operational Capital
1420
What the business currently entails and where its needs to be in the future is the first step in developing what
Organizational Strategy
1421
The only way the security operating function can justify continued funding from senior management is
Demonstrate that the real cost to the enterprise would be greater if the level of the support for the security operation is reduced
1422
The second most valuable resource of an organization is
Corporate knowledge
1423
Early warning signs that can lead to violence are
Harassment Intimidation Discrimination
1424
The department that promulgates corporate policies and procedures is
Human Resource
1425
A coverage provide only for losses that are reported during the period the policy is in force is
Claim-made form
1426
The first and most crucial question in defining business purpose and mission is
Who is the customer
1427
The most valuable corporate resource is
Employees
1428
What are legal approach to asset protection
Copyrighting Trademarks Patenting
1429
Facility characterization is done during
Risk analysis
1430
Assess-protect-confirm-improve model is more generally known as
PLAN-DO-CHECK-ACT
1431
When recruiting, skill that will increase the candidates likelihood of success are referred to as
Indirect skills
1432
The most frequent and costly forms of dishonesty the security professional will likely encounter is
Theft and fraud
1433
A mechanism that will significantly increase the chances of detecting the vulnerabilities that leads to employee theft and fraud is
Clear organizational policies, Procedures and Practices
1434
The best way to recruit a good candidate is
Internal recommendation
1435
The most consistent predictor of theft in all industries is
Employee’s perceived chance of being detected
1436
An advantage of which budgeting forces a manager to consider alternative ways of getting the job done
Zero-based
1437
The type of risk occurrence that can only result in loss is
Pure risk
1438
In bottom-up budgeting where does the broad base of information come from
Front-line managers
1439
To impose performance goals on lower management, which Budgeting approach is recommended
Top-down
1440
The ISO committee responsible for societal security is
ISO/TC 223
1441
Most management systems are based on what model
Plan-Do-Check-Act
1442
The fundamental template for decision that define and support an enterprise long term goal is
Organizational strategy
1443
What is the vulnerability concern about critical infrastructure
Natural and intentional attack
1444
The process of performing an analysis of potential areas of loss, their probability and their impact to the corporations is
Risk analysis
1445
In the insurance world ‘‘The cause of a possible loss’’
Peril
1446
Losses covered by insurance policies are
Direct loss Loss-of-use Extra-expense-losses
1447
Making sure the human and non-human resources are put into place is which basic function of managing
Organizing
1448
What kind of litigation has exploded in the security field
Liability
1449
Important factors related to the conduct of security officer are
Courtesy Restraint Interest
1450
The document/Process that supports long term goals is
Organizational Strategy
1451
A private system in place to guide the implementation of SOX
Hotline
1452
Services acquired under informal agreements for which money is owed by an organization is
Accounts payable
1453
Integration of traditional and IT security functions is
Convergence
1454
This covers items that the organization monitors and expects employees to conform to
Policies
1455
What are performance characteristic of intrusion sensors
Probability of detection Nuisance alarm rate Vulnerability to defeat
1456
This communicates business functionality and operational methods
Mission
1457
A closed loop around an area that needs protection is
Perimeter area
1458
Which are the integral parts of a mechanical lock
Revolving device Dead Bolt/Latch Unlocking device
1459
If a security supervisor is confused because he is being told to do one thing by one supervisor and another by a security manager, which basic principle is probably being, violated
Unity of command
1460
To put an interviewee at ease, at the beginning of the interview, the type of questions should be
Close-ended
1461
If a security supervisor is having problems coordinating the activities of his 30 subordinates, which basic principle is being violated
Span of control
1462
The goal of an interview is
Get truthful information
1463
When actual work practice need to be compared with required state but routine auditing is not possible requires which time of investigation
Undercover investigation
1464
Setting up a business as a front where stolen goods are bought and sold is
Sting operation
1465
A simple and systematic method of employing safeguards to protect critical information is
Operation security
1466
Apart from the basic skills, an investigator should have which other skill
Maths skill
1467
A responsibility that is often neglected but is important to the operation of the investigation unit is
Setting objectives and monitoring
1468
What are the components of risk
Threat Consequence Vulnerability
1469
Passive sensors typically respond to which types of energy
Vibration Infrared energy Acoustic activity
1470
Another name for password cracker is
Brute-force
1471
A key principle of the vulnerability assessment is
Establish initial baseline
1472
To protect an interior space against breakthrough of a defined point such as skylight, sensor most appropriate is
Boundary sensor
1473
The building blocks of a PPS
People Software Hardware
1474
A card that contains a sets of wires in a unique formation is
Wiegand card
1475
What elements combine to create functional integration
Detection Delay Response
1476
The simplest form of line-supervision is end-of-line
Resistor
1477
What is the most important factor in CCTV camera choice
Sensitivity
1478
Staffing decisions should be made against what
Detailed job requirement analysis
1479
A class of sensor best suited to protecting an internal environment with multiple points of possible entry is
Volumetric sensor
1480
This uses a plain-text mechanism and connects with a control panel
Magnetic strip
1481
Examples of smoke sensors are
Photoelectric/Ionization
1482
A common method of evaluating how well the PPS meets its goals and objective is
Vulnerability analysis
1483
Defalcation specifically deals with the misappropriation of trust funds entrusted to whom
Fiduciary
1484
Verifying system performance against defined threat is the basis of what
Vulnerability assessment
1485
A situation where your body cells adjust to the presence of a drugs is
Dependency
1486
What drugs causes hyperactivity, dilated pupils, suppresses sleep and appetite
Amphetamines’
1487
What are classes of adversaries
Outsider Insider Outsider in collusion with insider
1488
What are steps that characterize a system approach in a security context
Assessment of vulnerability Implementation of countermeasure Review of effectiveness
1489
What should be done last in the employment process
Back grounding
1490
Workplace IMT includes who
Senior management representative Senior human resource manager Legal representative who is familiar with labour laws Senior asset protection manager