Practice test Flashcards

1
Q

The property owner in a complex decided to reinforce the privacy of the children’s playground by adding a security patrol to deter drug sales, overt CCTV surveillance, perimeter fencing and an access controlled gate. In CPTED this is best known as?

A

Legitimate activity support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the procurement stage, an invitation for bids will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is best described as?

A

Design specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The product of the potential loss from an event and the likelihood of the event is best described as?

A

Annual loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of assessing security-related risks from internal and external threat to an entity, its assets and personnel, is best described as a?

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ABC installed a perimeter fence at the local warehouse. Which best describes the application of this measure?

A

Access control and deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ABC installed new computing devices and software to better protect the organization from cyberattacks. The customer should require the integrator to develop a plan to calibrate and test all components, verify data transmission system operation, install the system, place the system in service and test the system. This process is best described as?

A

Site acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can be considered the keystone for continual improvement in the organizations ability to effectively manage the security of its information assets?

A

ISO/IEC 27001:2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The practice of borrowing capital to purchase assets that can increase revenue is called?

A

Leveraging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When conducting a security survey, what should be a focus of the assessment?

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is considered the “poor man’s nuclear weapon?”

A

Chemical and biological weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ABC is developing a business impact analysis (BIA). After understanding the enterprise business and general risk environment, what is the first step of determining the risk?

A

Identifying and prioritizing the assets needing protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This process corrects faults and returns the system to operation after a hardware or software component fails. This is?

A

Remedial maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security weakness or practice that may facilitate or allow a threat to occur is?

A

A vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This process uses the risk criteria and outputs to determine what risks are acceptable with existing risk treatments and which require additional risk treatment?

A

Risk evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CPTED measures which employ good space planning to reduce inhabitant conflicts by considering compatible circulation patterns, including a well-defined building entrance and arranging courtyards, patios and porches for unobstructed lines of sight describes?

A

Natural measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This managerial task involves connecting different people and functions to achieve cooperation to enable a stated goal to be achieved. It involves a broader view of what is happening to synchronize different departments toward a common end goal?

A

Coordinating

17
Q

A possible source of danger or conditions (physical or operational) that has the capacity to produce a particular type of adverse effect can be described as?

A

A hazard

18
Q

When selecting. video surveillance system it is important to use a?

A

Systems approach

19
Q

A management style where managers and supervisors guide their employees toward achieving organizational objectives and workers enjoy a higher workplace morale and are happy they work with management toward success.

A

Democratic

20
Q

Before conducting a risk analysis - particularly a quantitative one - who should determine the evaluation levels?

A

A multi-disciplinary team of subject matter experts considered stakeholders in the assessment.

21
Q

An interviewer’s “attentiveness, acceptance, detachment and patience” best describes?

A

Active listening

22
Q

Which standard specifies requirements to implement, maintain and improve a management system to protect against, prepare for, respond to, and recover from disruptions when they arise?

A

ISO 22301:2019 Business Continuity

23
Q

A specific description of where the business will be in the long term, that conveys a general understanding of the business, its culture and its future goals?

A

A vision statement

24
Q

How Long should the UC operative be kept in place?

A

As long as possible

25
Q

A comprehensive model for theft and fraud prevention uses programs to educate workers about the nature, types and most vulnerable areas of losses in the organization using written policies, accountability systems and awareness programs. Which element of the program best describes this description?

A

Prevention

26
Q

What are considered the most important elements of a violence risk assessment program?

A
  1. Behavioral recognition;
  2. Notification;
  3. Assessment; and
  4. adequate response