Practice test Flashcards
The property owner in a complex decided to reinforce the privacy of the children’s playground by adding a security patrol to deter drug sales, overt CCTV surveillance, perimeter fencing and an access controlled gate. In CPTED this is best known as?
Legitimate activity support
In the procurement stage, an invitation for bids will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is best described as?
Design specification
The product of the potential loss from an event and the likelihood of the event is best described as?
Annual loss expectancy
The process of assessing security-related risks from internal and external threat to an entity, its assets and personnel, is best described as a?
Risk assessment
ABC installed a perimeter fence at the local warehouse. Which best describes the application of this measure?
Access control and deterrence
ABC installed new computing devices and software to better protect the organization from cyberattacks. The customer should require the integrator to develop a plan to calibrate and test all components, verify data transmission system operation, install the system, place the system in service and test the system. This process is best described as?
Site acceptance testing
What can be considered the keystone for continual improvement in the organizations ability to effectively manage the security of its information assets?
ISO/IEC 27001:2005
The practice of borrowing capital to purchase assets that can increase revenue is called?
Leveraging
When conducting a security survey, what should be a focus of the assessment?
Vulnerabilities
What is considered the “poor man’s nuclear weapon?”
Chemical and biological weapons
ABC is developing a business impact analysis (BIA). After understanding the enterprise business and general risk environment, what is the first step of determining the risk?
Identifying and prioritizing the assets needing protection
This process corrects faults and returns the system to operation after a hardware or software component fails. This is?
Remedial maintenance
A security weakness or practice that may facilitate or allow a threat to occur is?
A vulnerability
This process uses the risk criteria and outputs to determine what risks are acceptable with existing risk treatments and which require additional risk treatment?
Risk evaluation
CPTED measures which employ good space planning to reduce inhabitant conflicts by considering compatible circulation patterns, including a well-defined building entrance and arranging courtyards, patios and porches for unobstructed lines of sight describes?
Natural measures