Prep Flashcards

1
Q

Which of the following is the true about vulnerabilities in a security context

A

Vulnerabilities can arise from inadequate training and poor access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the role of criticality assessments in risk management

A

Criticality assessments prioritize asset protection based on their importance to overall business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of a criticality assessment in risk management

A

To measure how dependent the organization is on the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it essential to review a terminated employees access to company systems during a workplace violence risk assessment

A

To prevent retaliation or misuse of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which sensor technology is best suited for detecting slow moving objects at long distances

A

Microwave sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might adversaries bypass the protections of a network based intrusion detection system (NDS)

A

By encrypting malicious traffic, which the NDS cannot inspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which lock type is the most vulnerable to key duplication attacks

A

Pin tumbler lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an adversary sequence diagram, what does a low Probability of Neutralization (Pn) suggest

A

The adversary is more likely to escape after detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which rating denotes a safes ability to withstand tool based attacks at 60 minutes

A

TL-60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary goal of ESRM

A

Identifying and managing security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following scenarios would not reduce Probability of Neutralization (Pn)

A

Increased threat deterrence measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of drug investigations, how does the Controlled Substances Act (CSA) classify Ecstasy/MDMA

A

As a schedule 1 drug due to its high potential for abuse and no accepted medical use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not considered when assessing asset criticality in a security framework

A

The likelihood of a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following combinations of factors is LEAST likely to reduce an assets risk

A

High vulnerability but effective detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a recommended best practice for conducting a polygraph examination

A

Asking compound of leading questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not an essential characteristic of a well conducted investigation

A

Expediency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In what situation would a vibration sensor be the most effective choice

A

Detecting the breaking of glass in a window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is most important for ensuring the admissibility of evidence in court

A

Proper documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a responsibility of the personnel security officer

A

Investigation security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of access control measures in personnel security

A

To restrict access to sensitive areas
To prevent unauthorized entry
To protect sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How might a person with a criminal background exploit a ban the box policy to secure employment

A

By delaying the disclosure of criminal history until later the hiring process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can poorly managed crisis communication protocols lead to secondary reputational damage after the initial crisis

A

Stakeholders may receive inconsistent information leading to mistrust
Delayed post crisis messaging reduced confidence in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In high traffic environment which sensor technology would be most appropriate to avoid false alarms while maintaining security

A

Dual technology sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ is the ability of an organization to anticipate, prepare for, respond to and adapt to incremental change and sudden disruption in order to survive and prosper

