Practice Exam Question 4 Flashcards
These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called:
A. Details diagrams
B. Plan drawings
C. Elevation drawings
D. Riser diagrams
D
Undesirable activity thrives in spaces that residents and management fail to claim and therefore mainly remain abandoned. A crime hotspot might be eliminated if police or security establish a presence there or residents, employees or the public occupy the space, providing what is known in CPTED as:
A. Legitimate activity support
B. Management and maintenance support
C. Natural measures
D. Mechanical measures
A
Which of the following terms best meets this description? ‘This process corrects faults and returns the system to operation after a hardware or software component fails’.
A. Remedial maintenance
B. Preventive maintenance
C. Emergency maintenance
D. Commissioned maintenance
A
‘This means that no matter how an adversary attempts to accomplish the goal, effective elements of the PPS will be encountered’. This is best referred to as which of the following?
A. Conceptual design criteria
B. Performance based design
C. Balanced protection
D. Design criteria
C
‘This statement includes the specific details that all involved parties can understand what needs to be done, highlighting specific goals the organization wants units to achieve’. This best describes:
A. Mission Statements
B. Vision Statements
C. Strategic Plans
D. Organizational Objectives
D
This organization prepares safety standards primarily as a guide to security device manufacturers, and then certifies whether devices submitted to the laboratories for approval meet those standards. This organization is called:
A. Underwriters Laboratories (UL)
B. International Standards Association (ISO)
C. American National Standards Institute (ANSI)
D. American Society for Testing and Materials (ASTM)
A
A device used to detect deception through stress recorded by voice modulations is also known as a:
A. Polygraph
B. Lie detector
C. Psychological stress analyzer
D. Truth serum
C
The following theory asserts that managers should avoid quick fixes. Manipulating hygiene factors may alleviate dissatisfaction but will not result in a state of satisfaction. Allowing an individual to reach a state of satisfaction requires changes in the work content itself, such as increased autonomy or responsibility. This is best described as part of which of the following theories?
A. Maslow’s Theory
B. McGregor’s Theory
C. Hertzberg’s Theory
D. Hertzberg’s Theory
C
SWOT is often used as an assessment tool for developing an organizational strategy.
What does the acronym SWOT stand for?
A. Strategy, Weaknesses, Opportunities, Threats
B. Strategy, Weaknesses, Operations, Threats
C. Strengths, Weaknesses, Opportunities, Threats
D. Strengths, Weaknesses, Operations, Threats
C
‘Employment of services, equipment and techniques designed to locate, identify and neutralize the effectiveness of covert technical surveillance devices’ is the definition for which of the following?
A. Technical surveillance countermeasures
B. Contracted investigation services
C. Technical Security Services
D. Contracted counter-surveillance
A
A key element in the information asset protection (IAP) risk assessment process is a thorough study of existing and projected threats. What are the categories?
A. Historical, current and future threats
B. Man-made, natural and intentional
C. Intentional, natural and inadvertent threats
D. Internal, external and government
C
Information warranting protection must be appropriately identified and marked. Various levels are used to distinguish the degree of sensitivity or the degree of protection warranted: confidential, restricted, limited, non-public, etc. Who is best suited to define the security level?
A. The Security Manager
B. The IT Manager
C. The IT Security Manager
D. The originator of the information
D
This defines why the business exists, is essential for developing organization-specific management practices and how it will maintain itself as a profitable, viable entity not only in the moment but also three to five years out. This is called a:
A. Organizational strategy
B. PEST plan
C. STEP strategy
D. SWOT plan
A
Which of the following statements concerning interviewing and deception is TRUE?
A. A single word or behavior characteristic automatically means a person is lying or telling the truth.
B. The assessment of a subject’s truthfulness is based on a single behavior pattern.
C. Some behavioral characteristics that suggest deception may also be displayed by a truthful subject.
D. Deceptive persons answer questions in a direct, straightforward, spontaneous, and sincere manner.
C
These need not be registered with any outside agency, so the owner can maintain a greater degree of control over the asset. The owner must be able to prove that the information added value or benefit to the owner, was specifically identified, and the owner provided a reasonable level of protection. This is called which of the following:
A. Patent
B. Copyright
C. Trade Secret
D. Trademark
C
In addition to the five (5) functions of management, managers should be guided by two (2) other principles, which are:
A. ‘Continuous improvement’ and ‘Customer service’
B. ‘Quality’ and ‘Who is the customer’?
C. ‘Continuous improvement’ and ‘Performance metrics’
D. Quality’ and ‘Performance metrics’
B
Network devices typically communicate using a worldwide internet standard for communication, also called:
A. TCP/IP
B. DNS Servers
C. WIN Servers
D. Web Proxies
A
Which of the following statements concerning security industry standards is not true?
A. Standards address a product, service or process.
B. Standards are mandatory and require compliance.
C. Regulation may require compliance with a standard.
D. Customers more easily judge product quality if it conforms with standards.
B
Which of the following statements is TRUE concerning employee dishonesty?
A. Most employees who steal from their employers consider themselves dishonest.
B. Employees involved in theft have usually been involved in other prior misconduct at the company.
C. Most employees would steal from their employer if given the opportunity.
D. Employers have no control over factors that contribute toward employee theft and fraud.
B
Which of the following is not one of the six steps in performance-based analysis?
A. Create an adversary sequence diagram
B. Conduct a path analysis
C. Perform a cost benefit analysis
D. Perform a scenario analysis
C