Practice Exam Question 5 Flashcards

1
Q

There are various ways to organize supervision. One such principle states that workers should report to only one ‘boss’. Which principle is violated in matrix organizations?

Chain of command
Span of control
Unity of command
Incident command

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agryris theorized that traditional organizational principles, structures and procedures are incompatible with the mental health of employees. According to his Theory of Adult Personality, there are several things a manager could do to correct this mismatch. Which of the following is NOT one of those?

Simplifying procedures
Increasing task variety
Increasing task responsibility
Using participative decision-making

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following factors, besides relative value, and criticality, is considered when determining asset value?

Net value
Loss expectancy
Replacement value
Location

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threats can be characterized by the formula:

Threat = Capability x Intent
Threat = Frequency x Probability
Threat = Impact x Criticality
Threat = Risk x Impact

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be considered/assessed as one of the first steps before developing the security plan for an organization?

Staffing
Budget
Culture of the organization
History

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some managers believe they have the knowledge, skill, ability, and time to write every lesson plan and deliver every class.
According to Hertig, this belief can evolve into the ….

Overtraining syndrome
Teacher syndrome
Frog syndrome
Floating theory

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two major components in most mechanical locks?

The bolt & the key
The cylinder & the tumbler array
The coded mechanism & the fastening device
The deadbolt & the latch

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best meets this description?
‘The mixture of people, systems and techniques required to carry the project to successful completion’.

Project analysis
Project integration
Project management
Project alignment

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of post-implementation test is used to test a complex system that is broken down in separately tested segments?

Partial system test
Preliminary test
Subsystem test
Limited scope test

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A successful security design recognizes technological developments and integrates which three elements?

Architectural aspects; security systems; and operational factors
Architectural aspects; personnel; and effective PPS
PPS; personnel and procedures
PPS; personnel and security awareness programs

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of bond provides protection against failure to live up to the contractual obligations?

Fidelity bond
Surety bond
Contract bond
Promissory bond

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements best describes the “statement of work”?

Details what work should be included in the contract
Outlines the invitation for bids and the specification list
Outlines the list of specific equipment and software along with costs
Outlines the performance criteria and specifications

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should the company be prepared to use should its selection of qualified contractors be challenged?

The entire request for proposal (RFP)
Written selection criteria and results documentations
The (draft) agreement and terms & conditions
The references of the selected contractor

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which concept can be used to analyze the need for security personnel in a physical protection system - for example for alarm assessment?

The ‘four eyes principle’ concept
The ‘necessary human being’ concept
The ‘linking pin’ concept
The ‘human back-up’ concept

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When designing security for an elementary school, classrooms should have a clear unobstructed view of entry roads.
In CPTED, this describes:

Traffic calming
Mechanical surveillance
Natural surveillance
Natural access control

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When should a project team, involved in selecting security countermeasures, consider supplementing the team with outside consultants?

When a project has a unique purpose and an explicit goal to be completed on-time
When the skills needed are not available within the project team
When a project had a primary sponsor or customer who provides funding
When a project is temporary

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In your company’s new fulfillment center, concrete planters with steel bars will be used as vehicle barriers. Which K-rating would you require to stop a 6.804 kg / 15.000 lb. vehicle travelling at 80 kph / 50mph?

K4
K8
K12
K24

A

C

18
Q

Which of the following processes places emphasis on evaluating vulnerabilities?

Risk Assessment
Security Survey
Loss Event Likelihood Profile
Loss Event Impact Profile

A

B

19
Q

Which of the following is suggested as part of evaluating an inadvertent threat?

Long-term data collected on weather and other natural hazards, terrains, and environments
Evaluate information provided by neighboring businesses for natural events which have caused losses
Unexpected natural events can occur, so some degree of all-hazard preparedness is evaluated
Utility interruptions, closure of access routes, unwanted attention, or traffic, full or partial operation shutdowns and productivity disruptions

A

D

20
Q

Which of the following measure best meets this description?
“These are made of reinforced fabrics providing protection from flying glass and materials in an explosion.”

Window film
Window bars
Tempered glass
Blast curtains

A

D

21
Q

Implementing target hardening such as security gates, improving training for security officers, additional video observation CCTV, or barriers would be part of which risk mitigation strategy?

Risk Transfer
Risk Avoidance
Risk Acceptance
Risk Acceptance
Risk Reduction

A

D

22
Q

When an adversary defeats an access control point (for example the main entrance) to avoid detection, this is best described as:

Attack by deceit
Technical attack
Direct physical attack
Indirect physical attack

A

C

23
Q

A magnetically operated switch using a balanced magnetic field, designed to detect the opening of a secured door, window, or other point of entry. In addition, it detects attempts to defeat the switch by substituting a magnetic field and may have provisions for internal adjustments and detection of switch tampering attempts.
This best describes which of the following?