A

Organizational Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which combination of factors would most likely reduce the Probability of Neutralization (Pn) in a high security systems
High detection sensitivity but poorly trained security personnel
26
Which sensor type is least affected by the presence of moving vehicles in the vicinity of a protected area
PIR sensor
27
In a threat assessment which combination of factors would reduce the over all risk
Low vulnerability and frequent audits
28
An action of event that could result in a loss; an indication that such an action or event might take place is called _________
Threat
29
Which type of sensor is often used in vaults and safes to detect unauthorized tampering or drilling
Vibration sensor
30
What is the primary reason for using electromagnetic lock in high security environment
Resistance to forced entry
31
Why is it critical to perform a business impact analysis (BIA) before finalizing business continuity plans
To determine the potential operational and financial impacts of different types of disruptions
32
Which type of top guarding is most effective in preventing intruders from scaling a fence
Inward facing concertina wire
33
In CPTED, what is the primary goal of access control
To reduce criminal behaviour by influencing movement patterns
34
Which standard is used to test and rate the security of vault doors in the event of attacks involving explosives
CEN 1143-1
35
What is the primary operational difference between bistatic and monostatic sensors in physical security systems
Bistatic sensors require separate transmitter and receiver units, whereas monostatic sensors have both components in one unit
36
Which combination of factors is most likely to reduce the Probability of Detection (Pd) in layered security system
Delayed detection systems and reduced sensor sensitivity
37
Which of the following is a not a investigative interview principle
Leading Questions
38
Which international standard sets the grading for safes and vaults to resist specific form of attacks like cutting and explosives
CEN 1143-1
39
Which investigative techniques is most likely to suffer from confirmation bias
The REID technique
40
What is the primary benefit of integrating BCMS with risk management
Enhanced organizational resilience Improved financial performance
41
Which of the following is a primary limitation of REID techniques when dealing with juvenile suspects
It risks increasing false confessions due to suspects vulnerability
42
Which of the following type of vault doors typically offers the best composition of fire resistance and security
Composite Door
43
What is the primary purpose of personnel security investigations
To verify the information provided by job applicants To identify potential risks associated with employees To ensure the trustworthiness of individuals in sensitive positions
44
What is the primary challenge of designing physical security systems for remote or isolated facilities
Delayed response times due to geographic distance from emergency services
45
Which lamp has the lowest ROI due to frequent replacement and high power consumption
Incandescent
46
Why is it critical to include terrain following sensors in perimeter security systems for high risk facilities
Terrain following sensors adjust their detection range based on the contours of the landscape, preventing gaps in coverage that adversaries could explicit
47
In laminated glass, what role does PVB (polyvinyl butyral) interlayer play during a ballistic attack
It prevents the glass from shattering completely and absorbs the energy from the projectile
48
Which type of lamp experiences the highest energy consumption relative to light output
Incandescent lamp
49
During disaster recovery planning, why is it important to consider the geographic location of backup facilities
To mitigate the risk of the same disaster affecting both primary and backup sites
50
What is the primary purpose of installing anti pass back systems in access control
To prevent employees from sharing their access cards
51
Which of the following best describes a threat in the context of risk management
A potential danger that could cause harm to assets
52
Which of the following best defines a threat in the context of risk management
A potential danger that could cause harm to assets
53
In a high security facility, which type of sensor would be best for monitoring areas with frequent foot traffic but requiring detection of unauthorized access
Infrared Beam Sensor
54
Which type of evidence is most likely to be challenged in court as unreliable
Eyewitness testimony
55
When assessing the vulnerability of a facility, which methodology is most commonly employed to determine critical points
Fault Tree Analysis (FTA)
56
Which sensor would be best suited for monitoring entry points in areas prone to significant vibrations, such as near railroads
Microwave sensor
57
Which of the following is most likely to result in a false positive when using the REID technique
Accusatory questioning without corroborating evidence
58
Which of the following combinations would reduce overall vulnerability n a critical infrastructure system
Enhancing response protocols and reducing threat likelihood
59
Which investigative method is most likely to prevent bias
Using multiple sources of evidence Blind interviewing techniques
60
______ principle says a single person can supervise only a limited number of staff members effectively
Span of control
61
Which type of vault door is specifically designed to resist attempts at forced entry using explosives
Blast resistant vault door
62
Which of the following is not an assumption of McGregor's Theory X
Employees seek responsiblity
63
Which of the following is the primary strength of using financial records in a defalcation case
Financial records directly link the suspect in crime
64
What is the primary vulnerability of high security safes with electronic locks during a power outage
Inability to unlock
65
In the investigative process, what reflects the mindset of the investigator
Simple statement of abstracts encountered
66
What makes active infrared sensors particularly effective for perimeter security in a gated community
Active infrared beams form an invisible barrier that, when broken immediately alerts security personnel to a potential intrusion
67
In a covert surveillance operation, what is the most effective way to maintain a continuous watch on a mobile target
Using both fixed and mobile surveillance teams, coordinated with electronic tracking
68
In the context of investigative interviewing, which method prioritizes eliciting information rather than extracting confessions
PEACE Model Cognitive Interview Technique
69
In a criticality assessment, what is the main factor that determines an assets protection priority
The assets role in maintaining business continuity
70
In an undercover investigation, how does the progression of interviews typically differ from regular investigation
Undercover investigations work toward those less involved
71
Which of the following sensors is designed to detect the proximity of a metallic object without direct contact
Magnetic sensor
72
Which of the following is not a common method of personnel security training
Physical Fitness Training
73
Which two factors are essential in calculating the Probability of Interruption (Pn)
Time delay and response force readiness Adversary speed and detection system placement
74
What is the main purpose of implementing security metrics
To measure security effectiveness To ensure regulatory compliance
75
What is the primary reason for installing double concertina wire on a perimeter fence
To create a secondary barrier between two lines of defense
76
How does the uses of passive sensors in a retail environment benefit the business beyond security
Passive sensors gather data on customer traffic patterns, which can be used for marketing and layout optimization
77
Which design feature of a high security vault enhances protection against crowbar or prying attacks
Anti-pry lip
78
What is the primary challenge of providing executive protection in high threat environments
Balancing overt and covert security measures
79
Which of the following is least likely to be considered indicative evidence in a criminal investigation
A suspects confession
80
What is the primary disadvantage of relying on eyewitness testimony
Subjectivity Reliability
81
Which property of glass ceramic makes it suitable for high security applications where thermal resistance is critical
It has a low coefficient of thermal expansion, making it resistant to extreme temperatures
82
In what scenario would bistatic sensors outperform monostatic sensors
In large open areas where a separate transmitter and receiver can cover greater distances
83
What is the main goal of personnel security screening
To protect sensitive information
84
Which factors are most likely to influence the severity of a vulnerability
The assets criticality and the threats capability to exploit it
85
Which of the following is a primary difference between active and passive infrared sensor in intrusion detection
Active require both a transmitter and receiver
86
Which of the following factors would most likely reduce the Probability of Interruption (Pi) for an adversary attack
Enhanced detections but low personnel response readiness
87
Which lock component engages or disengages the bolt of a vault door
Cam
88
What is the primary purpose of a root cause analysis in investigation
Preventing future incidents
89
How might poor lighting in secure areas impact access control systems
It can make biometric scanners and card readers less effective by reducing visibility
90
What is the main purpose of implementing security metrics
To measure security effectiveness To ensure regulatory compliance
91
What is the primary operational advantage of active ultrasonic sensors in detecting intruders in large, empty spaces
Ultrasonic sensors cover a larger volume of space, reducing the number of sensors required
92
Which business function is primary responsible for managing the flow of goods and services
Operations
93
Which of the following types of evidence is least likely to be used to prove intent in a criminal investigation
Testimony from expert witness
94
What is the primary goals of financial management within security operations
Ensuring operational efficiency
95
What is the primary function of probability of success (Ps) in a security systems adversary sequence diagram
To estimate the likelihood that an adversary will achieve their objective
96
In which scenario is mobile surveillance most effectively utilized
Following a suspect during their daily activities
97
What is a key limitation of traditional risk assessments in crisis management planning
They often fail to account for rapidly evolving risks like cybersecurity threats
98
Which type of glass is most appropriate to use in high traffic public areas where safety and impact resistance are paramount
Tempered glass
99
Which factor is most likely to increase the probability of detection (Pd) in a high threat environment
Increased sensor sensitivity and response times
100
Which type of cable is most suitable for perimeter surveillance systems requiring long distance data transmission without signal loss
Fiber Optic
101
How might an adversary exploit the vulnerabilities of a monostatic sensor in a high traffic facility
By moving in and out of the sensors detection range in quick succession, overwhelming the system and causing gaps in detection
102
Which factors is most likely to influence the severity of a vulnerability
The assets criticality and the threats capability to exploit it
103
Which attack method is the most effective against older combination lock safes
Manipulation
104
Which of the following is not a method for ensuring data integrity
Encryption
105
Which of the following sensors would be the most appropriate for detecting intrusions through metal doors
Magnetic sensor
106
Which of the following is a primary benefit of conducting a security audit
Identifying potential security breaches Ensuring compliance with regulations
107
Which type of lock is most vulnerable to shimming
Padlock
108
Which of the following scenarios would reduce the Probability of Neutralization (Pn)
Enhanced threat deterrence but slow response protocols
109
What is the legal risk of coercive tactics during an interoggation
Coerced confessions may be deemed inadmissible in court due to constitutional violations
110
In what situation might end to end encryption (E2EE) be less effective for protecting sensitive data
If endpoints themselves are compromised, encrypted data can still be accessed in its decrypted form at the destination
111
Which of the following would not be considered a motivation according to Herzberg
Job security
112
What is the primary function of a security badge system
To control access to secure areas
113
How might adversaries bypass thermal sensors without triggering an alarm
By using heat resistance materials to block their body heat from being detected by the sensor
114
Which of the following represents a legal constraint on the use of surveillance in private investigations
Video surveillance may not record audio without consent
115
Which combination of factors would most likely reduce the Probability of Interruption (Pi) in a high security environment
Increasing personnel presence but reducing detection accuracy
116
Which of the following is true of Herzberg's hygiene factors
They prevent job dissatisfaction
117
What is the primary purpose of a crisis management plan
Ensuring effective response to crisis
118
Which type of sensor is designed to detect intrusion based on pressure variations in the ground or floor
Pressure sensitive volumetric sensor
119
Why might an organization review a potential hires travel history as part of a background investigation
To identity associations with high risk countries
120
Which of the following is a common physical barrier in security
Fences
121
What is the primary goal of ESRM
Identifying and managing security risks
122
Which of the following is not a core element of the CARVER risk assessment method
Resilience
123
Which of the following combinations most increases an organizations risk exposure
High criticality and high vulnerability
124
Which lamp technology is most sensitive to frequent power cycling, resulting in a shorter lifespan if turned on and off regularly
Metal Halide
125
What is the primary disadvantage of using an active infrared sensor system in outdoor environments
Susceptibility to interference from direct sunlight
126
What is the biggest challenge in using RFID technology for access control in sensitive areas
RFID signals can be intercepted and cloned by malicious actors
127
Which fire resistance rating is appropriate for a wall separating a high security vault from an adjacent room in a commercial building
2 hours
128
What is the primary benefit of using infrared beam sensors in outdoor perimeter security
Ability to detect in total darkness
129
Which of the following is not a benefit of a virtual private network (VPN)
Enhancing data availability
130
Which of the following is least likely to be concern during the recovery phase of a natural disaster crisis
Maintaining the chain of custody for evidence
131
What is the role of consequence criteria when valuing an asset in security risk management
It determines the potential impact on business operations if the asset is compromised
132
What is the biggest challenge in using RFID technology for access control in sensitive areas
RFID signals can be intercepted and cloned by malicious actors
133
What is the main advantage of using digital forensics in investigations
Ability to analyze large volumes of data quickly
134
When conducting a criticality assessment, which of the following questions should be answered
What are the potential consequences of asset loss How difficult would it be replace the asset
135
What is the primary benefit of integrating ESRM with business operations
Enhanced organizational resilience Improved financial performance
136
Which of the following factors is least relevant when determining the likelihood of a security incident
The cost of asset recovery
137
Which of the following best describes the chain of custody
Documenting evidence collection Ensuring evidence integrity
138
How might criminals exploit weaknesses in perimeter security if there is no redundancy in the design
By disabling a single security measure such as fence or sensor, without triggering alarms
139
Which of the following combinations would least likely increase risk in a security framwork
Moderate threat likelihood and frequent security audits
140
Which of the following is not a responsibility of personnel security
None of the below (Conducting background checks on employees, Implementing physical security measures, Developing security policies and procedures)
141
How does the design of line detection fiber optic sensors enhance their ability to detect perimeter intrusions in harsh environments
They use light refraction along a continuous fiber to detect disturbances
142
Which of the following is least likely to be effective in reducing risk of false confessions during a REID interrogation
Offering the suspect a reduced sentence in exchange for cooperation
143
What is a potential pitfall of relying solely on criminal background checks when assessing personnel risks
They provide no insight into the individuals current behaviour
144
Which of the following is most likely to hinder effective decision making during the initial phase of crisis
Conflicting information from different sources
145
What advantage does chemically strengthened glass offer over tempered glass in high security installations
Higher resistance to thermal stress and mechanical impact
146
What is the main weakness of older combination locks used on vaults and safes
Susceptibility to manipulations
147
Which of the following is least likely to be considered conclusive evidence in a drug trafficking case
A character witnesses testimony about the suspects prior behaviour
148
Which of the following is a common challenge in conducting undercover operations
Maintaining the undercover agents cover
149
What type of safe would be more appropriate for securing digital media again both fire and burglary
Data safe
150
How might adversaries bypass electromagnetic locks used in high security facilities
By disabling power supply to the locks, rendering them ineffective
151
Which of the following factors would most effect the accuracy of a PIR sensor in a warehouse environment
Large temperature fluctuations
152
Which type of sensor is least likely to detect objects moving at slow speeds
Microwave sensor
153
Which of the following is least probable to enhance the response of a Physical Protection System (PPS)
Installing additional motion detectors
154
Which of the following types of evidence is most likely to be considered conclusive in a criminal investigations
DNA evidence from the suspect at the crime scene
155
Which rating does TL-15 safe receive if it can withstand a torch attack for 15 minutes
TRTL-15
156
Which feature of LED lighting makes it preferred choice in high security environments
Low maintenance requirements
157
Which factors would most likely increase the overall threat landscape in a critical infrastructure system
Increasing asset visibility and reducing personnel presence
158
In an investigation involving digital evidence, which of the following would most likely compromise the evidence
Powering down the computer before imaging the drive Using the original device for analysis instead of a copy
159
Which sensor type of least affected by the presence of moving vehicles in the vicinity of a protected area
PIR sensor
160
Which of the following is the most effective early intervention to prevent workplace violence
Offering mental health resources and conflict resolution training
161
Which of the following is an example of a strategic risk
A change in regulatory requirements
162
Which lighting system is best suited for security applications in environments with frequent power fluctuations
LED lighting
163
Why are the fiber optic cables preferred over copper cables for long distance perimeter security installations
Fiber optic cables are immune to electromagnetic interference
164
Which of the following is not considered in the calculation of Earnings before interest, taxes, depreciation and amortization (EBITA)
Tax obligations
165
Which of the following is not a standard method used to calculate probability of detection (Pd) in a PPS
Environmental impact analysis
166
Key for PSIM system
Cost Scalability
167
Which of the following is a major risk associated with sting operations
Entrapment of the suspect Compromising the undercover officers identity Legal challenges to the operations methods
168
Which of the following is most likely to be considered a precursor to an organizations theft problem
Substance abuse issues
169
Which of the following is a key difference between a controlled buy and a buy bust operations
A buy bust focuses on immediate arrest, while a controlled buy gathers long term intelligence
170
Which of the following is a least likely to influence a company's ROI on a security project
The length of the project implementation phase
171
Why is the integration of cybersecurity into business continuity plans essential
Cybersecurity incidents can cause business disruptions similar to physical disasters
172
Which fence type would be most suitable for a high security installation in an urban area with strict aesthetic regulations
Wielded wire mesh fence
173
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Application form, pencil and paper test, performance simulation test, interviews
174
Which of the following best explains why asymmetric encryption is typically slower than symmetric encryption
It uses larger key sizes for encryption and decryption
175
Which of the following is not a characteristic of strong encryption algorithm
Speed of encryption
176
Which type of glass is most effective in preventing unauthorized access through forced entry
Laminated glass
177
Which of the following is not typically included in an investigation report
Detailed financial analysis
178
The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is
Economic
179
Which of the following is a not a benefit of using video surveillance in investigation
Privacy protection
180
What is the main purpose of a forensic interview
Gathering detailed information from witnesses or suspects
181
Which combination of factors is most likely to improve employee motivation according to Maslow's theory
Satisfying esteem needs and offering responsiblity
182
According to Maslow which of the following needs must be satisfied before esteem needs can be addressed
Safety needs Social needs
183
In terms of security trends, how does Artificial Intelligence (AI) impact modern security operations
By providing advanced threat detection and predictive analytics capabilities
184
Which combination of factors would increase the Probability of success (PoS) for an adversary targeting critical infrastructure
Weak detection systems and delayed incident recovery protocols
185
In the context of security lighting, what is luminance
The perceived brightness of a light source
186
Which of the following is the most critical factor when selecting a security alarm system
The response time of law enforcement or security personnel
187
Why might organizations face legal liability if they fail to implement effective emergency response plans
If negligence results in harm to employees or customers
188
Which of the following is least likely to directly affect a company's Gross Operating Profit (GOP)
Tax obligations for the current year
189
Which of the following combinations would most likely result in a higher probability of interruption (PoI)
Increasing physical security measures and enhancing detection systems
190
Which type of vault door is specifically designed to resist attacks with tools like torches and drills
Blast resistant vault door
191
Which of the following is not a common type of phishing attack
Ransom phishing
192
Which of the following is not a typical goal of protection of depth
Ensuring that no vulnerabilities exist within the system
193
How might an adversary exploit weaknesses in door locking mechanisms in high security environments
By tampering with electronic door locks to disable them
194
How might adversaries bypass the detection sensors in a perimeter security system
By passing under or over the sensors detection range
195
Which of the the following is the most critical method for ensuring that a security policy is enforced consistently across the organization
Monitoring employee compliance
196
Which of the following is not a common method for ensuring the integrity of digital evidence
Immediate analysis
197
Which of the following is least likely to be common element in crisis communication plan
A financial recovery strategy
198
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
199
Which of the following is a not a common vulnerability of CCTV systems in physical security
Inability to detect thermal signatures
200
How does the identification of a threat vector affect the overall risk equation in a security system
It increased overall risk by highlighting potential weaknesses that could be exploited by external threats
201
Which of the following is least likely to be a role of the crisis management leader during a large scale evacuation
Making decisions about the financial impact of the crisis
202
Which of the following is least likely to complicate the recovery phase of crisis management
Lack of media involvement in post crisis reporting
203
What is the primary goal of a background check
Ensuring candidate suitability
204
What is the primary disadvantage of using physical surveillance in an investigation
High cost
205
What is the primary risk of falling to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
206
Which of the following is the best example of a Key Performance Indicator (KPI) for a security program
Employee compliance with security protocols
207
Which of the following is a significant disadvantage of ultrasonic sensors in outdoor environments
They are sensitive to air turbulence
208
Which of the following is a key consideration when designing a secure access control system
Reliability and redundancy User convenience
209
Which of the following is a most likely to cause an investigator to miss critical evidence during a crime scene search
Lack of proper search training
210
What is the purpose of personnel security policy
To ensure compliance with legal and regulatory requirements
211
In the context of risk management, which of the following is the best example of a vulnerability
A lack of sufficient detection systems at the perimeter
212
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
213
What is the primary function of line detection sensors in perimeter security systems
Detecting vibration along a fence line
214
Which of the following factors would most likely decrease an assets vilnerability
Frequent security audits and improved detection systems
215
How might adversaries bypass the protections of a network based intrusion detection system (NDS)
By encrypting malicious traffic, which the NDS cannot impact
216
Which of the following is not a principle of secure coding
Data encryption
217
What is the primary goal of encryption in information security
Preventing unauthorized access Ensuring data integrity
218
Which of the following is most likely to be the key question in a bomb threat assessment
Could the threatener have done what was claimed
219
Which component is typically the most susceptible to false alarms in a PIR (Passive Infrared) sensor system
Pyroelectric sensor
220
What is the primary function of a time delay feature on a safe used in banking environments
To discourage robbery by delaying access
221
Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach
Reduced focus on regulatory requirements and compliance audits
222
Which of the following is not a benefit of personnel security programs
Increasing operational costs
223
Which of the following is not a benefit of conducting security audits
Reducing operational costs
224
Which of the following is most likely to enhance the deterrent function of a security system
Installing visible barriers and deterrent signage
225
Which of the following is a critical consideration when implementing a physical security information management (PSIM) system
Scalability and integration with existing security systems
226
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
227
Which of the following is not considered a strength of a deductive risk assessment
It focuses on general patterns and trends to predict risks
228
What is the most common weakness in using character witnesses in criminal investigations
They often lack direct knowledge of the crime
229
Which UL standard covers the testing and certification of high security safes for commercial applications
UL687
230
How can a suspect use counter surveillance tactics to avoid being tracked
Constantly remain in high populated areas Use physical disguises to alter their appearance Avoid using electronic communication devices altogether
231
Which of the following is not a method of personnel security
Incident response
232
How does deployment of bistatic radar enhance the security monitoring capabilities at international borders
Bistatic radar systems are most difficult to detect and jam than monostatic systems, making them ideal for covert operations
233
Which of the following is a key consideration when calculating risk for an organization
The degree of asset vulnerability to various type of threats The likelihood that internal policies will prevent their escalation
234
What is the purpose of a personnel security policy
To establish guidelines for hiring employees To outline the responsibilities of employees To define the consequences of security violations
235
Which of the following is least likely to improve a company's current ratio
Increasing inventory levels
236
What is the primary purpose of a digital certificate in PKI
Authenticating identity
237
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
238
Which vault rating is required for securing extremely high value assets, offer resistance to both tool and explosive attacks
TRTL-30X6
239
Which of the following is most likely to increase the complexity of a crisis response
Multiple simultaneous incidents in different locations
240
Which of the following is not typically a feature of an electronic access control system
Surveillance cameras
241
Which of the following is most critical factor when selecting a security alarm system
The response time of law enforcement or security personnel
242
What is the main disadvantage of installing a high tension electrified fence without any physical barrier such as chain link or mesh
The lack of physical barrier allows intruders to bypass the fence with insulation tools
243
Which of the following is most significant risk of using hostile witness in court
The witnesses' testimony may be dismissed due to bias
244
Which of the following is a least likely to affect the calculations of a company's current ratio
Long term assets
245
In digital forensics which of the following is most likely to cause the loss of critical evidence during the collection process
Failure to image the drive
246
Which of the following is a strength of using REID in investigative interviews
It builds a narrative to help the suspect justify their actions
247
Which of the following principles is most essential when conducting a buy bust operation
