Practice Exam Question 2 Flashcards
What are the most cost-effective barriers to be applied in a physical security approach?
Barriers made from recycled materials
Those that already exist as part of the site
Any natural barrier
Barriers with low installation costs
B
The responsibility of a person or organization to take all reasonable measures necessary to prevent activities that could result in harm to other individuals and/or their company, is known as:
Due diligence
Security by design
Due care
CPTED
C
The primary information security control types that can be implemented are:
Supervisory, subordinate, and peer
Personal, procedural, and legal
Operational, technical, and management
Mandatory, discretionary, and permanent
C
A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password, and a four-digit security pin that was mailed to him during account registration.
This is an example of which of the following?
Dual-factor authentication
Multifactor authentication
Single factor authentication
Biometric authentication
C
Separation of duties helps prevent an individual from embezzling money from a company.
To successfully embezzle funds, an individual would need to recruit others to commit an act of …… (an agreement between two or more parties established for the purpose of committing deception or fraud).
Misappropriation
Misuse
Collusion
Fraud
C
Security professionals can most effectively convince management of the need for security by quantifying and prioritizing the loss potential with presenting which of the following?
A strategic plan that applies to the entire organization
A strategic plan that applies to the security organization
A cost-benefit analysis and return-on-investment assessment
A cost-benefit analysis with business unit endorsement
A
Which of the following is the best description of tailgating?
Following someone through a door they just unlocked
Figuring out how to unlock a secured area
Sitting close to someone in a meeting
Stealing information from someone’s desk
A
Which of the following terms refers to the process of establishing a standard for security?
Baselining
Security evaluation
Target hardening
Security by design
A
Which of the following sensors relies on the Doppler frequency shift between the transmitted and received signal caused by a moving object within the energy field?
Capacitance sensors
Proximity sensors
Microwave sensors
Passive infrared sensors
C
The three (3) primary functions of a Physical Protection System (PPS) are:
Detect, delay and response
Deter, detect and response
Deter, delay and response
Detect, deter and response
A
The process designed to systematically identify and evaluate an organization’s assets based on the importance of its mission or function, the group of people at risk, or the significance of a disruption on the continuity of the organization.
Qualitative risk assessment
Criticality analysis
Risk identification
Loss event profile
C
An approach to reducing crime or security incidents through the strategic design of the built environment typically employing organizational, mechanical, and natural crime prevention methods to control access.
Security by design
Balanced security
CPTED
Security in depth
C
These are based on the investigative goals but are more specific and may be more short-lived. They are generally measurable and can be used to gauge the progress, success, or achievement of an investigative unit. They are BEST described as:
Metrics
Objectives
Strategies
Ethics
C
A joint effort where the local police service’s crime prevention programs bring together local law enforcement and various local security organizations from industry and businesses to focus on specific high-profile crime issues. Such collaboration conserves valuable resources, encourages information sharing, eliminates duplication of effort, and effectively reduces crime.
This type of effort is BEST described as a:
Force multiplier
Crime prevention
Mutual aid
Cooperative policing
A
Snowball sampling is an example of _____?
Probability sampling
Non-probability sampling
Random sampling
Systematic sampling
B
In the Plan-Do-Check-Act (PDCA) cycle, this is the most critical stage and calls for identifying and analyzing the organization’s problems and events that could disrupt operations and assets.
This step is referred to as which part of the cycle?
Plan
Do
Check
Act
A
What does a barrier’s effectiveness dependent on?
Effectiveness of response force
The type of material
The environmental conditions
How much time the barrier can delay an adversary
D
The following theory asserts that a person’s behavior is driven by basic needs at different levels and is still widely recommended to analyze individual employee motivation. It is referred to which of the following?
Maslow’s Theory
McGregor’s Theory
Hertzberg’s Theory
Motivation-Hygiene Theory
A
Which light sources have assumed the major market share of exterior lighting?
LED
Incandescent
Fluorescent
Metal Halide
A