Microwave detection devices
Passive Infrared detection devices
Position detection devices
Vibration detection devices

A

C

24
Q

Business ______ refers to the absorptive and adaptive capacity of an organization in a complex and changing environment.

contingency
continuity
resilience
convergence

A

C

25
Q

To conserve valuable resources, encourage information sharing, eliminate duplication of effort, and effectively reduce crime, it is customary for the local police service’s crime prevention programs to bring together local law enforcement and various local security organizations from industry and businesses to focus on specific high-profile crime issues. This type of joint effort is best described as:

A force multiplier
Crime prevention
Mutual aid
Cooperative policing

A

A

26
Q

Which light sources can be categorized in the high-intensity discharge (HID) family of lamps?

Incandescent, Fluorescent, and Induction
Metal halide, Mercury vapor, and High-pressure sodium
LED, Low-pressure sodium, and Halogen
Quartz halogen, Mercury vapor, and Low-pressure sodium

A

B

27
Q

Adoption of ESRM propels the security program towards …

… lower risk levels
… reduced security costs
… a higher level of risk awareness
… constant improvement

A

D

28
Q

When implementing ESRM, security professionals should have a comprehensive understanding of four elements regarding the context in which the organization operates:
Mission and vision (1); Core values (2); Operating environment (3). What is the fourth one?

Risk appetite
Stakeholders
Governance
Mitigation

A

B

29
Q

What is the purpose of a business impact analysis (BIA)?

To assess and prioritize events that interrupt planned business activities, operations, or functions
To assess and evaluate the effects of uncertainty on achieving an organization’s business objectives
To assess and prioritize the impact on the core-business and the financial consequences of a disruption
To assess and prioritize organizational activities and the resources required to deliver products and services

A

D

30
Q

ESRM is a strategic approach to security management that ties an organization’s security practice to its overall strategy using globally accepted, established risk management principles.
When following the ESRM strategic approach, who has the responsibility for final security decisions?

The Chief Security Officer
The Chief Executive Officer
The asset owner
The departmental head

A

C

31
Q

As security manager of an industrial site, which methodology would you use in a security assessment conducted in the form of a penetration test?

Inside-Outward methodology
SWOT analysis methodology
Outside-Inward methodology
Functional (security discipline) methodology

A

C

32
Q

As the Senior Security Executive of a multinational organization, you are considering outsourcing the security services function.
What would be one of the advantages of using contract staff (employed by a security services firm) in comparison to using proprietary or in-house staff for security in your organization?

More direct control over security personnel
Greater flexibility in staffing levels (up- or downsizing).
Lower turnover due to a higher sense of employee loyalty to the organization
Guaranteed risk mitigation through the outsourcing structure

A

B

33
Q

Which three zones are most commonly distinguished for PA (public address system) purposes in high rise buildings?

Covered parking areas, maintenance areas, and rented areas
Public access areas, secured zones areas, and rented areas
Parking areas, hospitality areas, and rented areas
Public access areas, maintenance areas, and rented areas

A

B

34
Q

Which of the following is an advantage of trade secrets as compared to other legal protections for intellectual property?

They do not have to be classified since they are already secret
They do not have to be “registered” or shared with any outside agency
They do not have to be renewed after the expiry date
They do not have to be included on the balance sheet

A

B

35
Q

What is the purpose of the Red Flags Rule which regulates financial institutions?

Early detection and prevention of identity theft
Early detection and prevention of insider threat
Early detection and prevention of deception
Early detection and prevention of money laundering

A

A

36
Q

Emergency management consists of four elements. One of these encompasses activities providing a critical foundation in the effort to reduce loss of life and property from natural and man-made disasters by avoiding or lessening the impact of a disaster and providing value to the public by creating safer communities. It seeks to fix the cycle of disaster damage, reconstruction, and repeated damage. Which element is this?

Preparedness
Response
Mitigation
Recovery

A

C

37
Q

The act or process of appraising or checking an applicant or information for suitability, accuracy, and/or validity, is known as:

Background vetting
Background screening
Performance appraisal
Background investigation

A

A

38
Q

Risk assessments are dependent upon the type of risk, purpose of the analysis, resource limitations, the information available to the assessor, and the availability of metrics. Risk may be assessed by using a suitable approach. Which type of analysis relies on probabilities and statistics using mathematical formulas and calculations to interpret numbers, data, and estimates?

Probabilistic analysis
Prospective analysis
Qualitative analysis
Quantitative analysis

A

D

39
Q

If the total assets on an organization’s balance sheet equals € 5 million and the equity € 3 million, what will the total value of liabilities be?

€ 5 million
€ 8 million
€ 2 million
€ 3 million

A

C

40
Q

A flaw or weakness in an information system’s design, implementation, or operations and management, including policies, procedures, processes, and internal controls that could be exploited to violate the system’s security policy, is known as an:

Information systems vulnerability
Information systems threat
Information systems risk
Information systems failure

A

A