Proper documentation of the chain of custody
248
What makes inductance based sensors suitable for integration into electronic article surveillance (EAS) systems in retail environments
These sensors are highly sensitive to changes in magnetic fields, ideal for tagging and tracking merchandise
249
Which of the following is most likely to affect the current ratio but not the quick ratio
Change in inventory levels
250
What are the three general methods for valuing assets
Monetary value, consequence criteria, policy
251
Which lighting type is best suited for use with security cameras that operate in low light conditions
Infrared lighting
252
Which of the following is not typically included in due diligence investigation
Psychological evaluations
253
In a sting operations, which of the following is least likely to contribute to entrapment
To suspect initiating the criminal activity
254
Which of the following is least likely to be a consequence of conducting an illegal search during a workplace investigation
Termination of the employee being investigated
255
During disaster recovery planning, why is is important to consider the geographic location of backup facilities
To mitigate the risk of same disaster affecting both primary and backup sites
256
Which of the following is an example of a physical security vulnerability
Inadequate lighting
257
In a risk management framework which of the following is false
High threat likelihood always leads to higher risk
258
Which vault door design offers the highest level of protection against explosives
Concrete line vault door
259
Which of the following is a key principle of defensible space
Territoriality
260
Security through obscurity
Hiding Measures
261
What is the primary goal of security policy
Defining acceptable use of resources
262
Which of the following is least likely to result from poor session management in web applications
Data integrity issues in stored sessions
263
Which of the following factors is most likely to lead to security policy failure in a large organizations
Lack of leadership engagement
264
Which of the following is least likely to be considered one of the three types of emergency operation plans
Focused plan for a specific employee group
265
In the context of adversary path diagram (ASD), what is the best description of delay points
Locations where physical barriers slow the adversary's progress
266
Which of the following is not a common type of forensic analysis
Surveillance Analysis
267
Which of the following strategies is most effective in reducing the risk of false confessions in REID interrogations
Minimizing confrontational tactics and focusing on open ended questions
268
Which of the following is least likely to be considered a form of pressure in the context of Cressey's Fraud Triangle
Weak security controls that allow unauthorized access to sensitive data
269
What is the primary function of a volumetric sensor in perimeter security
Detect changes in air volume over large areas
270
A matrix that describes a particular situation with respect to each of the risks identified by relating the risk to an asset is called
Vulnerability matrix
271
How can terrain following sensors be used to prevent tunnelling in perimeter security systems
By adjusting their detection range to cover underground areas, detecting movement below the surface
272
What does a mantrap help prevent
Tailgating
273
Which of the following is least likely to increase EBITA
Increasing depreciation expenses
274
Which of the following best describes the deter function in a security system
Reducing the desire or motivation to attempt an intrusion
275
Which of the following is the best way to ensure the integrity of confidential information in a company
Encrypting all sensitive data
276
What is the correct formula for determining the Probability of Success (Ps) in an adversary sequence diagram
Ps = Probability of detection x Probability of interruption x Probability of neutralization
277
Which of the following is not a characteristic of a successful risk mitigation strategy
It eliminates the probability of all risk events
278
What is the primary purpose of a crime scene investigation
Identifying suspects Collecting evidence
279
Which of the following best reflects the finding of General Strain Theory when applied to a fraud case involving
The suspect faces financial pressure due to unexpected personal expenses
280
Which of the following is not a method for achieving data integrity
Data replication
281
Which of the following factors is most relevant when determining asset vulnerability in a security assessment
The likelihood of attack
282
According to Herzberg, which of the following would not increase job satisfaction
Job security
283
In crisis management, what is the significance of the recovery time objective (RTO)
It defines the maximum acceptable downtime for critical operations
284
Which of the following is not an advantage of Protection in depth
It eliminates the need for other types of security measures
285
Which of the following is not a factor in calculating the Probability of detection (Pd)
Threat likelihood
286
What is the primary goals of a business organization
To maximize shareholder value
287
Which of the following is not a benefit of using thermal imaging sensors in security applications
High cost of implementation
288
What is the primary disadvantage of using infrared sensors for outdoor security
Susceptibility to environmental factors like sunlight and temperature changes
289
Which of the following best describes the role of ESRM in a corporate setting
To align security practices with the organizations risk appetite and business objectives
290
Which of the following is the most significant disadvantage of incandescent lamps in security lighting applications
Short lifespan
291
In a vault protection scenario, why is it critical to assess both strike and restrike times
To ensure the vault door can withstand multiple forced entry attempts within a specified timeframe
292
What is the most significant risk when relying on security guards alone for access control
Guards may be bribed or compromised
293
In the context of the PEACE model, what does the Preparation and planning stage entail
Developing an interview strategy
294
How can psychological profiling be used in an executive protection context
To assess potential threats based on patterns of behaviour
295
How might adversaries exploit gaps in an organizations disaster recovery plan during a global crisis event
By targeting critical infrastructure that is left vulnerable due to diversion of resources towards immediate crisis
296
Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach
Reduced focus on regulatory requirement and compliance audits
297
Which of the following is least likely to be characteristic of an effective budget development process
Arbitrary selection of line item values
298
The ability of an adversary to physical enter and egress from the target in CARVER is called
Accessibility
299
How does the probability of detection (Pd) relate to time delays in the adversary sequence diagram
Pd decreases as time delay increased due to slower detection rates
300
Which of the following is not part of the formula to calculate the current ratio
Fixed assets
301
The management principle that suggests one supervisor can effectively control a limited number of people is
Span of control
302
What is the primary limitation of encryption as a method of data protection
It does not prevent access but only ensures that the data is unreadable without the correct decryption key
303
Which of the following best describes the inductive approach to risk assessment
Generalizing from specific incidents to broader security issues
304
What is the primary limitation of using encrypted messaging services in covert investigation
It can be difficult to establish the authenticity of decrypted messages
305
Which of the following techniques is most effective in cross examining an expert witness
Confronting the expert with inconsistencies in their testimony
306
How might criminal organization use shell companies to evade detection in an investigation
By laundering illegal funds through seemingly legitimate businesses By creating false employment records for investigators to follow By masking the true ownership of valuable assets
307
What is the primary goal of an internal audit
Detecting fraud Evaluating compliance with policies
308
Which of the following is most likely to affect the calculation of the quick ratio but not the current ratio
Inventory
309
Which of the following factors is most critical for ensuring the effectiveness of a security policy
Consistent enforcement of the policy
310
In Business Continuity Planning (BCP) which of the following is least relevant when determining Recovery Time Objectives (RTO)
The cost of new security measures
311
When it is necessary to question a witness about sexual deviation all of the following should be avoided except
Allowing the witness to frame the testimony in his or her own word
312
Which of the following is not included in the calculation of the quick ratio
Inventory
313
Which type of leadership style is characterized by a focus on building strong relationships with team members
Transformational Leadership
314
What is the primary objective of a forensic interview with a child witness
To gather accurate and reliable information
315
Which of the following is not a method of ensuring data integrity
Encryption
316
What is the primary goal of incident planning
Minimizing damage from incidents
317
What is the main benefit of diversification in a business portfolio
To spread risk across different investments
318
Which of the following is not a factor to consider when conducting a personal security investigation
Social media activity
319
Which Security Principle involves using multiple layers of security measures
Defense in depth
320
What is the primary goal of encryption in information security
Preventing unauthorized access Ensuring data integrity
321
What is the purpose of a business continuity policy
To provide guidelines and procedures for maintaining business operations during disruptions
322
Which of the following is a key benefit of effective risk management
Enhances organizational resilience
323
What is the goal of emergency preparedness
To ensure a quick and effective response to emergencies
324
What is the purpose of a risk management strategy
To outline the approach for managing risks
325
What does CPTED stand for
Crime Prevention Through Environmental Design
326
Which of the following is an example of a physical security control
Security cameras
327
Which concept involves identifying potential threats and vulnerabilities
Risk assessment
328
What is the importance of conducting background checks
To verify the credentials and history of individuals
329
What is the primary objective of business continuity testing
To ensure the effectiveness of business continuity plans
330
What is the main purpose of access control
To restrict unauthorized entry
331
Which of the following is a key principle of defensible space
Territoriality
332
Which of the following best describes defense in depth
Multiple, overlapping security measures
333
What is the most critical consideration when designing a layered defense strategy in physical security
Depth and redundancy of security measures
334
Which of the following best describes chain of custody in evidence handling
Documenting every person who handled the evidence Ensuring evidence is kept secure Preventing evidence tampering
335
What is the common goal of both physical and information security
To protect assets from unauthorized access
336
What is the of a break even analysis
To determining the point which revenue equals costs
337
What is the primary function of a security officer
To monitor and protect property and people
338
Which of the following is not a common type of phishing attack
Ransom phishing
339
Which of the following is not typically included in the ESRM framework
Marketing strategies
340
Which of the following is not a method for ensuring the security of investigative files
Allowing unrestricted access
341
What is a fundamental principle of physical security
Denying access to unauthorized individuals
342
What is the purpose of a crisis management plan
To outline procedures for handling crisis
343
What is the main objective of conducting a root cause analysis in an investigation
To identify the underlying reason for an issue
344
What is the primary purpose of a security policy in ESRM
Defining security roles and responsibilities Enhancing operational efficiency
345
Which of the following is not a core component of Business Continuity Management Systems (BCMS)
Marketing Strategy Development
346
Which of the following best describes the term least privilege
Granting employees with minimum access necessary to perform their duties
347
What is the role of a project manager
To oversee and manage all aspects of a project to ensure it meets its goals
348
In the context of access control, what is the time based access control system
A system that allows access based on the time of day
349
Which of the following best describes security culture
The behavior and attitudes of employees towards security
350
What is the primary goal of a litigation hold
Preventing evidence destruction
351
Which of the following is a physical security measure for protecting information
Locked filing cabinets
352
Which of the following is not a typical component of a comprehensive investigative plan
Making Assumptions
353
What is the purpose of a security barrier
To obstruct or control movement for security purposes
354
What is the importance of maintaining confidentiality during investigation
To protect the integrity of the investigation and the privacy of involved parties
355
Which financial statement summarizes a company's revenues and expenses over a period of time
Income Statement
356
Which of the following is not a typically responsibility of a Chief Security Officer
Developing marketing strategies
357
Which of the following is a potential consequence of a personnel security breach
Financial Loss Reputation Damage Legal penalties
358
Which of the following best describes a brute force attack
Guessing passwords through exhaustive key search
359
One whose sexual desires are directed to both men and women is know as
Bi sexual
360
Which of the following is not a common method for testing a business continuity plan
Financial Audits
361
What is the purpose of a security policy
To outline security goals and procedures
362
In the context of security, what is the primary purpose a security matrix
In the context of security, what is the primary purpose a security matrix
363
What is the primary goal of security management?
Loss prevention
364
Which security model focuses on protecting information based on its sensitivity and the need to know principle?
CIA Triad Confidentiality Integrity Availability
365
What is the primary objective of an organization's business continuity plan (BCP)?
Ensuring critical business functions continue during disruptions
366
What is a key component of a company's code of conduct?
Compliance with legal requirements
367
In terms of security management, what does "Due Diligence" refer to?
Exercising care and caution in decision making
368
What is the primary purpose of a security audit?
Identifying weaknesses in the organization's security practices
369
What is the main goal of a workplace investigation?
Fact finding and problem solving
370
What is the primary purpose of computer forensics in an investigation?
Collecting and analyzing digital evidence
371
In the context of personnel security, what does "Insider Threat" refer to?
Disgruntled employees or contractors
372
What does the term "Social Engineering" refer to in personnel security?
Manipulating people to disclose confidential information
373
Which of the following BEST describes the document that tells how much money an organization generates (revenue), how much it spends (expenses), and the difference between those figures (net income)?
Income statement
374
Which of the following types of investigations is considered the “most common type of investigation in many business and organizational settings”?
Incident
375
When dealing with suspected chemical or biological agents that are released from a suspicious package, what should be your FIRST goal?
Limit distribution of the material
376
“The ability of an organization to resist being affected by an event or the ability to return to an acceptable level of performance in an acceptable period of time after being affected by an event”, is called:
Organizational resilience
377
“Non-deliberate adverse actions and events, such as hazardous material spills and telecommunications and computer outages, are considered which of the following?
Accidental threats
378
Relative to organizational objectives, what is “SMART
Specific, measurable, attainable, relevant, time bound
379
What are the five avenues to address risk?
Acceptance, Spreading, Reduction, Transfer, and Avoidance
380
Employees who are involved in breaking the law in one way will often find it easy to join the operative in trying to break the law in other ways. This behavior is referred to as
Cognitive consistency
381
An entry control subsystem is part of the…
Detection system
382
The abduction of a hostage in order to coerce someone else into committing a crime is known as a…
Tiger kidnapping
383
What is the primary objective of access control in physical security?
Restricting physical access to authorized personnel only
384
Which physical security measure is designed to protect a facility from vehicle borne threats?
Bollards
385
What is the primary purpose of a security risk assessment for a physical facility?
Identifying vulnerabilities and threats
386
In security planning, what does the term "Vulnerability" refer to
The weakness or exposure that could be exploited
387
What is the primary goal of a code of ethics in an organization?
Promoting ethical behavior and decision making
388
What is the concept of "Due Care" in business principles
Taking appropriate steps to protect information/people
389
What does a financial audit primarily aim to achieve?
Verifying the accuracy of financial statements
390
What is the primary goal of an interview in the context of investigations?
Collecting relevant information and evidence
391
What is the role of a private investigator in a corporate investigation?
Gathering information and evidence
392
Which document typically provides an overview of an employee's job responsibilities, expectations, and performance standards
Job description
393
The best prevention of exposure to workplace violence is…
A preemployment background investigation program
394
What are the three general types of assets
People, property, and information
395
Which of the following is one of the most cost effective assets protection tools?
Training and awareness
396
The four elements of emergency management are which of the following?
Mitigation, preparedness, response, and recovery
397
These need not be registered with any outside agency, so the owner can maintain a greater degree of control over the asset. The owner must be able to prove that the information added value or benefit to the owner, was specifically identified, and the owner provided a reasonable level of protection. This is called which of the following:
Trade Secret
398
"Employment of services, equipment and techniques designed to locate, identify and neutralize the effectiveness of covert technical surveillance devices.”, is the definition for which of the following?
Technical surveillance countermeasures
399
What is the primary purpose of an alarm system in physical security?
Detecting and alerting to security breaches or emergencies
400
What is the primary goal of a firewall in information security?
Manages the secure in flow and out flow of data in a device
401
In crisis management, what does "Incident Command System (ICS)" refer to?
A system for managing incidents and coordinating emergency response efforts
402
In information security, what is the primary purpose of a penetration test?
Identifying vulnerabilities in a system through controlled testing
403
What does the acronym "CPTED" stand for in the context of security principles?
Crime Prevention Through Environmental Design
404
In business continuity planning (BCP), what is the primary purpose of a business impact analysis (BIA)?
To identify and prioritize critical business functions and the effect of various threats on the business
405
What is "Reasonable Suspicion" in the context of an investigation
A legally defined standard that justifies further investigation
406
What is the primary goal of electronic surveillance in an investigation?
Monitoring and recording electronic communications for investigative purposes
407
What is the purpose of a background check in personnel security?
Verifying the trustworthiness of an individual
408
In personnel security, what is the main goal of a "Non Disclosure Agreement" (NDA)?
Protecting sensitive information and trade secrets
409
What does the term "Whistleblower" refer to in personnel security?
An individual who reports unethical or illegal activities within an organization
410
What is the primary purpose of perimeter security in physical security?
Protecting assets and personnel by controlling access to a defined area
411
Which type of security measure is designed to prevent tailgating or piggybacking?
Biometric authentication
412
In information security, what does "Encryption" involve?
Protecting data by converting it into a secure format
413
What is the main drawback of using mechanical combination locks in high security applications
Susceptibility to brute force attacks
414
The three basic types of glass are
Sheet, Plate and Float
415
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
416
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
417
Which of the following is not a biometric benefit
Low cost
418
In the context of security lighting, what is meant by color rendition
The ability of a light resource to accurately reproduce colors
419
Which of the following best describes the principle of operation for a glass break sensor using shock detection
Monitors vibration patterns
420
Which of the following is not a benefit of using access control systems
Reducing security costs
421
Which of the following is not an advantage of using IP based surveillance cameras
Lower implementation costs
422
Which of the following is not typically included in a threat assessment
Historical weather data
423
What is the primary goal of network segmentation
Limiting the spread of security breaches
424
Which type of illumination is characterized by a rapid strike time and excellent color rendition
Metal Halide
425
Which of the following is not a common security protocol for secure communications
HTTP
426
In the context of sensors, what is the primary function of a bistatic radar sensor
Uses separate location for the transmitter and receiver
427
What is the primary advantage of using electromagnetic locks in secure facilities
Easy integration with access control systems
428
In the context of locks, what is the purpose of a relocking device in a high security safe
To automatically relock the safe if an attack is detected
429
Containers that are rated for both fire and burglary protection offer either one or two hour fire protection and have TL rating of
60
430
What is the primary characteristic of a mercury vapor light in security lighting
Long strike and restrike times
431
What is the primary goal of penetration testing
Identifying and exploiting vulnerabilities
432
Which of the following best describes an active infrared sensor
Emits infrared radiation and defects its reflection from objects
433
Which of the following is not a benefit of encryption
Enhancing Data availability
434
In the context of physical security what is the most critical consideration when selecting a security integrator
Experience and expertise in integration complex security systems
435
What is a key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage
Implementing full cutoff fixtures to direct the light onward
436
which type of sensor uses changes in capacitance to detect intrusions
Capacitance based sensor
437
What is a primary advantage of using microwave sensors in perimeter security
Less affected by weather conditions
438
What makes active sensors particularly effective for border security applications
Active sensors emit signals that can detect changes in the environment providing earl warnings of potential breaches
439
In what way does the use of active infrared sensors benefit a complex security system in a prison environment
These sensors trigger alarms if inmates pass certain thresholds even in total darkness, enhancing night time security
440
what is the primary objective of crisis mitigation
To reduce the impact of a crisis
441
How often should physical security assessments be conducted
Annually
442
Which type of lock is designed to be resistant to picking and bumping by using a complex key design
Pin tumbler lock
443
In the context of access control, what is the time based access control system
A system that allows access based on the time of day
444
What is the critical consideration when deploying microwave sensors in a corporate campus environment
Ensuring that the frequency of the microwave sensors does not interfere with the campus Wi-Fi and other communication systems
445
In what scenario is it particularly important to use security lighting with high durability and resistance to environmental factors
In coastal areas where salt spray, wind and moisture can degrade lighting fixtures quickly, affecting their functionality and the overall security of the area
446
Which of the following is not a benefit of using thermal imaging sensors in security applications
High cost of implementation
447
what is the key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage
Implementing full cutoff fixtures to direct the light onward
448
What is the primary purpose of man trap
To control entry To provide a barrier"
449
Which type of locking mechanism is often integrated into time lock systems for vault security
Combination Locking
450
Which of the following is a typical application for seismic sensor in physical security
Monitoring ground vibrations near sensitive facilities
451
Which type of lock is least suspectable to lock bumping
Disc detainer lock
452
Critical in PIDS
Accuracy Response Time
453
How does a volumetric sensor provide an advantage over traditional beam sensors in protecting the interior of a warehouse
By creating a three dimensional protection zone that detects movement within the entire covered space
454
Primary benefit of using intrusion detection systems (IDS) in security operations
Real time threat detection
455
What is the most effective method for preventing tailgating in high security areas
"Installing additional CCTV cameras Implementing mantraps or turnstiles
456
Which of the following is not a typical step in risk management process
Risk enhancement
457
In the event of security breach which of the following is the most important initial response action
Containing the breach to prevent further damage
458
What are the operational benefits of using bistatic radar sensors for coastline surveillance
Bistatic readers are particularly effective at low altitude and small object detection which his crucial for spotting small watercraft
459
What is the primary goal of risk treatment in the ISO 31000 risk management framework
To implement measures that reduce the likelihood and impact or risks to an acceptable level
460
Which of the following sensors is commonly used for perimeter protection by forming an invisible barrier between two points
Infrared Beam sensor
461
Which sensor type is commonly used in retail stores to detect when doors are open or closed
Magnetic Contact Sensor
462
What advantage does a volumetric sensor have over a perimeter sensor in securing a large ware house
Its provides coverage within the entire volume of the space, not just at the entry points
463
What makes an active sensor preferable for underwater intrusion detection systems compared to passive sensors
Active sensors, such as sonar, emit pulses and measure their echoes, which is effective under water where other signals may not propagate well.
464
In what situation would an acoustic sensor be more advantageous than a PIR sensor
Detecting glass breakage in secure rooms
465
Why are LEDs considered most advantageous for use in motion activated security lighting systems
LEDs offer instant on/off capabilities, which is ideal for motion detection scenarios
466
Which of the following sensor types can detect metallic objects moving in proximity
Magnetic sensor
467
What is the role of a data loss prevention (DLP) system
To detect and prevent unauthorized transmission of data
468
Which of the following is the most critical factor in the effectiveness of biometric security systems
False Acceptance Rate (FAR)
469
Which of the following is not a benefit of using proximity cards in access control systems
Higher level of security compared to biometric systems
470
Which of the following best describes the principle of operation for a passive infrared (PIR) sensor
Detects changes in thermal radiation
471
During an emergency, the actual shutdown of equipment should be assigned to
People familiar with the process
472
Which type of illumination is known for quick strike and restrike times
LED
473
Which of the following best describes the concept of convergence in physical security
Integration of physical and cyber security measures
474
Record safes for computer media require better protection than paper records because damage to computer media can occur at
125 Degrees Fahrenheit
475
In the context of physical security, what is the most significant advantage of using IP based surveillance cameras
Ability to integrate with other network based security systems
476
Which of the following best describes security through obscurity
High Security Measures Hiding Measures
477
Vulnerability assessment purpose
Identify weakness
478
Which of the following is not a component of a business continuity plan
Marketing strategy
479
What is the primary objective of access control systems in physical security
To restrict unauthorized access to sensitive areas
480
Which of the following is not a benefit of using surveillance cameras
Enhancing data confidentiality
481
What is the main purpose of using a security entry vestibule in a high security building
To act as a security buffer zone that restricts access
482
Which type of illumination is known for quick strike and restrike times and excellent color rendition
Metal Halide
483
Which of the following is a significant consideration for a security data center
Transportation routes Redundant power
484
Which of the following best describes a brute force attack
Guessing passwords through exhaustive key search
485
Which of the following is an example of a physical security measure
Security guards
486
What is the most effective method for preventing tailgating in high security areas
Installing additional CCTV cameras Implementing mantraps or turnstiles
487
How does a line detection sensor work in conjunction witch CCTV systems to enhance security at subway station entrance
By triggering the CCTV system to record when someone crosses a specific threshold
488
What is the primary purpose of security token
Authenticating user identity
489
What is the primary function of a vibration sensor in a security system
Monitoring structural vibrations
490
which of the following technologies is commonly used to protect valuable items in museums by detecting touch or proximity
Capacitive sensor
491
What is the primary advantage of using light emitting diode (LED) in security applications
Greater energy efficiency and longer lifespan
492
What is a major advantage of using fluorescent lighting in interior security settings
High energy efficiency
493
What is the primary advantage of using a biometric lock over a traditional mechanical lock
Enhance security through unique user identification
494
Which of the following sensors is least effective for outdoor perimeter protection in high wind environment
Ultrasonic sensor
495
What is the most effective method for securing a facility's perimeter
Using a combination of physical barriers, surveillance and access control
496
What is a primary function of a hard plate in a vault lock system
To prevent unauthorized access through physical attacks
497
In terms of security lighting, why is it important to consider both strike time and restrike time when planning the installation of new lighting fixtures
These times impact how quickly areas can be secured and monitored after initial activation or power interruption's
498
What are the benefits of integrating adaptive lighting technology in security systems at dynamic environments like airports
It allows the lighting intensity to adjust based on natural light levels, enhancing visibility and reducing energy consumption
499
Which of the following is not a principle of defense in depth
Single point of failure
500
How does the implementation of an automated lighting control system, which adjusts based on activity levels enhance a facility's security during off hours
Automated systems ensure that lighting is optimal only when activity is detected, saving energy and reducing wear while maintaining security
501
What is the primary function of a capacitance based sensor
To detect variations in capacitance caused by conductive objects
502
In security what is crash rated barrier
A barrier designed to withstand vehicle impacts
503
Which type of illumination is known for its high energy efficiency and good color rendition
LED
504
What considerations should be taken into account when deploying microwave sensors along a border fence in a desert environment
The sensors must be calibrated to ignore small, fast moving sand particles to reduce false alarms
505
Which of the following is not a principle of information security
Accountability
506
In the context of security lighting, what is luminance
The perceived brightness of a light source
507
What is key advantage of a combination lock in high security vaults
It does not require electricity to function
508
What is the primary function of a security barrier
To obstruct or control the movement of vehicles and people
509
Which of the following is a physical security measure for protecting information
Encryption software Firewalls Locking filling cabinets
510
Which of the following is the primary purpose of physical security
To prevent unauthorized access
511
Which of the following best describes the purpose of access control systems
To prevent unauthorized access
512
Which type of door is typically used for high security areas
Solid core door
513
Which of the following best describes the term least privilege
Granting employees the minimum access necessary to perform their duties
514
What is the main advantage of using microwave sensors in security applications
Can detect movement through non metallic barriers
515
What is the primary function of video analytics in surveillance systems
To automatically analyze and interpret video data for security purposes
516
Which of the following best describes a crisis communication strategy
A plan to manage communication during a crisis
517
Which of the following best describes the use of security screening at access points
Checking for prohibited items and verifying identities
518
What is a primary limitation of using ultrasonic sensors in security applications
Interference from environmental noise
519
What is the key advantage of using biometric authentication in access control systems
High level of security through unique identification
520
What is the primary benefit of using thermal imaging sensors in security
Ability to detect intruders in complete darkness
521
What is a common characteristic of high security fences
Anti climb features
522
Duress alarm function
Alert emergency
523
What does a security patrol primarily aim to achieve
To deter and detect security breaches
524
What is the primary advantage of using multi factor authentication (MFA) in physical security
Increased security by combining multiple authentication methods
525
What is the role of a security control room
To monitor and manage security systems
526
Which of the following best describes natural access control
Using natural barriers to control access
527
What is the primary function of a volumetric sensor in security systems
To detect changes in volume with a defined area
528
In physical security what is the purpose of a dead zone in surveillance
To prevent unauthorized access by limiting surveillance coverage
529
Which sensor technology is most effective for detecting motion through walls
Microwave sensors
530
In physical security what is a mantrap
A vestibule with two sets of interlocking doors to control entry and exit
531
What is the primary goal of confidentiality in information security
To protect data from unauthorized access
532
What is the primary purpose of a mantrap in physical security
To control access by trapping intruders To provide a physical barrier against forced entry To ensure single person entry
533
In the context of emergency response planning, which of the following is the most crucial aspect
Detailed evacuation procedures Comprehensive employee training program Regular emergency drills and exercises
534
What is a zero day vulnerability
A vulnerability that is exploited before the developer is aware of it
535
Record safes for computer media require better protection than paper records because damage to computer media can occur at
125 degrees Fahrenheit
536
Which of the following is not a primary goal of a security program
Profit Maximization
537
What is the main advantage of using smart locks in residential security systems
Enhanced key control and monitoring
538
Which of the following is not a method of risk mitigation
Amplification
539
In the context of security sensors, what is a false alarm
An alarm triggered without any actual threat or intrusion
540
What is the importance of adjustable beam angles in security lighting fixtures for a large warehouses
Adjustable angles allow the lighting to be customized to specific areas of interest, enhancing surveillance and detection capabilities
541
How does the restrike time of HID lamps affect security coverage during temporary power disruptions
Long restrike times may leave areas temporarily dark
542
Why would an art museum use a capacitance based sensors for individual high value exhibits
To detect any unauthorized contact or proximity to the artwork, which could signal an attempt to tamper with or steal the piece
543
Which type of illumination has poor color rendition but is highly energy efficient
Low Pressure Sodium
544
Which of the following is not a common type of sensor used in intrusion detection systems
Biometric sensors
545
Which type of sensor is most suitable for detecting movement within a confine, indoor space such as a storage room
PIR sensor
546
How do active infrared sensors improve the security of outdoor concerts or events
They can be used to create a perimeter where anyone breaking the infrared beam can trigger an immediate security response
547
Which type of lock is most resistant to picking and bumping
Disk detainer Lock
548
Which of the following best describes a security incident report
A record of security breaches and responses
549
Which of the following is a key challenge in implementing a security operations center (SOC)
High Initial cost Difficulty in integrating with existing systems Limited skilled personnel availability
550
What is the primary advantage of using thermal imaging sensors in security applications
Ability to detect intruders in complete darkness
551
In Security lighting, what is color rendition
The ability of a light source to accurately reproduce colors
552
Which of the following describes the principle that an employee should be under the direct control of one and only one immediate supervisor
Unity of command
553
Which of the following best describes the role of a security audit
To evaluate the effectiveness of security measures To identify potential security vulnerabilities To ensure compliance with security policies
554
What is the role security training for employees
To ensure employees understand and follow security protocols
555
Which of the following is not typically included in a security policy
Marketing strategies
556
Which of the following is not a common feature of high security fence
Wooden posts
557
Which of the following is a fundamental principle of GDPR (General Date Protection Regulation)
Data minimization
558
What is the primary advantage of using LED lights in security lighting
Greater energy efficiency and longer lifespan
559
Which of the following best describes the concept of resilience in crisis management
The ability to recover quickly from crisis
560
Which of the following best describes an inductance based sensor
Measures changes in inductance caused by metallic objects
561
What is the primary function of a bollard in perimeter security
To provide barrier against vehicular threats
562
What is the primary function of a security checkpoint
To detect and prevent unauthorized items from entering
563
What is the primary advantage of using a multi layered security approach
Increased redundancy and depth
564
Which of the following best describes a crisis management drill
A practice scenario to test crisis response
565
What is the primary characteristic of a metal halide light in security building
Excellent color rendition
566
What is the role of a crisis management team
To manage and respond to crisis
567
In the context of physical security, what is the primary purpose of implementing security layers
To provide multiple levels of protection to deter, detect and respond to threats
568
What is the primary goal of incident response planning
Minimizing damage from incidents
569
Which of the following is not a characteristic of a class III high security safe
Lightweight construction
570
What is the main purpose of a security incident response plan
To manage and mitigate the impact of security incidents
571
Which of the following is not a benefit of conducting regular security audits
Reducing operational costs
572
What is the main purpose of implementing security metrics
To measure security effectiveness
573
Which type of sensor is most effective for detecting motion in large open spaces
Microwave sensors
574
Which of the following is not a characteristic of a strong security policy
Profitability
575
What is the primary benefit of using combination locks in secure facilities
No need for keys
576
Which of the following is not a benefit of using thermal imaging cameras for perimeter security
Lower cost compared to visible light cameras
577
Which of the following describes the principle of a operation for a capacitance based sensor
Measure changes to capacitance when a conductive object enters the field
578
What is the principal function of a double cylinder deadbolt lock
Requiring a key for operation from both sides of the door
579
What type of sensor is most effective for detecting unauthorized entry through walls
Microwave sensors
580
Which of the following is not a common type of network security threat
Data encryption
581
What is the role of security lighting in physical security
To deter criminal activity by increasing visibility
582
What is the primary purpose of a security breach detection system
To prevent unauthorized access to secure areas
583
What is the most effective method for preventing tailgating in secure facilities
Implementing mantraps or turnstiles
584
Which of the following best describes the operation of a mono static radar sensor
Transmitter and receiver are co located
585
Which type of sensor is not affected by changes in temperature
Capacitance based sensor
586
What is the purpose of security perimeter
To delay and detect intruders
587
Which of the following is an example of physical security threat
Unauthorized entry
588
Which of the following best describes the purpose of a security checkpoint
To control and monitor access to a restricted area
589
Which of the following is a key consideration for physical security information management system (PSIM)
Cost Scalability
590
Which of the following is not a principle of risk management
Risk elimination
591
What is the primary function of video analytics in security systems
To automatically analyze video data for security purposes
592
What is the primary purpose of a duress alarm system in a secure facility
To alert security personnel of an emergency situation
593
What is the most critical factor in the effectiveness of an intrusion detection system (IDS
Detection accuracy
594
in the context of physical security what is bollard spacing
The distance between bollards to prevent vehicle passage
595
In physical security what is the purpose of a intrusion detection system
To direct unauthorized entry into a secured areas
596
Which of the following is a characteristic of a secure password
It contains a mix of letters, numbers, and symbols
597
Which of the following best describes the primary function of a terrain following radar
To follow the contours of the terrain for low altitude flight
598
Which of the following best describes the concept of security by design
Integrating security measures into design of facilities from the outset
599
Which of the following best describes the principle of defense in depth
Using multiple layers of security controls to protect assets
600
What is the primary advantage of using biometric access control systems in high security environments
Non intrusive and high accuracy identification
601
What is the primary function of a mortise lock
Providing a secondary locking mechanism
602
Which of the following best describes the concept of defense in depth
Using multiple layers of security controls
603
What is the primary objective of crisis prepareness
To ensure readiness to handle crisis effectively
604
Prevent Loading dock access
Lighting Controlled access
605
What is the primary purpose of a vulnerability assessment
To identify weakness in security measures
606
What is the main disadvantage of a using physical barriers for security
High cost Complexity of implementation Reduced flexibility
607
Which of the following best describes the principle of a mono static radar sensor
Transmitter and receiver are co located
608
What is the purpose of crisis debriefing
To review and analyse the response to crisis
609
Which of the following best describes the purpose of a security survey
To assess the effectiveness of existing security measures and identify improvements
610
Which of the following best describes the concept of layered security
An approach to security that uses multiple levels of protection
611
Which of the following is an example of multi factor authentication
Password and fingerprint
612
What is the primary function of a strike plate in a door lock assembly
Providing a surface for the bolt to engage
613
Which of the following is not a component of a security risk assessment
Market positioning
614
What is the primary benefit of using security glazing on windows
Enhanced protection against forced entry and breakage
615
What is the primary objective of a business impact analysis (BIA)
To evaluate the potential effects of disruptions on business operations
616
What is the purpose of a security risk assessment
To identify and evaluate potential security threats
617
Which of the following is a primary feature of biometric access control systems
Use of unique biological traits for identification
618
What is the role of a security barrier in physical security
To obstruct or control the movement of vehicles and people
619
Which of the following is an example of a physical security measure
Surveillance cameras
620
Which of the following best describes convergence in security
Physical and cyber integration
621
Which of the following is not a common objective of a security policy
Maximizing employee productivity
622
Which of the following is a key component of an effective security strategy
Proactive Measures Reactive Measures
623
What is the role of leadership in crisis management
To provide direction and support during a crisis
624
Which of the following best describes the operation of an inductive proximity sensor
Measures changes in inductance when a metal object approaches
625
Which of the following is a common physical barrier in security
Fences
626
Which of the following is key for secure access control
Reliability Convenience
627
In Security lighting, what is meant by the term strike time
The time taken for a light to reach full brightness after being switched on
628
What is the primary function of surveillance cameras
To monitor and record activities for security purpose
629
Which of the following is a primary goal of physical security
Protecting physical assets and people
630
Which of the following is typical characteristic of a high security lock
Resistance to picking and drilling
631
Which of the following is considered the most effective method for securing a high value storage areas with a facility
Implementing biometric access control and CCTV surveillance
632
What is the main purpose of security awareness programs
To educate employees about security risks
633
What is the function of a security barrier
To obstruct or control movement for security purposes
634
Which of the following is not a primary objective of physical security
To monitor employee productivity
635
What is the primary purpose of a vulnerability assessment in physical security
To identify weakness in security measures
636
Which of the following best describes a safe room
A secure room to protect individuals during emergencies
637
What is the role of an escort policy in physical security
A guideline for accompanying visitors within secure areas
638
In the context of emergency response planning, which of the following is the most crucial aspect to ensure the safety of personnel
Detailed evacuation procedures Comprehensive employee training programs Regular emergency drills and exercises
639
Which type of lock is considered the most secure
Deadbolt lock
640
Which of the following best describes the role of a security officer during an emergency
To ensure orderly and safe evacuation of personnel
641
In the context of security sensors, what is a nuisance alarm
An alarm caused by environmental factors or harmless stimuli
642
The most common types of sensors used with protect vaults are vibration and
Contact
643
In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance
Increased lighting in open areas
644
Which of the following is not a feature typically found in high security padlocks
Wifi Connectivity
645
What is the purpose of security signage
To provide warnings and instruction to enhance security
646
In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance
Increased lighting in open areas
647
Which of the following is not a primary goal of security risk assessment
Developing new products
648
What is the primary function of a security information and event management (SIEM) system
To monitor and analyze security events
649
Which of the following is the most critical factor in selecting a security fence for a high risk facility
Height of the fence Material of the fence
650
What is the role of lighting in physical security
To deter criminal activity by increasing visibility
651
In the context of physical security, what is the most effective method for preventing unauthorized access through a loading dock
Increased lighting Controlled access points and surveillance
652
Which of the following is an example of a security measure for protecting physical assets
Security patrols
653
Which of the following is not a component of a comprehensive security policy
Marketing strategies
654
In the context of security sensors. What is the probability of neutralization (pn)
The probability of an adversary being neutralized
655
Which of the following best describes least privilege
Minimum access
656
What is the primary function of a duress alarm in a security facility
To alert security personnel of an emergency situation
657
What is the primary function of a duress alarm system
To alert security personnel of an emergency
658
What is the primary advantage of using thermal imaging cameras for perimeter security
Ability to detect intruders in low visibility conditions
659
Which of the following is not a primary consideration when selecting a security integrator
Proximity to the facility
660
Which of the following is an example of a physical security control for protecting assets
Surveillance cameras
661
What is a common indicator of a phishing attack
An unexpected email asking for personal information
662
In the context of sensors, what is the primary function of a passive infrared (PIR) sensor
To detect infrared radiation emitted by objects
663
Which of the following is not a component of the Crime Prevention Through Environmental Design (CPTED) strategy
Data encryption
664
Which of the following best describes the role of a security officer during an emergency
To ensure orderly and safe evacuation of personnel
665
In physical security. What is a restricted area
An area where access is limited to authorized personnel only
666
Which of the following best describes an intrusion detection system (IDS)
A system designed to detect unauthorized access or breaches
667
What is the purpose of security badges
To identity and control access for employees and visitors
668
Which of the following best describes the role of a security operations center (SOC) in physical security
To coordinate security efforts and provide real time monitoring and response
669
What is the primary function of a turnstile in an access control system
To provide a physical barrier that allows only one person to pass at a time
670
Which of the following best describes a crisis
An unexpected event that threatens the organization
671
In physical security, what is the purpose of a restricted area
To limit access to authorized personnel only
672
Which of the following is a key component of a crisis management plan
Response procedures
673
What is the primary purpose of using a volumetric sensor in security systems
To detect changes in volume within a define area
674
What is data encryption
To ensure data is only accessible to authorized users
675
Which of the following best describes anti tailgating devices in access control systems
Devices that prevent unauthorized following into secure areas
676
What is the primary purpose of a crisis management plan
Ensuring effective response to crisis
677
What is the primary function of an anti pass back feature in an access control system
To ensure that an individual cannot re enter an without first exiting
678
What is the main disadvantage of using biometrics for authentication
High Cost Complexity of implementation
679
Which of the following is a critical consideration when designing a secure data center
Redundant power and cooling systems
680
High value storage method
Biometric control
681
What is the primary role of a Chief Information Security Officer (CISO)
Overseeing the organization information security program
682
Purpose of mantrap
Control entry Provide barrier
683
What is the main disadvantage of using keypad locks in high security environments
Susceptibility to wear patterns revealing the code
684
In physical security, what is target hardening
Making a facility more resistant to attacks through physical measures
685
Which of the following is not an effective preventive measure in physical security
Conducting financial audits
686
What is the primary role a chief security officer (CSO)
Managing the organizations security strategy
687
What does the term personnel security refer to in the ASIS CPP Doman
Security Measures for employees and contractors
688
Which of the following is not a feature typically found in high security padlocks
Wi-Fi Connectivity
689
In access control systems, which of the following is considered a dual factor authentication method
Card reader and finger print scan
690
Why are strike and restrike times critical factors in the design of high security locks
Strike and restrike times determine how quickly a lock can reset after breach attempt, ensuring that repeated forced entry attempts are less likely to succeed
691
Which of the following is a primary risk of using narco analysis in legal cases
Inconsistent results under controlled substances Violations of human rights laws The potential of coerced or fabricated memories
692
Which of the following is not an assumption of McGregor's Theory X
Employees are motivated by financial rewards
693
What is the main legal consideration when implementing a workplace violence prevention program
Ensuring the program does not violate privacy or discrimination laws
694
Which of the following is not a key component of risk management
Risk Elimination
695
What is the main disadvantage of relying solely on physical evidence
Susceptibility to environmental conditions
696
Which of the following is a physical security measure for protecting information
Locked filing cabinets
697
what type of sensor would be most effective in detecting an intruder in noisy industrial environment
Seismic Sensor
698
Which of the following is a critical consideration when choosing a cold site for disaster recovery
To availability of IT resources to rebuild operations
699
Which of the following is an example of a natural access control
Shrubs
700
When considering span of control which factors increases complexity
Broader span of control More sophisticated interactions
701
Which of the following is not a benefit of encryption
Enhancing data availability
702
In a biometric vault lock systems, what is the main advantage over mechanical locks
Elimination of physical keys
703
Why might a security system designer opt for passive sensors in a highly secure data center
They do not emit energy that could potentially interfere with sensitive data equipment
704
What is the primary goal of financial management within security operations
Ensuring Operational efficiency
705
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
706
In what scenario might a multi tiered incident command structure actually slow down crisis response
When decision making processes become bureaucratic due to excessive layers
707
What is the fundamental difference between threat assessment and vulnerability assessment in a security context
Threat assessment focuses on the external environment, while vulnerability assessment focuses on internal weakness
708
What is the main purpose of using a terrain following radar in security applications
To follow the contours of the terrain for low altitude flight
709
Which of the following is an example of personnel security best practices
Regularly updating passwords Implementing two factor authentication Conducting background checks on employees
710
Combinations should be changed whenever a person who knows it is terminated or not longer requires access or if there has been some form of compromise. At a minimum, combination should be changed
Every 1-2 years
711
During disaster recovery planning, why is it important to consider the geographic location of backup facilities
To mitigate the risk of the same disaster affecting both primary and backup sites
712
Which sensor type is least likely to generate false alarms due to movement of small animals
PIR sensor
713
What is the purpose of a personnel security policy
To ensure compliance with legal and regulatory requirements
714
What is the primary function of line detection sensors in perimeter security systems
Detecting vibration along a fence line
715
Why is it important to analyze past incidents of workplace violence in a risk assessment
To identify patterns and contributing factors for future prevention
716
How can failure to properly train staff for crisis scenarios undermine a well developed continuity plan
Employees may fail to execute their roles effectively, leading to confusion It increases the potential of human error in communication
717
In the context of business strategy, what is the purpose of a strategic business unit (SBU)
An SBU operates as a independent entity with its own strategic planning, responsible for managing a specific set of products or markets
718
What is the primary goal of an incident response plan
Preventing future incidents Ensuring business continuity
719
What is the main purpose of BCMS audit
Identifying areas of improvement Ensuring regulatory compliance
720
Which of the following is not a common method of access control
Encryption
721
In risk management context what is the main objective of implementing risk avoidance strategies
To completely eliminate the potential for specific risks to occur
722
Which of the following is a potential threat to personnel security
Insider threats Social engineering attacks Physical security breaches
723
What advantage does volumetric sensor have over a perimeter sensor in securing large warehouse
It provides coverage within the entire volume of the space, not just at the entry points
724
Which of the following is not a benefit of using incident response plans in security management
Simplifying user management
725
What is the main goal of using the alternative question technique in the REID method
To make the suspect choose between two versions of events
726
What is the main purpose of security
To protect classified information To ensure employee satisfaction To maintain a safe work environment
727
What is the primary purpose of using triangulation in an investigation
To cross check information from multiple sources
728
Which of the following is a best practice for securing wireless networks
Disabling SSID broadcast
729
In a high security environment what is the primary advantage of using facial recognition technology
Non intrusive identification High accuracy
730
Which of the following is an example of an operational risk
A cybersecurity breach
731
Which of the following sensors is most likely to be affected by environmental conditions such as rain or fog
Infrared Sensors
732
What is the primary purpose of conducting a security audit
Identifying security awareness
733
Which type of lighting has the slowest restrike time after a power outage
Sodium vapor lighting
734
Which of the following is not a characteristic of strong personnel security program
Lack of security policies and procedures
735
What is the greatest limitation of microwave sensors in detecting slow moving adversaries
Microwave sensors rely on detecting Doppler shifts, which may not be significant when and adversary moves slowly
736
Which business function is primarily responsible for managing the flow of goods and services
Operations
737
Which of the following is the primary goal of buy bust operations in drug investigation
To arrest the dealer and confiscate drugs immediately
738
What is the greatest risk in relying solely on historical data for future crisis management planning
It may not account for emerging threats like cyber risks or geopolitical shifts
739
Which of the following is not a typical step in the risk management process
Risk enhancement
740
In a combination locks, what is the function of the spindle
It transfers movement from the dial to the internal mechanisms
741
Which of the following is the most critical aspect of a witness interview
Maintaining objectivity
742
Which of the following is a key concern when conducting a polygraph examination
The emotional state of the subject The training and expertise of the examiner The physiological variability between individuals
743
What is the primary purpose of building rapport in the PEACE model of interviewing
To encourage voluntary cooperation and honesty
744
What is the greatest challenge in securing multi tenant buildings with shared facilities
Ensuring that each tenants security measures do not conflict with others
745
Which of the following is a key characteristic of Theory Y as proposed by McGregor
Employees are self directed and seek responsibility
746
What is the primary function of a terrain following sensor in a multi layered security system
To adapt its detection range and sensitivity based on the natural contours of the landscape, providing seamless coverage in uneven terrain
747
Which of the following is not a principle of secure coding
Data encryption
748
How to amphetamines differ from methamphetamines in terms of chemical structure and investigative focus
Methamphetamines contain an additional methyl syrup, making them more potent and more addictive
749
What is the main goal of a risk assessment in BCMS
Identifying potential threats
750
How does HIPAA affect healthcare fraud investigation
Investigator must obtain patient consent or legal authorization before accessing medical records, ensuring privacy is protected
751
Which of the following is not a requirement for obtaining a personnel security clearance
Credit check
752
Which of the following is not a principle of effective management a. Planning b. Delegating c. Organizing d. None of the above
None of the above
753
Which of the following describes the function of a volumetric sensor in physical security
Monitors the presence of objects within a defined value
754
Which sensor type is least affected by the presence of moving vehicles in the vicinity of a protected area
PIR sensor
755
Which of the following type of vault doors typically offers the best combination of fire resistance and security
Composite Door
756
According to Maslow's Hierarchy of needs, which of the following is considered a basic physiological need
Food and water
757
Which of the following is an example of a qualitative risk assessment method
Risk Matrix
758
Which of the following is not a factor to consider when conducting a personnel security investigation
Social media activity
759
What is the primary goal of an incident response plan
Preventing future incidents Ensuring Business continuity
760
Which of the following is not typically included in a threat assessment
Historical weather data
761
What is the primary purpose of a security risk assessment
To identify potential threats
762
Which of the following would generally disqualify information form being treated as a trade secret within a company
The information has been published in a technical journal
763
In the context of interrogation techniques what is the purpose of theme development in the Reid technique
To minimize the suspects perception of moral wrong doing
764
Which type of intelligence is least likely to be admissible as evidence in a court of law
Signal Intelligence (SIGINT)
765
Which lighting type has the longest restrike time after a power outage
Sodium vapor lighting
766
What is the main disadvantage of implementing excessive security measures
Increased complexity Higher Costs Reduced Efficiency
767
Which of the following best describes the concept of data carving in digital forensics
Reconstructing deleted data
768
What is a major advantage of using active infrared sensors in the security of logistics and shipping yards
Active infrared systems can create a grid of beams, any interruption in the beam pattern by unauthorized entry triggers alarms
769
What is the primary benefit of regular BCMS training for employees
Increased organization resilience
770
Which of the following is not a common method of ensuring data availability
Encryption
771
Which of the following is not a type of security control
Operational
772
Which of the following lock types provides the highest level of resistance to key bumping
Magnetic lock
773
What is the purpose of conducting background checks on employees
To assess their suitability for a specific job role
774
In the context of fire safety, which type of detector is designed to identify a fire in its incipient stage before any smoke is visible
Rate of rise
775
Which of the following is an example of a qualitative risk assessment method
Risk Matrix
776
Which of the following is a primary objective of a security policy
To outline acceptable use of resources To ensure compliance with legal requirements To establish a framework for security management
777
What operational principle allows capacitance based sensors to detect intrusions through walls or other barriers
They detect changes in electrical fields caused by the proximity of a person or object to the sensor
778
The three basic type of glass are
Sheet Plate Float
779
What is the best method for ensuring the effectiveness of surveillance in a corporate environment
Employing a combination of human and technical surveillance methods
780
Which CPTED principle would most directly involve the strategic placement of shrubbery and hedges
Territorial reinforcement
781
What is the primary disadvantage of using undercover operations in investigation
Legal and ethical considerations
782
Which sensor technology is typically least effective in detecting slow moving objects
PIR sensor
783
What is a key challenge in conducting threat assessments for modern organizations
Accurately predicting emerging threats in an ever changing threat landscape
784
In a sting operation targeting organized crime, which of the following factors would be most critical to a successful outcome
Security cooperation from lower level members of the organization Gaining judicial approval for undercover methods Ensuring all illegal activity is initiated by the suspects
785
Which of the following is not a benefit of using multi factor authentication (MFA)
Simplifying user experience
786
In an undercover investigation, what is a primary risk associated with a cold hire
Lack of prior planning
787
Cost of security losses can be both direct and indirect, Which of the following is not an example of a direct cost
Loss of employees
788
Which of the following is not a benefit of using thermal imaging cameras for perimeter security
Lower cost compared to visible light cameras
789
Which of the following is not a common method of detecting tampering in high security locks
Magnetic fields
790
In a threat and vulnerability assessment, which factor is most likely to increase the likelihood of a threat
The frequency and proximity of similar incidents
791
How might a suspect use a social engineering to gather intelligence on an ongoing investigation
By manipulating employee or insiders into revealing confidential information
792
Which of the following best describes the difference between McClelland's need for achievement and need for power
Need for achievement is driven by success, while need for power is drive by influence
793
Which of the following best describes the operation of an active infrared sensor
Emits infrared radiation and detect its reflection from objects
794
What is the purpose of personnel security
To protect classified information
795
How can organizations failure to include regular testing in its crisis management plan backfire during a real crisis
The plan may be not effective in practice as it seems on paper Employee may not be familiar with their roles and responsibilities Communication lines might fall under pressure
796
In the context of drug investigations, what is the most effective way to ensure the identification of synthetic cannabinoids like spice during testing
Using gas chromatography mass spectrometry (GC-MS) for chemical analysis
797
In what way does the installation of high CRI lighting near art exhibits enhance security
It improves the ability of surveillance equipment to accurately capture the true colors of the artworks, which is crucial in the event of theft or damage
798
How can the deployment of honeypots in cybersecurity investigations complicate the evidence collection process
It may collect evidence that is inadmissible due to entrapment concerns
799
According to McGregor's Theory which of the following best describes employees motivation
Employees are motivated by intrinsic factors and seek fulfillment
800
The highest priority in any computer security program is
Careful screening of personnel
801
What is the purpose of a preemployment screening process in personnel security
To determine an individuals potential for misconduct
802
What is the key challenge of integrating business continuity and disaster recovery strategies into a single framework
Balancing operational with IT system recovery timelines
803
Which of the following best describes a zero day vulnerability
A vulnerability that is known to attackers but not yet patched by the vendor
804
Which of the following is not a principle of secure coding practices
Hard coding credentials
805
What is the primary risk of not securing maintenance access points such as HVAC or utility rooms in high security facilities
Maintenance areas can provide adversaries with entry points that bypass access control systems
806
In physical security what is force protection
Measures taken to prevent or mitigate hostile actions against personnel and facilities
807
What is the primary goal of background checks in personnel security
To verify employment history To assess an individuals character To identify potential security risks
808
Why are passive infrared (PIR) sensors widely used in residential security systems
They are inexpensive compared to other sensor types and effective in detecting human presence through body heat
809
In Herzberg's theory, which of the following is considered a hygiene factor that can lead to job dissatisfaction
Work conditions
810
In the context of financial planning, what is the purpose of a zero based budget
To justify every expense in the budget from scratch without relying on historical data
811
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
812
How can failure to properly train staff for crisis scenarios undermine a well developed continuity plan
Employees may fail to execute their roles effectively, leading to confusion It increases the potential for human error in communication
813
In the context of security lighting, what is luminance
The perceived brightness of a light source
814
Which of the following is not a potential threat to personnel security
Workplace accidents
815
Which of the following is not a potential threat to personnel security
Workplace accidents
816
Which of the following is a responsibility of the personnel security
Investigating security incident
817
Which of the following is the best method for verifying the authenticity of a suspects alibi in a digital fraud investigation
Cross referencing financial records Analyzing IP addresses and digital timestamps
818
Under ISO 31000 which of the following is considered the first step in the risk management process
Risk identification
819
What is the primary goal of personnel security
To prevent insider threats
820
Which of the following is a best practice for securing wireless networks
Disabling SSID broadcast
821
What is the biggest challenge in implementing a workplace violence prevention program
Monitoring employees behaviour without violating privacy laws
822
Which vault lock system is most effective at deterring forced entry attempts
Time delay lock
823
In the context of cybersecurity, what is the greatest risk posed by privilege escalation attacks
Once adversaries gain elevated privileges, they can access modify of destroy critical systems and sensitive data
824
In CPTED, what is the significance of territorial reinforcement
It uses physical design elements to define boundaries and create a sense of ownership, deterring criminal behaviour
825
Which of the following is not a advantage of video surveillance
Privacy protection
826
What is the purpose of security clearances in personnel security
To grant access to classified information To ensure individuals are trustworthy To prevent unauthorized disclosure
827
Which of the following would be the least effective application for a capacitive sensor
Detecting air temperature changes
828
How might a candidate use a references false identity to mislead an employer during a background investigation
By hiring a professional to impersonate the reference during calls
829
What is the main benefit of using electromagnetic locks in secure facilities
Easy to integrates with access control systems
830
The three focus areas required to deal with strikes and labor disputes include all the following except
Post strike intelligence
831
Which of the following is not a common method of achieving data confidentiality
Data replication
832
Which of the following is a not a benefit of encryption
Enhancing data availability
833
Why is conducting a social media audit during a personnel risk assessment important
To identify any potential reputational risks associated with the individual
834
Which of the following is not a assumption of McGregor's Theory X
Employees seek responsibility
835
In digital forensics, which of the following is most likely to cause the loss of critical evidence during the collection
Failure to image the drive
836
Which of the following lighting types provides the least effective illumination for security cameras
Sodium vapor lighting
837
What is the main purpose of security policy in ESRM
Defining security roles and responsibilities Enhancing operational efficiency
838
What is the role of security awareness training program
To educate employees about security risks and best practices To enforce compliance with security policies and procedures To identify potential security vulnerabilities with an organization
839
Why is THC the primary focus in cannabis related investigations
THC is the psychoactive component responsible for the intoxicating effects of marijuana
840
Which of the following describes a common vulnerability of electronic locks
Dependency on power sources
841
Which security feature is most effective at preventing unauthorized duplications of keys
Restricted key system
842
In which case would a warm site be preferable to a hot site for a disaster recovery
When the organization can tolerate moderate downtime and costs need to be minimized
843
Which of the following best describes McGregor's Theory Y
Employees seek fulfillment and are motivated by challenges
844
Why might organizations experience extended downtime even with an established business continuity plan
Interdependencies between critical systems were not accurately mapped
845
Why is it critical for organizations to have a workplace violence policy in place
To address potential risks before violent incidents occur
846
What is the role of security policies and procedures in personnel security
To establish guidelines for employee behaviour
847
Security awareness supports many important goals. Which of the following is not a goal supported by security awareness
Support the security departments annual budgeting process
848
What is the primary challenge in using active sensors in densely populated urban environments
Interference from other electronic devices and signals in the environment
849
Which of the following is not a typical outcome of an effective cognitive interviews
Increased witness stress
850
Which of the following is a not a method of risk mitigation
Amplification
851
What is the purpose of a personnel security policy
To ensure compliance with legal and regulatory requirements
852
Anti-tailgating device function
Prevent Access
853
What is the key challenge of integrating business continuity and disaster recovery strategies into a single framework
Balancing operational continuity with IT system recovery timelines
854
Why might recovery point objectives (RPOs) in business continuity plans be unrealistic
Lack of alignment between business and IT recovery priorities
855
According to McGregor's Theory X, which of the following management styles is most effective
Authoritative Management
856
Which type of lamp would a security professional likely avoid for areas where precise color discrimination is necessary under surveillance cameras
Low pressure sodium lamps
857
Why is it critical to perform a business impact analysis (BIA) before finalizing business continuity plans
To determine the potential operational and financial impacts of different types of disruptions
858
What is the primary benefit of integrating BCMS with risk management
Enhanced organizational resilience Improved financial performance
859
In Maslow's hierarchy of needs which of the following needs is considered basic survival need
Physiological
860
In what scenario would an adversary exploit the weakness of a line detection sensor system
By crossing under or over the detection line without triggering the sensor
861
When dealing with workplace violence what is the mail purpose of conducting a post incident review
To identify security gaps and prevent future incidents
862
Which of the following is not a common method of achieving data confidentiality
Date replication
863
Which management function involves setting objectives and determining a course of action for achieving those objectives
Planning
864
What is the primary goal of a security policy
Defining acceptable use of resources
865
What is the function of a glass break detector in a security system
Detects changes in sound frequency
866
Why is business continuity planning increasingly incorporating black swan event scenarios
Black swan events, though rare, have extreme impacts that can severely disrupt operations if not accounted for
867
What is the purpose of background checks in personnel security
To verify the identity of individuals To assess the trustworthiness of individuals To identify potential risk or vulnerabilities
868
What is the primary goal of penetration testing
Identifying and exploiting vulnerabilities
869
Which of the following is not typically part of the due diligence
Interviewing all employees
870
Which sensor is less likely to be triggered by small animals and debris
Microwave sensors are less likely to be triggered by small animals and debris, reducing false alarms
871
In what scenario might a hot site become ineffective during disaster recovery
If the disaster effects both the primary site and the hot site, redundancy become ineffective
872
Which of the following is not typically considered a red flag for financial fraud
Frequent travel for business purposes
873
Which of the following best describes McGregor's Theory X
Employees are inherently lazy and require strict supervision
874
In what scenario might perimeter intrusion detection systems (PIDs) be most effective
When monitoring large outdoor areas where access control is difficult to enforce
875
What is the purpose of security clearance
To grant access to classified information To assess a persons trustworthiness and loyalty To determine if a person is eligible for certain positions
876
What describes security through obscurity
Hiding Measures Visible Deterrents
877
When gathering digital evidence from a suspects computer, what is the most critical first step to ensure data integrity
Imaging the entire system without altering any files
878
Which of the following is not a forensic analysis type
Surveillance Analysis
879
In physical security systems, why is it important to include redundant alarm systems for high risk areas
A failure in one alarm system can leave facility vulnerable without immediate detection
880
What is a key limitation of traditional risk assessments in crisis management planning
They often fail to account for rapidly evolving risks like cybersecurity threats
881
When conducting mobile surveillance, why is the use of multiple vehicles an advantage
It reduces the likelihood of the target detecting surveillance
882
Which of the following is a critical consideration when choosing cold site for disaster recovery
The availability of IT resources to rebuild operations
883
How can failure to update business continuity plans lead to operational risk during crisis
Outdated plans may not reflect current risk, technologies or organizational structures
884
What is the main function of a perimeter intrusion detection system (IDS)
To detect and alert security personnel to breachers at the perimeter
885
In preventing workplace violence, why might regular behavioral risk assessment be beneficial
They assist in identifying early warning signs of potential violence
886
In a risk management context, what is the main objective of implementing risk avoidance strategies
To completely eliminate the potential for specific risks to occur
887
What is the primary function of an intrusion detection system (IDS)
Detecting and alerting on potential security breaches
888
How does the strike time of a lighting systems influence security measures during a initial power up
Longer strike times can delay the effectiveness of security systems
889
In a crisis management plan, what is the main advantage of having a hot site for disaster recovery
It reduces recovery significantly since the site is fully operational
890
How does the implementation of bistatic sensors increase the effectiveness of a security system along a national border
Bistatic sensor can detect low flying or small , slow moving objects that might not trigger monostatic sensors
891
What is the main disadvantage of using RFID locks in physical security
Susceptibility to electromagnetic interference
892
What is the most common defense strategy in drug related cased involving controlled buys
Claiming the suspect was entrapped by law enforcement
893
Which is the most crucial aspect when setting up a proprietary investigative unit
Selection of professional personnel
894
In Security management, what is the primary goal of a contingency plan
To ensure rapid recovery from incidents
895
What is the primary role of threat assessment teams in preventing workplace violence
To evaluate potential threats and recommend preventive measures
896
Which of the following is a primary criticism of Herzberg's Motivation Hygiene theory
It assumes all employees are motivated by the same factors
897
In disaster recovery what is the key purpose of the recovery point objective (RPO)
To define the acceptable amount of data loss in terms of time
898
Which of the following is not a purpose of personnel security
Ensuring physical measures are in place
899
Which of the following is not a digital evidence integrity method
Encrypting
900
Why might using biometric access control present a significant vulnerability in high security environments
Biometric data breaches could lead to identify theft with irreversible consequences
901
What is the most effective method for securing a facility's perimeter
Using a combination of physical bearers, surveillance and access control
902
Earnings Before Interest Taxes and Amortization (EBITA) divided by revenue is a formula to calculate
Operating profit margin
903
What is the main security feature of a safe with TL 15 rating
Resistance to forced entry for 15 minutes
904
In what scenario would a cold site be preferable over hot site for disaster recovery
When cost is a major constraint and immediate recovery is not critical
905
In an airport security setting, how can bistatic radar sensors improve the monitoring of unauthorized zone intrusions over monostatic radar sensors
Bistatic radar can cover multiple angles and directions, reducing blind spots and enhancing detection capabilities
906
Which of the following is not an appropriate technique for conducting effective interviews
Leading the interviewee towards a specific answer
907
In Herzberg's theory which of the following is considered a motivator that can lead to job satisfaction
Achievement
908
Why might a security system designer opt for passive sensors in a highly secure data center
They do not emit energy that could potentially interfere with sensitive data equipment
909
Which of the following is a significant risk in cold hire operations
The operatives identity being exposed The operation losing legal standing due to improper procedures The potential for entrapment claims by the defense
910
Why is it difficult to calculate return on investment (ROI) for business continuity plans
Calculating prevention benefits is speculative compared to real time disaster recovery costs
911
What is the primary objective of an asset search in fraud investigation
To identify hidden assets
912
Vault lock can be considered a potential security risk if not properly managed
Access codes
913
In the context of legal and regulatory compliance, what is the role of Foreign Corrupt Practice Act (FCPA) in security operations
It prohibits
914
Which of the following is considered inadmissible in most courts due to reliability concerns
Polygraph results
915
What is the primary purpose of an incident response plan
To respond effectively to incidents
916
In a large decentralized organization which factor presents the greatest challenge to standardizing crisis management protocols across multiple locations
Cultural differences influencing risk perception
917
What is the primary purpose of using surveillance in an investigation
To gather evidence
918
Which of the following is not a key consideration in designing a physical security plan
Establishing communication protocols
919
Why is continuous monitoring important in business continuity planning
Continuous monitoring helps identify new threats in real time, allowing the organization to adjust its plans as necessary
920
A craving for drug is exhibited often by the following
Water running from nose or eyes Frequent yawning or sneezing Continual itching of arms and legs
921
Which lock type typically has the fastest restrike time
Magnetic lock
922
Which of the following is a critical first step when investigating a cybersecurity breach
Isolating affected systems
923
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
924
Which of the following is not a benefit of conducting a security risk assessment
Reducing need for compliance
925
The statement that best describes the purpose of a scrambler in communications security is
It disguises information so it is unintelligible to those who should not have access to it
926
How might an employee with a known history of workplace violence bypass traditional risk assessment protocols
By hiding their involvement in past incidents through legal settlements
927
How does the integration of microwave sensors into an airports security system enhance its capability to detect unauthorized access
These sensors can cover large open areas, such as runways and parking lots, more effectively than other types of sensors
928
How might a disgruntled employee attempt to by pass workplace security measures to carry out an act of violence
By utilizing insider knowledge of the facility's layout and security weakness
929
The highest priority in any computer security program is
Careful screen of personnel
930
What type of lock is generally used for securing high value items against unauthorized access in both commercial and residential applications
Pin Tumbler Lock
931
In the context of interviewing, what is the primary purpose of an open minded question
To encourage detailed response
932
Why might an executive protection team need to coordinate with cybersecurity experts during a high profile event
To prevent the executives devices from being hacked
933
How does the integration of the line detection sensors along with the PIR sensors enhance the security of a residential community's perimeter fence
Line detection sensors can trigger lights and cameras, while PIR sensors provide a secondary confirmation of human presence reducing false alarms
934
In an environment with high airflow and temperature changes which sensor type is least likely to trigger false alarms
Microwave sensor
935
Which of the following is not a benefit of using incident response plans in security management
Simplifying user management
936
An accurate assessment of the kinds of threats or risks affecting the assets to be safeguarded is known as
Loss event profile
937
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
938
What is the main advantage of implementing a risk transfer strategy in a security program
It shifts the financial burden of a potential loss to a third party usually through insurance
939
Which vault door material offers the best protection against both fire and physical intrusion
Composite steel
940
How does the principle of proportionality apply to the implementation of security measures
Security measures should be direct proportion to the assessment level of threat and risk
941
In which of the following cases would a cold site be preferred over a hot site
If the company can tolerate longer recovery times to minimize costs
942
What is the primary goal of encryption in information security
Preventing unauthorized access Ensuring Data integrity
943
What is the primary purpose of crisis management plan
Ensuring effective response to crisis
944
How might adversaries exploit gaps in an organizations disaster recovery plan during a global crisis
By taking advantage of delayed response to secondary risks
945
What is the significant advantage of using active infrared sensors in warehouse security systems
These sensors can operate in complete darkness, detecting breaches without the need for ambient light
946
In the context of threat assessment what is the most important factor to consider when identifying potential threats
The likelihood of occurrence and the impact of the threat on organizational assets
947
Which of the following techniques is designed to allow interviewees to provide their accounts without interruption or pressure
PEACE model
948
In the context of threat assessment what is the main objective of a consequence analysis
To evaluate the impact that a specific threat could have on the organization
949
What is the primary goal of financial management within security operations
Ensuring operational efficiency
950
__________ is used to compare the desirability of different ways of spending
Return on investment
951
The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is
Economic
952
How does a passive infrared (PIR) sensor detect an intruder
By measuring the infrared radiation naturally emitted from objects in its field of view
953
Which of the following is not a characteristic of a strong encryption algorithm
Speed of encryption
954
What is the significant advantage of using halogen lighting in terms of color accuracy for security operations
They emit a bright white light that enhances the clarity of recorded images
955
What is the role of security policies and procedures in personnel security
To establish guidelines for employee behaviour
956
What is the main advantage of performing vulnerability assessments in an organizations security planning process
It identifies weakness in the current security infrastructure that could be exploited by threats
957
What is the purpose of background check in personnel security
To verify an individuals identity To assess an individuals character and trustworthiness To ensure individual meets the requirements for a specific job
958
Which of the following is least likely to be factor in determining the patentability of an invention
Whether the invention provides a competitive advantage in its industry
959
What is the critical purpose of Probability of Interruption (Pi) in the adversary sequence diagram
To calculate the time between detection and the point of adversary neutralization
960
Which of the following is least likely to be considered a best practice for securing wireless networks in an organization
Using static IP addresses for connected devices
961
Wired glass is intended to provide resistance to
Shattering and fragmentation
962
Which of the following is a not a method of employee monitoring
Job performance reviews
963
What is the primary purpose of physical security
To prevent authorized access
964
Which of the following is most likely to prevent unauthorized access in a Bring Your Own Device (BYOD) environment
Implementing remote wipe capabilities for lost of stolen devices
965
Which lighting type is know for its energy efficiency and minimal heat emission, making it deal for long term security use
LED
966
What is the main purpose of audit trail
To document financial transactions
967
Which of the following best describes the best way to lower the probability of interruption (Pi) in a perimeter protection system (PPS)
Extend response times
968
What is the main purpose of a root cause analysis in investigations
Identifying the cause of an incident Preventing recurrence of incidents
969
In complex financial fraud investigations, why might investigators analyze corporate board minutes
To establish a timeline of decision making related to fraudulent activitiy
970
Which factor most significantly affects the performance of ultrasonic sensors in detecting motion through solid objects
The density and composition of the solid material
971
Which of the following is most likely to reduce the likelihood of fraud by addressing both opportunity and pressure within Cressey's Fraud Triangle
Strengthening internal controls and offering employee assistance programs for financial stress
972
How do terrain following microwave sensors adjust their detection patterns when deployed in environments with significant ground elevation changes
They continuously adjust the microwave beam's angle based on feedback from the ground
973
Which of the following would not be considered a motivator in Herzberg's two factor theory
Working conditions
974
According to McGregor which of the following best describes a Theory Y managers approach to leadership
Empowering and supportive
975
Which characteristic of Cat6a cables provides better performance in dense networking environments compared to standard Cat6 cables
Higher frequency transmission capabilities
976
Which of the following is a key element of a security risk management strategy
Implementing effective security controls
977
Which of the following is the most important factor in determining the Probability of interruption (Pi)
Sensor sensitivity
978
What is the primary goal of an access control system
To prevent unauthorized access
979
What is the primary purpose of a firewall in information security
Preventing unauthorized access
980
Which of the following is a least likely to be an important feature of a threat assessment teams deliberations during a bomb threat
Ensuring all members understand bomb disposal techniques
981
Which of he following is least likely to be a valid defence in a copyright infringement lawsuit
The copyright holder failed to properly register the work before the infringement occured
982
Which of the following is most likely to present a security risk when cloud storage solutions for sensitive data
Improper configuration of access permissions
983
What is the primary objective of an employee background check in an investigation
To verify the accuracy of the employees resume
984
Which of the following is not typically included in the calculation of EBITA
Taxes
985
Which sensor is best suited for detecting the movement of vehicles through a perimeter gate
Magnetic loop sensor
986
Which vault rating indicates that a vault can withstand 60 minutes of attack by sophisticated tools and expert burglars
Class 3
987
Which of the following combinations would increase the Probability of Loss (PoL) in a security environment
High threat likelihood and slow response times
988
What is the primary benefit of using network analysis in fraud investigations
Mapping relationships between suspects
989
Which type of glass provides the best protection against ballistic threats
Bullet resistant glass
990
In the context of vulnerability assessments, which of the following is least likely to reduce an assets vulnerability
Enhancing asset criticality
991
Which factor most influences the detection range of passive infrared sensors in areas with large thermal gradients
The emissivity of surrounding surfaces
992
Which of the following is least likely to be considered a factor in deciding whether to evacuate during a bomb threat
The proximity of high value assets
993
Which of the following combinations would reduce overall risk in a high criticality system
Delayed detection systems but immediate response capabilities
994
Which of the following types of evidence is most relevant for establishing intent in an embezzlement case
Financial records showing discrepancies
995
What is the primary role of threat likelihood in a the overall risk equation
It directly impacts the probability factor, which influences risk
996
Which of the following is least likely to qualify as copyright infringement
Copying short portions of a copyrighted work for educations purposes under fair use
997
What is the formula for determining the Expected Annual Loss (EAL) in risk management scenario
EAL = Asset value x Probability of Occurence
998
Which three factors are essential in calculating annual loss expectancy (ALE) for an asset
Single Loss Expectancy (SLE), frequency of occurrence, control costs
999
Which of the following technologies is considered the gold standard for trace explosives detection but is hindered by high costs and maintenance
Mass spectrometry
1000
Which type of lighting is most susceptible to failure in high humidity environments
Fluorescent lighting
1001
Which type of laminated glass is most resistant to forced entry, providing a high level of security in access points such as doors and windows
Bullet resistant glass
1002
Which of the following is not a characteristic of Maslow's self actualization level
Basic physical survival
1003
Which of the following is least likely to be a requirement for trade secret protection
The information must be a public knowledge
1004
Which of the following best describes the impact of a company's quick ratio when its account receivable collection period increases significantly
The quick ratio will decrease because accounts receivable are counted as liquid assets
1005
Which of the following is least likely to be an effective countermeasure for a denial of service (DoS) attack
Disabling all external network connections
1006
Which of the following is most likely to enhance the burglary resistance of a vault used for high value asset protection
Using composite materials for the vault to resist drilling and cutting
1007
What is the role of security policies and procedures in personnel security
To provide guidelines for employee behaviour To define the organizations security requirements To ensure compliance with legal and regulatory requirements
1008
What is the primary factor influencing the energy efficiency of high pressure sodium lamps compared to other lighting technologies
High Lumens per watt
1009
Which of the following is a least likely to be considered an effective security measure when standoff distance is impossible during a bomb threat
Installing blast resistant windows
1010
Which of the following combinations would decrease risk in a high vulnerability system
Low threat likelihood and strong response protocols
1011
Which of the following is the most probable to reduce the overall risk exposure for an organization
Developing contingency plans for high risk assets
1012
Which of the following is least probable to enhance the response function of a physical protection system (PPS)
Installing additional motion detectors
1013
What is the cost benefit formula for determining if a security measure should be implemented
if ALE>Mitigation Cost , Implement the control
1014
Which of the following is not a part of the adversary sequence diagram
Risk Mitigation
1015
In McClelland's theory of needs, which need is primarily associated with an individuals desire for influence and control over others
Need for power
1016
In a PPS, the delay function is most effective when
It provides enough time for response forces to engage
1017
In a physical security risk assessment, what is the primary purpose of a threat vulnerability matrix
To prioritize mitigation strategies based on the probability of a threat materializing
1018
Which of the following is most likely to lead to the rejection of a patent application
The inventions is considered obvious in light of existing technology
1019
Which of the following is most probable to reduce the effectiveness of a perimeter intrusion detection system (PIDS)
Installing detection systems to close to vegetation
1020
In the context of deter, detect, delay which of the following is most critical factor for effective deterrence
The visibility of security measures to potential adversaries
1021
Which of the following combinations would reduce overall risk in a high criticality system
Delayed detection systems but immediate response capabilities
1022
Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis
Lack of shared communication channels
1023
In crisis communication what is the primary disadvantage of over centralizing authority
It risk slow communication flows during fast moving crisis
1024
Which of the following is least likely to be a focus of ESRM in terms of risk mitigation
Maintaining a purely compliance based approach to security
1025
Which of the following would be most effective in detecting objects approaching at different heights, such as drones or vehicles
Microwave sensor
1026
Which lamp type is known for producing a warm, yellow orange light and is often used for roadway and outdoor security lighting
High pressure sodium
1027
Which of the following is a least probable to contribute to the success of a protection in depth strategy
Reducing the number of patrols within the secure area
1028
Which of the following is most likely to be the most difficult phase of bomb threat evaluation
Review phase
1029
Which factor would least likely increase the overall risk score for high criticality assets
Enhancing access control systems and reducing incident recovery times
1030
Which sensor technology is least affected by weather conditions such as rain and snow
Seisimic sensors
1031
Which sensor type if least likely to be triggered by small animals in outdoor environments
Microwave sensor
1032
What is the purpose of personnel security
To ensure safety of employees To protect sensitive information To prevent unauthorized access
1033
How can failure to properly train staff for crisis scenarios under a well developed continuity plan
Employees may fail to execute their roles effectively, leading to confusion It reduces managements ability to response in real time
1034
Which type of evidence is most likely to be considered suggestive rather than conclusive
An eyewitness identification after a lengthy delay
1035
Which of the following factors is most critical when determining Recovery Time Objectives (RTO) in a disaster recovery plan
The criticality of business functions
1036
Which of the following is the best method for ensuring that security policy is aligned with organizational objectives
Engaging leadership in policy development
1037
In a large decentralized organization, which factor represents the greatest challenge to standardizing crisis management protocols across multiple locations
Cultural differences influencing risk perception
1038
Which of the following is the most effective way to measure the success of a risk transference strategy
Reduction in insurance premiums
1039
Creating employee and management buy in to a security awareness program is not automatic. Security staff may face several obstacles in implementing a security awareness program. Which of the following is not an obstacle to an effective program
Adequate security staffing
1040
Which of the following is most probable to improve the deterrence capabilities of a PPS
Installing highly visible security cameras in public areas
1041
Which of the following combinations would most likely reduce the overall probability vulnerability of critical structure
Increasing detection systems and enhancing physical security measures
1042
In high risk environment, which type of top guarding offers the best resistance to professional intrusion tools like wire cutters
Concertina wire
1043
What is the purpose of security awareness program
To educate employees about security policies To train employees on security procedures To promote a culture of society
1044
In the CARVER method, which factor measures how easily and adversary can exploit a targets weakness
Vulnerability
1045
Which of the following combinations would most likely lead to employee motivation according to Maslow
Satisfying esteem and self actualization needs
1046
Which of the following is most likely to influence the design of an organizations crisis communication strategy
The size and complexity of the organization
1047
Which of the following is most critical when conducting Business Impact Analysis (BIA) in disaster recovery planning
Defining Recovery Time Objectives (RTO)
1048
Which force multiplier would be most relevant when gathering intelligence on an organized crime syndicate
Informants within the syndicate
1049
Which type of evidence is most likely to be considered circumstantial
Eyewitness testimony
1050
Which of the following is most likely to affect the timing of an organizations business continuity plan activation
The duration of the crisis event
1051
Which type of lock is most commonly used for high security applications due to its ability to resist physical destruction and picking
Lever lock
1052
Which type of sensor is most effective for detecting unauthorized entry through windows
Acoustic glass break sensors
1053
What is the primary role of identifying hazard frequency in a security risk model
To prioritize risk mitigation strategies based on the likelihood of hazard occurence
1054
What are the four objectives of a vulnerability assessment
Facility characterization, evaluation of the facility's PPS, a site survey of detection, delay and response, data to estimate performance against specific threats
1055
Which of the following is most likely to result in legal liability for an investigator during the course of an investigation
Collecting evidence without proper documentation of chain of custody
1056
Which of the following is least likely to improve the burglary resistance of a safe used to store sensitive documents
Adding an additional layer of fire resistant insulation to the safe
1057
Which of the following best explains how a company's trade secrets may be inadvertently disclosed to competitors
Filing for a patent based on a trade secret that requires full disclosure of the invention
1058
Which factor is least likely to increase the Probability of interruption (Pi) for an adversary targeting critical infrastructure
Increased detection sensitivity but poorly trained response personnel
1059
What are the basis functions of a security officer force
Access control, patrol, escort, inspection, monitoring, emergency purpose, dealing with disturbed people, special assignments
1060
According to Herzberg's theory, which of the following would most likely lead to job dissatisfaction
Poor working conditions Low salary
1061
Which of the following best describes a major challenge of conducting interviews with children using the cognitive interview technique
Heightened risk of false memories
1062
Which of the following is most likely to improve the ROI (Return on Investment) of a physical security system involving locks and safes
Reducing the frequency of maintenance and replacement of mechanical locks
1063
What is the main reason shielded twisted pair (STP) cables are preferred over unshielded twisted pair (UTP) in high noise environments
STP cables reduce electromagnetic interference
1064
Which of the following is not considered a factor in determining the likelihood of a risk
Asset value
1065
What is the primary role of a business impact analysis (BIA) in BCMS
Identifying critical business functions Assessing potential business impacts
1066
Why is scalability important when designing access control systems for large organizations
It allows the system to grow and adapt to changes in the organizations security needs
1067
Which of the following is not one of the two primary aspects of recovery after information loss
Implementing forensic investigation to identify the issue
1068
How does the power consumption of LEDs compare to traditional incandescent lamps for equivalent light output
80% Lower
1069
Which of the following is not a common method used to identify a suspect in a digital investigation
Data carving
1070
Which of the following strategies best demonstrates risk mitigation in a security system
Implementing compensatory controls
1071
Why are passive sensors particularly suitable for use in residential security systemss
Passive sensors such as PIR are energy efficient, only activating when needed, which is ideal for home use where energy conservation is important
1072
Which of the following is not a potential risk associated with personnel security
Cybersecurity vulnerabilities
1073
Which type of sensor is commonly used in areas where frequent opening and closing of doors occurs, such as lobbies
PIR Sensor
1074
Which safe rating is required to store high value assets in banking environments where physical security is paramount
TRTL-30X6
1075
In Herzberg's Hygiene Theory which of the following is an example of a motivator
Recognition
1076
In microwave perimeter sensors, what is the primary disadvantage of using a continuous wave (CW) Doppler radar system
Continuous wave systems are unable to detect stationary objects
1077
What is the purpose of a background check
To verify a persons identity To assess a persons suitability for a job To uncover any criminal history
1078
A technique used to disguise digital data information during transmission is
Encryption
1079
In a sting operation ,which of the following techniques is most likely to result in the successful prosecution of a suspect
Allowing the suspect to initiate all illegal activities
1080
What is the primary advantage of using laminated glass in high security applications
Ability to maintain structural integrity after penetration
1081
Which of the following is not true about McGregor's Theory Y
It requires close supervision and control for employees to be effective
1082
Which type of lock is typically installed on vault doors to protect against unauthorized access by restricting access to the locking mechanism
Electronic time lock
1083
Which of the following is most probable to improve the effectiveness of a risk mitigation strategy
Implementing physical barriers in combination with cyber protections
1084
According to Herzberg, which of the following would not lead to dissatisfaction
Job security
1085
Why is barbed tape more commonly used than barbed wire in modern high security perimeters
Barbed tape cause more damage to intruders, acting as a stronger deterrent
1086
During an interrogation, how might a suspect attempt to manipulate the outcome using false compliance
By pretending to cooperate while subtly altering their statements
1087
Which of the following is a key principle of perimeter security
Deterrence
1088
In terrain following radar systems, which environmental factor is most likely to cause signal attenuation
Vegetation
1089
Which of the following is best example of risk avoidance in a security strategy
Moving high value assets to a location outside the threat zone
1090
Which of the following locks is most resistance to lockpicking
Disc detainer lock
1091
Which of the following is least likely to be considered when determining the risk tolerance level with the ESRM framework
The organizations legal obligations to external regulatory bodies
1092
Which of the following is most likely to be a challenge in bomb threat assessment
Determining the legitimacy of the threat
1093
According to McClelland, which of the following needs is associated with a drive to excel and achieve goals
Need for achievement
1094
Which of the following is an example of indirect evidence
A behaviour pattern
1095
Which of the following metrics is least likely to be used when quantifying security risks in an ESRM framework
Total number of security incidents reported annually
1096
Which of the following best describes the function of a mantrap in a high security environment
To control access by trapping intruders To provide a physical barrier against forced entry To ensure single person entry
1097
In the context of personnel security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
1098
Which of the following is most likely to undermine the effectiveness of crisis management training exercises
Failing to involve senior management in drills
1099
Which of the following is not an advantage of using biometric authentication in access control systems
Low cost of implementation
1100
Which of the following combinations would most likely result in an overall decrease in risk
Low threat likelihood and frequent audits
1101
Why is barbed tape often preferred over traditional barbed wire for high security perimeters
Barbed tape is more difficult to cut without specialized tools
1102
Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis
Lack of shared communication channels
1103
Which of the following is most probable to be contributor to the cost of replacement
Freight and shipping charges
1104
Which of the following is an example of personnel security measure
Background checks
1105
Which of the following is not a typical element of a layered security approach
Forensic analysis
1106
Which of the following best defines a provisional patent application
It allows an inventor to establish a filing date while continuing to develop the invention
1107
Which type of lock is least vulnerable to environment wear and tear in outdoor installations
Mechanical combination lock
1108
Which of the following scenarios would result in an increase in the overall threat landscape
Increasing the assets visibility to potential adversaries Improving access control measures but ignoring detection systems
1109
What is the primary goals of a security policy
Defining acceptable use of resources
1110
Which of the following is a not a guideline for workplace drug purchases during an investigation
Make purchases off company time
1111
What is the primary objective of customer relationship management (CRM)
To manage interactions with current and potential customers
1112
Which of the following best describes corroboration in investigations
Verifying information through multiple sources
1113
In security system design what does response time refer to in the adversary sequence diagram
The time between detection and the neutralization of the adversary
1114
Which of the following is most likely to undermine a company's ability to protect its trade secrets
Failing to document and label sensitive information as confidential
1115
In risk management what role does asset criticality play in determining risk tolerance
Critical assets have lower risk tolerance due to their importance in business operations
1116
Which of the following is not a typical goal of protection in depth
Ensuring that no vulnerabilities exsit within the system
1117
Which of the following is a passive security measure
Security signage
1118
In evidence collection why is it important to secure biological evidence immediately after it is found
Biological evidence can degrade quickly if not properly stored, reducing its usefulness in forensic analysis
1119
Which combination of factors increase the likelihood of successful exploitation of vulnerabilities
Effective detection but slow response times High exploitability and delayed recovery protocols
1120
Which of the following is least likely to be a method for controlling physical access to information systems
Multifactor authentication for remote system access
1121
How does CPTED use the concept of territorial reinforcement to deter crime
By using signage and visible security presence to establish a sense of ownership and define the space as private
1122
What is the key element that defines direct evidence in an investigation
It directly links the suspect to the crime without needing inference
1123
Which of the following is most likely to pose a challenge when using cognitive interviewing techniques on witneses
Witnesses recalling peripheral details rather than key events
1124
Which type of safe is best suited to protect valuable items against fire and heat but offers limited protection against burglary
Fire rated safe
1125
What consideration should be given to lighting systems in areas prone to vandalism or tampering
Lighting fixtures should be designed to be tamper proof and resistant to vandalism
1126
In a large decentralized organization, which factor represents the greatest challenge to standardizing crisis management protocols across multiple locations
Cultural differences influencing risk perception
1127
What is the purpose of a personal security policy
To establish rules and guidelines for personnel security To ensure compliance with legal and regulatory requirements To protect sensitive information and resources
1128
Which of the following is least likely to affect the quick ratio of a company
Selling off inventory at discounted price
1129
Which of the following scenarios would most likely increase the overall threat landscape
Reducing the number of security personnel on site
1130
In general, the continuum of violent behaviour starts with
General disgruntlement
1131
What is a significant limitation of using barbed wire for top guarding in areas with high foot traffic near the perimeter
Barbed wire can cause injury to authorized personnel accessing the area
1132
What vulnerability is commonly exploited in electronic combination locks
Bypass through manual override
1133
In Business continuity planning (BCP) which of the following is least likely to be considered a critical business function
Employee recreation programs
1134
Which of the following is most likely to decrease the quick ratio of a company
Increasing accounts payable
1135
How do terrain following sensors impact the operational tactics of mobile security patrols in large commercial estates
By optimizing travel routes to avoid natural obstacles, these sensors enable faster response times and more efficient patrolling
1136
How might adversaries exploit gaps in organizations disaster recovery plan during a global crisis
By taking advantage of delayed response to secondary risks
1137
What is the major limitation of using bistatic infrared sensors in narrow corridors or hallways
Alignment of the transmitter and receiver becomes more difficult, leading to false negatives
1138
Which of the following is not a characteristic of a successful risk mitigation strategy
It eliminates the probability of all risk events
1139
Which of the following is not a typical method used to detect insider trading
Analyzing financial statements
1140
What is the biggest risk of relying solely on eyewitness testimony in criminal investigations
The accuracy of human memory is subject to influence and distortion
1141
Which of the following best describes the legal privilege typically granted to properly controlled investigative reports
Qualified privilege
1142
Which of the following is least likely to influence a fraud suspects ability to rationalize their actions within the fraud triangle
The strictness of the organizations internal fraud prevention policies
1143
Which of the following is most likely to present a technical challenge in implementing a centralized ESRM platform for global enterprises
Integrating ESRM data from multiple security management systems
1144
In methamphetamine investigations, what makes clandestine labs particularly dangerous for law enforcement officers
They use high volatile chemicals that can cause explosions and fires
1145
What is the key difference between a cold hire and controlled hire in an undercover investigation
A cold hire involves placing an operative into a suspect organization without prior intelligence, while a controlled hire is based on pre existing information
1146
Which of the following is most likely to increase the difficulty of risk quantification in ESRM
The subjective nature of threat likelihood and business impact assessments
1147
How might terrain following sensors be used to compensate for environmental blind spots in perimeter security
By adjusting their detection range and angle to follow the natural contours of the land, ensuring full coverage
1148
Which of the following is least likely to affect a company's ability to maintain trade secret protection over time
The company's employees sign non disclosure agreements
1149
Which of the following is least likely to be considered an inherent vulnerability in a critical infrastructure system
Redundant power supplies
1150
Which of the following is most likely to affect the restrike time of a high intensity discharge (HID) lamp in an outdoor security system
The frequency of on off switching during night time operation
1151
How might organization ensure that contractors pose minimal personnel security risks
By conducting background checks before hiring contractors
1152
What is the main purpose of a security operations center
Monitoring and responding to security incidents
1153
Which lock type typically has the longest strike time
Mechanical comibnation lock
1154
Which of the following is least likely to enhance the response function in a PPS
Relying solely on passive surveillance systems
1155
In a museum setting, how can capacitance based sensors be utilized to enhance the security of displayed items
By creating an invisible barrier around each item that when breached, alters the capacitance and triggers an alarm
1156
In the context of a buy bust operation what is the role the undercover officer
To engage in a fake transaction to confirm the suspects involvement
1157
How might adversaries defeat multi factor authentication (MFA) systems in a physical access control context
By using social engineering to steal authentication factors
1158
Which of the following types of hire is typically used in environments where investigators aim to gathers long term intelligence without making immediate arrests
Cold Hire
1159
What is the main risk of relying on open source intelligence (OSINT) in a criminal investigation
The information may be outdated or inaccurate
1160
What is the primary legal risk in a cold hire operation
The investigation may be deemed unethical if the suspect is unaware
1161
Which of the following is most likely to extend the delay time in a security system designed to protect high value assets
Installing multiple layers of reinforced barriers
1162
Which of the following is most likely to improve the detection of fraud early by addressing the opportunity component in Cressey's Fraud Triangle
Implementing real time monitoring of financial transactions and data success
1163
Which lighting technology is most susceptible to degradation due to frequent on off cycling
Fluorescent lighting
1164
What is the significance of the term bag head in narcotics investigations
It is a slang for a person addicted to sniffing glue or paint from a bag
1165
How does hazard differ from a vulnerability in a security context
A hazard is an external factor, while vulnerability is an internal weakness
1166
Which of the following is most probable to be considered a violation of privacy laws in a workplace investigation
Collecting personal email information from a company email server
1167
Which of the following is not considered in the calculation of Gross Operating Profit (GOP)
Taxes
1168
What is the primary benefit of using Doppler radar systems in environments with slow moving intruders
The system detects even minimal frequency shifts caused by slow movements
1169
Which of the following is most likely to improve a company's current ratio
Paying down short term debt
1170
Which of the following types of analysis is most likely to help prioritize the allocation of resources in a security budget
Cost benefit analysis
1171
What is the primary advantage of using a multidisciplinary team in investigations
Broader range of expertise
1172
What is the primary disadvantage of using physical surveillance in investigations
High Cost Risk of detection
1173
Which of the following is not a rule of thumb for lighting levels in security systems
Deterrence - 1.5 foot candles
1174
What characteristic of concertina wire makes it more effective as a perimeter defense than traditional barbed wire
It is more rigid, making it harder to manipulate
1175
Which factor directly affects the calculation of threat likelihood in risk management
The geographical location of the asset
1176
Which of the following lighting types requires a ballast to regulate the voltage and current supplied to the lamp
Metal Hallide
1177
Which of the following is most likely to affect the valuation of intangible assets such as patents and trademarks in a company's balance sheet
The company's ability to enforce its intellectual property rights
1178
Which management concept is most likely to lead confusion if not properly enforced
Unity of command
1179
Which type of sensor is least affected by sudden changes in lighting conditions
Microwave sensor
1180
Which factor is most likely to reduce the probability of detection (Pd) in an adversary sequence
A low number of detection points
1181
Which of the following most directly affects the calculation of risk in a security environment
Vulnerability and criticality of assets
1182
In which environment would an ultrasonic sensor be most effective for detecting movement
Indoors with reflective surfaces
1183
Which sensor would be best suited for monitoring entry points in areas prone to significant vibrations such as near railroads
Microwave sensor
1184
In what environment would a microwave sensor be the most appropriate for detecting intrusions
An outdoor perimeter with significant foliage
1185
Which of the following is best method for reducing the threat level in a security system
Implementing proactive detection measures
1186
Why are shielded twister pair cables typically preferred over unshielded twisted paid cables in outdoor perimeter systems
The shielding provides better resistance to environmental interference
1187
Which of the following vault designs provides the highest resistance to thermal attacks
Composite construction
1188
Which of the following is not consistent with McGregor's theory X
Employees are motivated by intrinsic rewards
1189
Which of the following is least likely to be legal challenge during sting operations
Misidentification of the primary target
1190
Which of the following is most likely to provide early detection of potential bomb incidents
Canine units specifically trained to detect explosives
1191
Which of the following is most likely to compromise a balanced protection strategy in physical security
Over reliance on a single detection system
1192
What is the purpose of calculating the annualized loss expectancy (ALE) in a security risk analysis
To estimate the financial impact of a specific threat over a year
1193
Which of the following is not a function of a well developed security policy
Guaranteeing total risk elimination
1194
Which of the following combinations would increase the overall risk score for critical infrastructure systems
Strong incident detection systems but delayed recovery protocols
1195
What is the key operational limitation of terrain following microwave sensors when deployed in mountainous regions
The sensors range is reduced by obstructions from high elevation changes
1196
Which vault door rating indicates protection against mechanical and thermal tools for up to 60 minutes
TRTL-60X6
1197
Which lighting technology requires consideration of restrike time when planning security operations
HID
1198
Which of the following is most likely to reduce the Probability of Neutralization (Pn) in a security system
Poor personnel training
1199
Which of the following scenarios illustrates a weakness in the detect function of a PPS
The detection system only activates when the intruder is already inside the asset perimeter
1200
Which of the following types of locks would be the most effective against brute force attacks
Electromechanical lock
1201
In risk management, what is the main objective of calculating the Single Loss Expectancy (SLE)
To estimate the financial impact of a single security incident
1202
How to volumetric sensors differ from the line detection sensors in terms of coverage area in large, open spaces
Volumetric sensors cover three dimensional spaces, while line detection sensors monitor a single axis
1203
Which of the following best describes how the quick ratio differs from the current ratio in financial analysis
The quick ratio excludes inventory from current assets, while the current ratio includes it
1204
Which of the following scenarios would not increase the Probability of Detection (Pd)
Delayed response time
1205
Which of the following is a major limitation of using suggestive evidence in a criminal investigation
It does not conclusively prove guilt or innocence
1206
Which of the following is not a characteristic of passive infrared (PIR) sensor
Emits infrared radiation
1207
Which of the following is most likely to be an effective control in minimizing opportunity within Cressey's Fraud Triangle
Conducting surprise audits of financial transactions
1208
Which of the following is most probable to reduce the effectiveness of a security audit
Focusing solely on physical security and ignoring cyber risks
1209
For security lighting applications, which lamp type is preferred for its energy efficiency and longer lifespan compared to mercury vapor lamps
High pressure sodium
1210
Which phenomenon is most likely to interfere with the operation of monostatic radar in foggy outdoor conditions
Signal absorption by water droplets
1211
Why is it important to monitor physical security systems for anomalies in usage patterns
Unusual access or use patterns can indicate security breaches or insider threats
1212
Which of the following scenarios would least likely increase the overall threat landscape for critical infrastructure
Improving the strength of access control systems
1213
Which of the following is least likely to complicate communication during a crisis involving a natural disaster
Disruption of power and communication lines
1214
Which of the following is not a step in the personnel security process
Reference check
1215
Which of the following would most likely reduce the effectiveness of a qualitative risk assessment
Overreliance on subjective judgement rather than hard data
1216
Which of the following strategies is least effective in reducing the vulnerability of an asset in a high risk environment
Increasing asset redundancy
1217
Which of the following is not a characteristic of a strong password policy
Mandatory periodic changes
1218
What is the primary difference between a threat and hazard
A threat is an intentional act, while a hazard is often a naturally occurring event
1219
Which of the following fencing strategies would provide the best deterrence in a high crime industrial area
Single layered wielded wire mesh with inward facing razor wire
1220
What type of privilege is most commonly granted to properly controlled investigative reports
Qualified privilege
1221
In risk assessment how does the probability of a hazard differ from the probability of a threat
Hazards are less predictable and often have wider impacts than threats
1222
Which type of sensor is most effective for monitoring the interior of a vault for unauthorized access
PIR sensor
1223
Which safe design feature enhances resistance to punch attacks targeting the locking mechanism
Hard plate protection
1224
What is the biggest challenge when trying to balance personal privacy with the need for comprehensive background investigations
Ensuring that private information is collected ethically and legally
1225
Which of the following is most likely to result in the loss of trade secret protection within a company
Public disclosure of the trade secret through a patent application
1226
Which of the following is least likely to be required for a business to obtain a patent for a new invention
The invention must be kept confidential and not publicly disclosed
1227
Which type of lock system is most appropriate for a facility requiring both physical and electronic security features
Dual control lock
1228
In risk management which of the following factors is least likely to reduce the overall probability of loss
Increasing asset redundancy
1229
How might an organization reduce the potential for workplace violence during high stress company events such as layoffs
By providing access to mental health resources and counselling
1230
How does a terrain following sensor enhance the capabilities of mobile security platforms in uneven geographic areas
By maintaining a constant altitude or distance from the ground to avoid obstacles
1231
Which of the following is least likely to contribute the risk education in a high threat environment
Reducing the assets value
1232
Which of the following is a critical weakness of using informants in drug related investigations
Informants may have ulterior motives that compromise the investigation
1233
Which of the following is most likely to challenge an investigators ability to assess the pressure component of the Fraud Triangle during an interview
The interviewee downplay the financial or emotional strain they are experiencing
1234
In financial investigations what is the primary purpose of the currency transaction report (CTR)
To report large cash transactions to regulatory authorities
1235
Which of the following is least likely to be considered when classifying information as a trade secret
The public availability of information in patent filings
1236
Which of the following is a common technique used in cognitive interviews to enhance recall
Visualization
1237
When conducting surveillance why is it important to regularly rotate personnel monitoring a target
To avoid detection by the target over time
1238
Which of the following factors is most likely to reduce risk in a high impact low vulnerability situation
Improving physical security
1239
Which of the following is the most effective way to reduce the risk of employee theft in a retail environment
Limiting access to high value inventory
1240
What three critical questions should a risk assessment aim to anwer
What can go wrong? What is the likelihood it could go wrong? What are the consequences?
1241
Which of the following is most likely to complicate the use of return on security investment (ROSI) as a key performance indicator in ESRM
Difficulty in predicting non quantifiable risks such as reputational damage
1242
How do environmental considerations affect the selection of security lighting for a wildlife preserve area, where light pollution must be minimized to protect animal habitats
Implementing fully shielded fixtures to direct light downwards and prevent spill into the habitat areas
1243
Which of the following is most likely to result in a breach of trade secret protection
The trade secret is disclosed in a private meeting without a confidentiality agreement
1244
Which principle of investigation emphasizes the need for investigators to avoid personal biases
Objectivity
1245
Why are monostatic infrared sensors less effective in detecting objects at extreme distances in outdoor environments
Atmospheric attenuation reduces the range of infrared signals
1246
Which of the following combinations would most likely reduce the overall vulnerability of critical infrastructure
Increasing detection systems and enhancing physical security measures
1247
Which of the following factors would most likely reduce the probability of detection (Pd) in a critical infrastructure system
Delayed sensor placement and low detection system sensitivity
1248
Which of the following is most likely to cause a company's intangible assets to be overvalued on its balance sheet
Overestimating goodwill in a business acquisition
1249
What is the primary operational challenge of using vibration sensors for underground intrusion detection in rocky terrain
High false positive rates due to interference from seismic activity
1250
What is the role of continuous monitoring in business continuity planning
To provide early detection of risks that may trigger a crisis
1251
How can executive protection teams mitigate the risk of attacks during public events
By coordinating security efforts with local event organizers
1252
Which of the following is least likely to be considered when assigning occupant roles in an emergency plan
The hierarchy of the organizational structure
1253
Which of the following is the biggest disadvantage of using metal halide lamps in security lighting applications
Long restrike time
1254
Why would a security manager opt for fluorescent lighting in a controlled indoor environment like a data center
Because it emits a lower level of heat compared to other lighting types, reducing cooling requirements
1255
What is the primary role of a continuity plan in BCMS
Ensuring business operations during disruptions
1256
Which of the following best describes the purpose of combining inductive and deductive approaches in risk anaylsis
To create a comprehensive risk profile by evaluating specific causes and potential outcomes
1257
Which of the following is least probable to increase the effectiveness of Protection in depth
Decreasing the number of detection sensors
1258
Which of the following cables is most suitable for use in high humidity environments due to its resistance to moisture
Fiber optic
1259
Why is it critical to involve legal counsel when conducting personnel risk assessments for high level employees
To ensure compliance with local, national and international laws
1260
Which of the following is not a direct measure of liquidity
Gross profit margin
1261
What is the primary function of an outer jacket in outdoor rated Cat6 cables used in perimeter security systems
To provide resistance to ultraviolet (UV) damage
1262
Which of the following best describes the use of security screening at access points
Checking for prohibited items and verifying identities
1263
Which of the following is least likely to appear on an income statement
Quick ratio
1264
How does using security lighting with a variable intensity feature benefit a facility with fluctuating operational hours like a theater or concert hall
It allows for customization of lighting based on the specific security needs at different times, enhancing both safety and energy efficiency
1265
Which of the following theories suggests that individuals are more likely to commit fraud if they are in environment where unethical behaviour is normalized or accepted
Differential association theory
1266
Which of the following is least likely to be challenge in international investigations
Conducting surveillance in real time
1267
Which of the following is the most critical component of an effective response layer in PPS
The speed with which the threat is neutralized
1268
Which of the following is least probable to be an effective method of setting the value of line items in a budget
Setting arbitrary limits on expenditures
1269
Which of the following has the highest strike time, making it less suitable for emergency lighting applications
Metal Halide Lamp
1270
Which type of glass provides the highest resistance to penetration but shatters into small blunt fragments upon impact
Tempered glass
1271
What is the key advantage of using proximity cards in access control systems
Non contact and quick authentication process
1272
Which of the following legal risks is associated with sting operations
The suspect could claim entrapment in court The suspect could destroy key evidence before prosecution Investigators may in advertently break local laws
1273
How do environmental considerations affect the selection of security lighting for a wildlife preserve area, where light pollution must be minimized to protect animal habitats
Implementing fully shielded fixtures to direct light downwards and prevent spill into the habitat areas
1274
What is a key disadvantage of using a laser sensor in outdoor perimeter detection
Susceptibility to environmental interference such as rain and fog
1275
How do monostatic infrared sensors compensate for signal degradation caused by environmental factors such as rain or fog
By automatically adjusting the sensors detection threshold
1276
The management principle that suggests one supervisor can effectively control a limited number of people is
Span of control
1277
In an internal investigation which of the following actions could be considered an ethical violation by the investigator
Sharing confidential information with unauthorized individuals Failing to disclose conflicts of interest Leading the witness to a particular conclusion
1278
Which of the following is not a characteristic of a thermal imaging sensor
Limited to detecting movement in daylight
1279
How does a lower probability of interruption (Pi) affect an adversary's timeline in a security breach
It increases the time adversary has to complete their actions
1280
Which of the following is not a benefit of personnel security programs
Increasing operational costs
1281
Which of the following scenarios would most likely reduce the Probability of detection (Pd)
Increasing detection system accuracy but reducing the number of personnel
1282
Which of the following is a critical weakness of using suggestive evidence in court
It is often dismissed as circumstantial
1283
In a logistics warehouse why are inductance based sensors critical for securing loading docks
They can detect unauthorized removal of metal based goods by monitoring changes in the magnetic field
1284
Which of the following is a critical weakness of relying solely on financial records in drug investigations
Financial records do not provide evidence for the physical transaction
1285
Which of the following combinations would reduce overall risk in a high criticality system
Delayed detection systems but immediate response capabilities
1286
Which of the following best describes the concept of separation of duties
Ensuring multiple people are involved in critical tasks
1287
Which of the following is not a common method for verifying the authenticity of a digital signature
Encrypting the signed document
1288
Which type of lock mechanism would be most suitable for a facility requiring high levels of resistance to both physical and electronic attacks
Dual control lock
1289
Why are wielded wire mesh fences often preferred over chain link fences in correctional facility perimeters
They offer higher resistance to cutting and climbing
1290
Which of the following is a weakness of qualitative risk analysis when compared to quantitative methods
It does not account for the financial impact of a risk
1291
Which of the following is most likely to improve a company's current ratio
Paying off current liabilities
1292
Which of the following weaknesses is most commonly associated with suggestive evidence in court
Suggestive evidence is often used without corroborating physical evidence
1293
Why would a security system in a high traffic public area, like a shopping mall, benefit from integrating volumetric sensors into its surveillance system
Volumetric sensors are particularly effective in detecting abnormal behaviours such as running or sudden movements which might indicate a security event
1294
When conducting mobile surveillance why is the use of multiple vehicles an advantage
It reduces the likelihood of the target detecting surveillance
1295
When providing executive protection why is it essential to regularly rotate security personnel
To reduce the chance of security fatigue and complacency
1296
Which type of sensor would be least effective in detecting intrusions in an area to prone to frequent thunderstorm
Infrared beam sensor
1297
What is the primary function of a security badge system
To control access to secure areas
1298
How does lighting color temperature influence the effectiveness of security equipped with night vision capabilities
Warmer color temperatures enhance night vision capabilities by increasing contrast
1299
What advantages doe the integration of bistatic sensors offer for the detection of UAVs (Unmanned Aerial Vehicles) near critical infrastructure
Bistatic sensors can cover a larger airspace volume and provide more accurate altitude data than monostatic sensors
1300
Which of the following techniques is least likely to be effective in obtaining a confession during a REID interrogation
Asking the suspect to provide their version of events freely
1301
In a sting operation which tactic is most relevant for ensuring the operations success
Recording all conversations between the suspect and the undercover officer
1302
How does DMT differ from other hallucinogens like LSD or psilocybin in forensic investigations
DMT has a much shorter distance of effect, complicating detection in toxicology reports
1303
Which technique is most effective for interviewing witness
Establishing rapport
1304
What is the biggest challenge in conducting personnel risk assessments for employees in remote work environment
Remote employees may have access to sensitive information without direct supervision
1305
Why are fiber optic cables preferred over coaxial cables in high security environments
Fiber optic cables offer higher bandwidth for video surveillance systems
1306
Which lock type is more resistant to covert manipulation techniques, including picking and bumping
Disc detainer lock
1307
What is the primary advantage of using biometric technologies in security systems
High accuracy
1308
Which of the following is most relevant category of evidence in a drug trafficking case involving multiple suspects
Physical evidence such as drugs
1309
In a high risk facility what is the primary advantage of using iris scanning technology for access control over fingerprint scanning
Iris scans are less suspectable to physical wear and environmental factors
1310
Which of the following best describes the purpose of using a controlled buy in a long term investigation
To build a case over time by repeatedly purchasing illegal goods
1311
What is the key consideration when selecting lighting for security purposes in environments where color identification is crucial such as parking lots or warehouses
The highest possible color rendering index to ensure accurate color perception
1312
In an outdoor security system, what is the main drawback of using Cat5e cables compared to fiber optic cables
Cat5e cables have a lower transmission speed over long distances
1313
How do passive sensors differ from active sensors in their method of detecting intrusions
Passive sensors monitor disturbances in the environment without emitting energy, relying on changes caused by intruders
1314
How does the probability of neutralization (Pn) directly affect the probability of success (Ps) in an adversary sequence
A higher Pn decreases Ps reducing the likelihood of adversary success
1315
What is the main objective of ESRM
Identifying and managing security risks
1316
Which of the following best describes the operation of a mono static radar sensor
Transmitter and receiver are located at the same site
1317
Which of the following is not the benefit of using a dual technology sensor in a physical security system
Reduced installation complexity
1318
Which of the following best describes the purpose of ROI (Return on investment) analysis when assessing physical security systems such as locks and vault
ROI analysis measures the financial benefit derived from investing in physical security relative to the cost
1319
Which of the following is the key principle of perimeter security
Deterrence
1320
Which of the following is least likely to be considered when developing a security program for a global organization
The organizations leadership structure
1321
Which of the following factors would most likely reduce the probability of detection in a high criticality system
Low detection system sensitivity and delayed response protocols
1322
What is the primary purpose of using write blocking technology in digital forensic investigations
To main the integrity of the original data
1323
Which of the following cognitive techniques is least likely to be used in high pressure interview setting
Free recall of the events without interruptions
1324
Which of the following strategies is least effective in reducing the vulnerability of an asset in a high risk environment
Increasing asset redundancy
1325
During a sting operation, what is the primary goal of the decoy
To trick the suspect into committing a crime
1326
What is the role of human resources in personnel security
Conducting background checks Enforcing security policies Training employees on security procedures
1327
The term due diligence refers to
The effort made by an ordinarily prudent person to prevent harm to another
1328
In the context of fraud detection which financial ratio is most useful for identifying discrepancies in reported revenues
Gross Profit Margin
1329
Which of the following is most likely to compromise the integrity of an encrypted file system
Storing encryption keys on the same device as the encrypted data
1330
Which factor most directly influences the likelihood of a threat exploiting a vulnerability
The alignment between the threats capabilities and the the assets weaknesses
1331
Which of the following is least likely to be considered an effective fraud prevention strategy addressing all three components of Cressey's Fraud Triangle
Hiring external fraud investigators to monitor employees financial transactions
1332
What is the role of REID technique during the interrogation process
It is used to psychologically coerce confessions from suspects by using a confrontational approach
1333
Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis
Lack of shared communication channels
1334
What is the most significant risk of relying solely on video surveillance in a physical security investigation
It provides only a partial understanding of the suspects activities
1335
Which of the following ratios is least likely to provide insight into a company's liquidity
Return on equity (ROE)
1336
In a threat assessment which factor would most likely reduce the Probability of loss (Pl)
Strong recovery protocols and low vulnerability
1337
Which of the following types of sensors is typically used to monitor the presence of people within a specific area based on heat signatures
PIR sensor
1338
What is the purpose of security clearance
To grant access to classified information To assess a persons trustworthiness and loyalty To determine if a person is eligible for certain positions
1339
Which of the following would most likely enhance the delay function in a physical protection system (PPS)
Adding additional reinforced barriers between the perimeter and the asset
1340
Which of the following is not a benefit of personnel security programs
Increasing operational costs
1341
Which of the following factors is most critical when determining the recovery point objective (RPO) in a disaster recovery plan
The criticality of data being recovered
1342
What is the primary function of an investigative audit
Verifying the accuracy of financial frauds
1343
Which of the following factors is most critical when selecting KPIs for a security program
Alignment with organizational risk tolerance
1344
Which management principle emphasizes the need for each employee to receive orders from only one supervisor
Unity of command
1345
Which of the following is not a factor considered in personnel security
Criminal history Financial stability Education background
1346
Why might a security manager opt to integrate terrain following sensors into the security drone systems used for monitoring large agricultural properties
To optimize the flight path for energy efficiency by maintaining a consistent altitude over uneven terrain
1347
What is the purpose a termination process in personnel security
To ensure the return of all company property To revoke access to sensitive information and systems To conduct an exit interview with the employee
1348
Which type of evidence is most likely to be classified as indicative rather than conclusive
Financial discrepancies
1349
Which of the following best describes an escalation of privilege attack
A user acquiring more permissions than initially assigned
1350
In the context of laminated glass, how does the interlayer material affect the glass's performance during ballistic impact
It dissipates the kinetic energy of projectiles, reducing penetration
1351
Which lighting feature is essential in high security areas such as military bases, where rapid response to incidents is critical
Instantaneous strike times to ensure no delays in case of emergency
1352
In the buy bust operations what is the typical sequence of events
An undercover agent buys drugs from a dealer and immediately arrest the dealer
1353
Which of the following is least probable to be an effective method of setting the value of line items in a budget
Setting arbitrary limits on expenditures
1354
What factor is least likely to reduce the probability of interruption (Pi)
Increased detection system accuracy
1355
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
1356
What is the primary disadvantage of using mechanical locks in high security environments
Susceptibility to picking and bumping
1357
Which statement about the relationship between threat, hazard and risk is most accurate
Hazards can exist independently or risk, but threats cannot
1358
Which type of light would be most appropriate for a security setting where rapid identification of individuals is necessary such as at a bank entrance
LED lamps
1359
Which type of vault construction material offers the highest level of fire resistance
Reinforced concrete
1360
In CPTED which of the following strategies best represents the principle of maintenance
Keeping fences and barriers in good repair
1361
What role does a microwave sensor play in perimeter security systems and why is it preferred in high security systems
It is less prone to false alarms from small animals and environmental factors due to it operational frequency
1362
Which of the following is least likely to affect the ROI (Return of investment) of an advanced physical security system designed for a financial institution
The speed of the restrike time for the security lighting system
1363
How does the presence of multi luminate polycarbonate layers in bullet resistant glass effect its overall performance in security applications
It provides additional flexibility allowing the glass to absorb more kinetic energy from projectiles
1364
Which of the following is least likely to be considered evidence under strict chain of custody guidelines
A report handwritten by the investigator during the incident
1365
In the context of fault tree analysis which of the following represents an intermediate event
An event that results from one or more basic events
1366
In Herzberg's Motivation Theory which of the following is considered a hygiene factor rather than a motivator
Job security
1367
Which feature is essential for high security doors
Reinforced construction
1368
How might an organization reduce the potential for workplace violence during high stress company events, such as layoffs
By providing access to mental health resources and counselling
1369
What is the purpose of personnel security
To protect classified information To ensure employee satisfaction To maintain a safe work environment
1370
Which of the following is least likely to be impacted by the strike time of a high intensity discharge (HID) lamp in a security lighting system
The overall energy consumption of the lighting system
1371
What is the most common method used by bypass poorly installed vault doors
Penetration through the floor
1372
What is the typical restrike time for a high pressure sodium lamp after a momentary power interruption
3-4 minutes
1373
Which lamp type is best known for its high color rendering index (CRI) making it ideal for indoor applications requiring accurate color distinction
LED
1374
Which of the following is most likely to invalidate the results of a polygraph test
The use of countermeasures by the suspect
1375
In criminal investigations involving organized crime, why is it crucial to use asset forfeiture as a tactic
To disrupt the financial operations of the criminal organization
1376
Which of the following statements is not true regarding narcotics
They tend to intensify vision and increase alertness
1377
Which of the following is least relevant when selecting key metrics to evaluate the performance of a security program
The number of incidents reported
1378
Which of the following is most probable to be considered a violation of privacy laws in a workplace investigation
Collecting personal email information from a company email server
1379
In CPTED which of the following is most likely to deter potential intruders by influencing their behaviour
Clear lines of sight
1380
Which of the following is least probable to be direct outcome of increasing surveillance systems
Improved perimeter protection against cyber threats
1381
Which of the following is least likely to affect the ROI (Return on investment) of an advanced physical security system designed for a financial institution
The speed of the restrike time for the security lighting system
1382
What is the most significant vulnerability of a safe with a mechanical combination lock
Susceptibility to manipulation
1383
Which of the following is least probable to improve the deter function in a security system
Adding covert detection systems
1384
What is the most effective counter measure to avoid being tracked via digital surveillance tools
Avoiding interaction with digital networks entirely
1385
Which of the following is true of Herzberg's two factor theory
Hygiene factors prevent dissatisfaction but do not increase satisfaction
1386
Which of the following is most likely to reduce the strike time of metal halide lamps in a high security perimeter lighting system
Installing pulse start ballasts for more efficient ignition
1387
Which type of evidence is least reliable when investigating a hostile witness
Character evidence
1388
How can investigators use call detail records (CDRs) during a criminal investigation
To track the location and time of suspect's phone activity
1389
Security barrier purpose
Obstruct Access Deterrent
1390
In budgeting, what is the primary benefit of zero based budgeting (ZBB)
ZBB requires that all expenses be justified for each new period, helping organizations eliminate waste and focus on strategic priorities
1391
Which of the following is least probable to be part of an effective deterrent strategy
Covertly monitoring employees activities
1392
Which of the following is the primary goal of a business impact analysis (BIA) in business continuity plan (BCP)
Evaluating the financial impact of potential distruptions
1393
Which of the following best describes the primary item of expense in an investigations budget
Communications
1394
Which of the following is the primary weakness of using an event tree analysis in risk assessments
It only considers a linear progression of events
1395
Which factor most influences the fire rating of a high security safe
Type of insulation material
1396
Which sensor type would be least effective in detecting intruders in a heavily wooded areas
Microwave Sensor
1397
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
1398
How can integrating alarm systems with access control improve over all security
By triggering an automatic lockdown when unauthorized access attempts are detected
1399
What is the main function of a perimeter intrusion detection system (PIDS)
To detect and alert security personnel to breaches the perimeter
1400
In the context of vulnerability assessment what is the main purpose of identifying an assets criticality
To evaluate the impact on operations if the asset is compromised
1401
Which of the following is not a common method of ensuring confidentiality
Data replication
1402
What is the purpose of pre employment screening process in personnel security
To determine an individuals potential for misconduct
1403
In CPTED what is the primary goal of access control
To reduce criminal behaviour by influencing movement patterns
1404
Which of the following factors is least likely to reduce risk in a high threat, low impact situation
Increasing the assets value
1405
Which of the following is most relevant when determining the effectiveness of a physical protection system
Probability of detection (Pd)
1406
Which of the following is a key challenge in the implementation of wireless security systems
Signal interference and reliability
1407
Which of the following is most likely to affect the credibility of an investigative report
Accuracy of the details provided
1408
Which of the following is least likely to be considered in calculating a company's quick ratio
Inventory of raw materials waiting to be used in production
1409
Which of the following techniques is most suitable for evaluating the effectiveness of existing deterrence measures
Qualitative risk analysis
1410
Why might a security team in a high end retail environment prefer capacitance based sensors over traditional surveillance cameras
Capacitance sensors can detect even the slightest touch or proximity useful for high value items that should not be handled
1411
Which of the following factors is most critical for ensuring the effectiveness of a risk mitigation strategy
Alignment with organization risk tolerance
1412
What is the most significant disadvantage of using a time lock system on a high security safe
Reduced access during emergencies
1413
Which of the following is not a step in the personnel security process
Social media monitoring
1414
Which of the following types of witness is least likely to cooperate during an investigation
Hostile witness
1415
Which of the following is not a common method of ensuring data confidentiality
Data replication
1416
Which of the following is least likely to be an advantage of using electronic locks over traditional mechanical locks in physical security applications
The higher level of physical durability and resistance to forced entry
1417
Which combination of factors is most likely to improve employee satisfaction, according to Herzberg's theory
Improved working conditions and career advancement
1418
According to Herzberg's two factor theory which of the following is a motivator rather than a hygiene factor
Achievement
1419
Which of the following is most likely to be used as a method to prevent unauthorized data recovery from sanitized electronic media
Degaussing using strong magnetic fields
1420
Which of the following is least likely to be long term consequence of failing to integrate ESRM with overall business strategy
Increased collaboration between security teams and business units
1421
Which type of lamp has a restrike time longer than 10 minutes after power failure
Metal halide lamp
1422
Which of the following is an advantage of time locking mechanisms on safes in high security environments
Prevents access during non programmed hours
1423
Which of the following is not considered on one of the five main ways to classify exterior intrusion sensors
High sensitivity and low sensitivity
1424
In a large decentralized organization which factor presents the greatest challenge to standardizing crisis management protocols across multiple locations
Cultural differences influencing risk perception
1425
Which of the following is most likely to be a challenge in managing both digital and physical security risks under the ESRM framework
Establishing a consistent risk rating methodology for both digital and physical assets
1426
Which of the following factor is most critical when determining asset vulnerability in a risk management framework
The effectiveness of existing security measures
1427
In a fraud investigation which of the following is not a common type of documentary evidence
Eyewitness testimony
1428
Which of the following is most likely to be protected by a design patent
The ornamental design of a product
1429
Which of the following is most likely to be key element in ISO 27002 guidance for information security policies
A statement of management intent and objectives
1430
In laminated glass, how does the thickness of the interlayer affect its ballistic resistance properties
Thicker interlayers improve the glass's ability to disperse kinetic energy from bullets
1431
Which design feature in a vault door enhances resistance to crowbar attacks
Recessed door
1432
Which of the following is least likely to increase motivation according to Maslow's hierarchy
Higher pay
1433
In the context of the PEACE model what does the account phase entail
Allowing the suspect to tell their story uninterrupted
1434
What considerations should be made when installing security lighting in areas with high pedestrian traffic, such as city squares or public parks
Lighting should be sufficient to ensure visibility but designed to minimized glare and light spillage to avoid discomfort to pedestrians
1435
When monitoring communications during an investigation, how might investigators detect counter surveillance tactics
Frequent changes in communication devices or platforms
1436
Which material is most commonly used to reinforce vault doors to prevent drilling attacks
Boron carbide
1437
In the context of the PEACE model, what does account refer to
Allowing the suspect to tell their story uninterrupted
1438
What is the main criticism of using narco analysis as an investigative tool
Results are often inconsistent and unreliable It is not recognized as a legal technique in most countries
1439
Which type of cable is most vulnerable to eavesdropping in high security environments
Coaxial
1440
Which factor is least likely to reduce an assets overall risk
Improving recovery protocols but delaying detection systems
1441
Which safe design is most resistant to prying attacks
Safe with recessed doors
1442
Which of the following management concepts deals with the number of subordinates directly reporting to a supervisor
Span of control
1443
Which type of lock typically requires the least maintenance in outdoor environments
Mechanical combination lock
1444
Which of the following best describes the process of deductive risk assessment
Determining potential consequences of a failure and tracking back to root causes
1445
How might adversaries exploit weakness in multi tenant building security to gain unauthorized access
By using social engineering techniques to gain access through shared entrances
1446
How can failure to property train staff for crisis scenarios undermine a well developed continuity plan
Employees may fail to execute their roles effectively leading to confusion It increases the potential for human error in communication
1447
Which of the following is most likely to be considered a critical factor in determining whether an asset is classified as tangible or intangible in accounting
Whether the asset can be physically touched or measured
1448
What is the key advantage of a combination lock in high security vaults
It does not required electricity to function
1449
Which of the following is an example of physical deterrent in security systems
Warning signs
1450
The detect function in a PPS is least effective when
The detection system fails to trigger alarms in real time
1451
Which metric best describes the Probability of Interruption (Pi) in and adversary sequence diagram
The chance that security forces will interrupt an adversarys action before harm
1452
Which of the following management theories emphasizes the importance of intrinsic rewards in motivating employees
Herzberg's two factor theory
1453
Which of the following is a strength of using undercover officers in sting operations
They provide direct access to suspects criminal activities
1454
Which of the following is not a typical indicator of fraudulent activity in financial statements
Regular audit adjustments
1455
Which of the following best reflects the principle of opportunity within Cressey's fraud triangle when investigating a case involving embezzlement
The suspect had access to financial systems due to a lack of oversight
1456
What is the main risk associated with the use of sting operations in narcotics investigations
They may involve entrapment leading to dismissed cases
1457
Which of the following is not a common method for risk mitigation in ESRM
Conducting financial audits
1458
Which of the following best describes the concept of a honeypot in cybersecurity
A decoy system used to attract and monitor attackers
1459
What is the key outcome of identifying a threat vector in security planning
It highlights potential pathways through which vulnerabilities could be exploited increasing risk
1460
Which of the following factors is most likely to undermine the credibility of a paid informant in a sting operation
The informant is paid for their testimony
1461
Which of the following is not a benefit of using thermal imaging cameras for perimeter security
Lower cost compared to visible light cameras
1462
Which of the following best explains the relationship between vulnerability and criticality in security risk analysis
Criticality determines the priority of mitigating vulnerabilities
1463
What combination of factors would result in the highest overall risk score in a critical infrastructure system
Delayed detection systems and weak recovery protocols
1464
What is the purpose of personnel security
To protect classified information To ensure the integrity of the organization To prevent unauthorized access
1465
Which CPTED principle focuses on increasing community involvement to prevent crime
Territorial reinforcement
1466
What is the main disadvantage of using symmetric encryption
Complexity of key management
1467
Which of the following is not one of the five IS infrastructure management countermeasures
Encryption of all data at rest
1468
Which of the following is least likely to complicate the recovery phase of crisis management
Lack of media involvement in post crisis reporting
1469
Which of the following best describes a baghead operation in drug related investigations
Interviewing a suspect while concealing their identity to avoid retaliation
1470
Which of the following is not typically factored into the calculation of Net Operating Profit (NOP)
Interest payments on debt
1471
Which of the following statements is not accurate in the context of criticality in security risk assessments
Criticality is directly related to the likelihood of a threat
1472
Which of the following is most likely to be considered the main application of bistatic microwave sensors in exterior protection
Detecting human beings crawling or rolling on the ground
1473
In inductive risk assessments, the focus is on
Broadly assessing potential outcomes based on specific observed data
1474
Which of the following is not typically in a forensic report
Interviewee list
1475
Which of the following is most likely to pose a challenge in patch management for IS infrastructure
The use of outdated legacy systems in the network
1476
Which of the following is not a benefit of using access control systems
Reducing security costs
1477
In the context of security sensors what is a false alarm
An alarm triggered without any actual threat or intrusion
1478
What is the typical restrike time for a metal halide lamp in security lighting applications
5-10 minutes
1479
What is the primary purpose of a sting operation
Evidence gathering
1480
In a fault tree analysis which of the following best represents a basic event
An event with no further explanation required
1481
Which of the following is most likely to result in a successful buy bust operation
Ensuring the suspect is unaware of the undercover officers identity
1482
Which of the following is not a factor in calculating Net Operating Profit (NOP)
Financing costs
1483
Which of the following factors would decrease the probability of success (PoS) for an adversary targeting high criticality assets
Delayed detection systems but immediate response protocols
1484
Why is single mode fiber optic cable typically used in perimeter security systems requiring long distance coverage
Its offers better signal integrity over long distances
1485
What makes active infrared sensors ideal for boundary protection in rural estates
They can create a invisible fence that when broken by wildlife or humans, triggers and alert
1486
Which of the following factors is least relevant when conducting a cost benefit analysis for security investigation
Increased operational efficiency
1487
Which of the following is not a typical characteristic of a forensic investigation report
Subjectivity
1488
Which sensor type is most effective at detecting slow, deliberate movements in a confined indoor space
PIR sensor
1489
Which of the following is most likely to undermine the credibility of an eyewitness
The eyewitness experienced memory distortion due to high stress
1490
Which combination of factors most directly impacts the Probability of neutralization (Pn) in a layered security system
Adversarys skill level and the time delay
1491
Which of the following is least likely to be trigger for the pressure component in an employee committing fraud
Opportunity presented by weak internal controls
1492
What is the principal benefit of using active infrared sensors for an art gallery's security system
They ensure continuous monitoring even in total darkness without relying on external light sources
1493
In security risk management which of the following can decrease risk without reducing threat levelss
Implementing more robust physical barriers Reducing asset exposure by limiting accessibility
1494
How might background investigators verify the legitimacy of a candidates self employment history
By contacting clients or partners listed by the candidate as references
1495
Which of the following environmental factors is most likely to cause interference in a PIR sensors detection capability
Rapid temperature fluctuations
1496
Which sensor technology would be most appropriate for detecting an unauthorized vehicle entering a restricted area
Inductive loop sensor
1497
What is the key purpose of physical surveillance in an investigation
To monitor a suspects activities without their knowledge
1498
In the CARVER method which factor determines how easily an adversary can identify a target
Recognizability
1499
Which of the following is least relevant when analyzing witness credibility in a drug trafficking case
The witness's criminal history
1500
What is the primary role of a continuity plan in BCMS
Ensuring business operations during disruptions Enhancing financial performance
1501
Which of the following is least probable to be an effective method of setting the value of line items in a budget
Setting arbitrary limits on expenditures
1502
Which of the following investigative methods is most likely to be used in a covert investigation of internal theft
Undercover operation
1503
Which of the following would not likely reduce an assets vulnerability
Decreasing the assets criticality
1504
How might adversaries exploit from lighting deficiencies around a facility
By using shadows to avoid detection and conceal movement
1505
In risk assessment which factor is most critical when evaluating a hazard
Its potential impact
1506
Which of the following is not considered in the calculation of Earnings before Interest, Taxes, Depreciation and Amortization (EBITDA)
Tax obligations
1507
Which of the following is the best approach for determining the delay time needed in a PPS
The combined time of detection, communication and response
1508
Which of the following is a primary weakness of using physical evidence such as seized drugs in a court case
It may be mishandled leading to contamination
1509
What is the main reason high pressure sodium lamps are often preferred for outdoor security lighting despite their low CRI
Long lifespan
1510
Which of the following is an example of current asset
Accounts receivable
1511
Which combination of factors is most likely to increase overall risk
High threat likelihood and high vulnerability
1512
Which sensor technology is most likely to experience false alarms caused by moving tree branches
PIR Sensor
1513
Which of the following sensor would be most vulnerable to interference from heavy rain or snow
Infrared beam sensor
1514
Which of the following best describes the impact of the quick ratio on a company's financial strategy
A higher quick ratio indicates better short term liquidity which may allow the company to take on more short term debt
1515
Which type of sensor would be most effective in detecting underwater movements
Ultrasonic sensor
1516
Which of the following is least likely to be a factor in determining the serverity of a crisis
The number of personnel involved in the response
1517
Which of the following types of safes is typically used to protect high value asset in retail environments
Cash drop safe
1518
What is the average lifespan of a low pressure sodium lamp
24000 Hours
1519
Which of the following is most likely to increase the Return on investment (ROI) for a security project
Decreasing operating costs without impacting security performance
1520
Which of the following is least probable to occur during an insider threat incident
Complete destruction of physical infrastructure
1521
What is the main purpose of a sting operation
To gather evidence To deter future crimes
1522
Which combination of factors would most likely lead to employee motivation according to Herzberg
Recognition and opportunities for growth
1523
How can forensic linguistics assist in the analysis of written or spoken evidence
By comparing communication patterns to known suspects
1524
What is the main difference between the PEACE model and the REID technique
PEACE focus on fact finding while REID focuses on eliciting confessions REID involves direct accusation while PEACE avoids them PEACE is more appropriate for witness interviews while REID is designed for suspects
1525
Which of the following best describes the purpose of a forensic analysis
Analyzing evidence in a laboratory setting
1526
Which of the following is most likely to be considered a violation of investigative ethics
Coercing a suspect into confessing by threatening legal action
1527
Which of the following is most likely to invalidate surveillance footage presented in court
The footage contains gaps where the camera lost power
1528
What is the purpose of conducting background checks in personnel security
To identify potential risk or threats
1529
Which of the following is least likely to be a challenge in aligning ESRM with an organizations cybersecurity strategy
Adopting the latest cybersecurity technologies without integrating them with existing systems
1530
Which lamp type has a warm up period that may require 10 minutes before full brightness is achieved
Low pressure sodium
1531
Which of the following sensors is least likely to be affected by high winds
Seismic sensor
1532
What is the primary purpose of a security clearance
To grant access to classified information
1533
Which combination of factors is most likely to improve employee satisfaction according to Herzberg's two factor theory
Recognition and opportunities for personal growth
1534
In what scenario would a volumetric sensor provide a security advantage over line detection sensors
When monitoring, large, open spaces where intrusions can occur from multiple directions
1535
Which type of sensor would be most effective in detecting the movement of metallic objectives such as vehicles over a defined areas
Magnetic loop sensor
1536
What is the key difference between adversary interruption and neutralization and neutralization in security planning
Interruption refers to detection, while neutralization refers to stopping the adversary
1537
What is the most significant challenge in using smart locks as part of a facilities access control strategy
Smart locks can be susceptible to hacking or signal jamming, compromising access control
1538
Which of the following is most likely to increase the likelihood of fraud occurring in an organization, according to the Fraud Triangle
Weak organization culture and lack of ethical leadership
1539
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
1540
Which of the following types of sensors is typically used to detect large, moving metallic objects like vehicles
Inductive loop sensor
1541
Which factor most directly influences the Probability of Interruption (Pi) in a security system
The response time of security personnel after detection
1542
What is a controlled hire in corporate investigations
An undercover employee hired to investigate corporate fraud while remaining covert
1543
Which factor most influences an assets criticality in risk management
The assets contribution to key operations processes
1544
Which of the following is the most significant indicator of a potential workplace violence threat
An employee who isolates themselves and displays sudden changes in behaviour
1545
Which sensor type uses ultrasonic sound waves to detect movement or intrusion
Ultrasonic sensor
1546
How does the installation of razor wire as part of a double barrier perimeter system improve its security
Razor wire is installed between the two barriers, creating a no mans land
1546
Walls, Ceilings, and floors of vaults should never be less than ____ inches thick
10
1547
What is the primary purpose of a chain of custody in an investigation
To document the timeline of the investigation To ensure evidence integrity
1548
Which of the following is an advantage of microwave sensors over PIR sensors
Fewer false alarms in temperature sensitive environments
1549
Which of the following is not commonly used method for determining the effectiveness of a PPS
Calculating the return on investment (ROI) for security measures
1550
In Herzberg's motivation hygiene theory, which of the following factors is least likely to result in job dissatisfaction if absent
Personal growth
1551
What is the key advantage of a digital lock over a traditional mechanical lock in vault applications
It requires no physical keys
1552
Which type of witness is least likely to provide reliable information in a high stress situation such as a robbery
Eyewitness
1553
Which investigative technique is most likely to identify previously undetected financial transaction in a fraud cause
Forensic accounting
1554
Which of the following best describes the term volatility in the CARVER method
The likelihood of an assets value fluctuating
1555
Which of the following is least likely to be a challenge in aligning ESRM with an organizations cyberssecurity strategy
Adopting the latest cybersecurity technologies without integrating them with existing systems
1556
What is the primary function of strike times in relation to vault door systems in high security installations
Strike times indicate the resistance of a vault door to multiple forced entry attempts
1557
Which of the following best describes the concept of data at rest
Data currently stores in databases or file systems
1558
What three critical questions should a risk assessment aim to answer
What can go wrong? What is the likelihood it could go wrong? What are the consequences?
1559
Which standard is most commonly used to rate the strength and security of padlocks
BS EN 1303
1560
Which of the following is not a method of employee monitoring
Job performance reviews
1561
Which of the following is the most conclusive type of evidence when proving intent in a drug trafficing case
Financial records
1562
Which of the following is not a principle of Balanced Protection
Ensuring equal levels of protection for all assets
1563
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
1564
Which of the following legal defences is most commonly used in response to cold hire investigations
Entrapment
1565
Which of the following is an example of mechanical access control
Deadbolt lock
1566
How do bistatic sensors enhance the security of a large perimeter such as an industrial complex
By allowing for the placement of transmitters and receivers at strategic points, increasing the detection zone
1567
Which type of lock is most commonly used for securing access to vaults in high value facilities, combining ease of use with high security
Electronic combination lock
1568
What is the main challenge when analyzing audio recordings in a noisy environment during an investigation
Audio enhancement software may be unable to filter background noise effectively
1569
Which of the following is least likely to improve the response function in a PPS
Installing advanced intrusion detection systems
1570
Which of the following is most likely to hinder ESRMs effectiveness in a rapidly evolving threat landscape
Lack of flexible risk management processes
1571
Which of the following is most likely to result in the invalidation of a trademark
The trademark is not used in commerce for an extended period
1572
________ is a thorough physical examination of a facility and its systems and procedures conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection required
Security survey
1573
Which of the following security measures is most effective for protecting high value physical assets in a corporate environment
Access control using biometric identification
1574
Which of the following is not a common personnel security control measure
None of the above (Background checks, Security clearances, Physical access controls)
1575
In narcotics investigations what make methamphetamine labs particularly hazardous
Meth labs often use volatile chemicals that can cause explosions, making them dangerous to approach
1576
Which of the following would most likely reduce the effectiveness of a fault tree analysis
Incorrectly identifying the root cause of analysis
1577
Which of the following is least likely to influence the ROI of a physical security system involving biometric locks
The number of manual override mechanisms for the lock system
1578
Which of the following is least probable to cause nuisance alarms for bistatic microwave sensors
Temperature changes between day and night
1579
Which of the following types of evidence is least likely to be used to prove intent in a criminal investigation
Testimony from an expert witness
1580
Which sensor would be the most appropriate for monitoring activity inside a highly restricted vault
Seismic sensor
1580
In which environment would PIR sensor be least effective
Environments with rapidly changing temperatures
1581
Which of the following is not a potential threat to personnel security
Social engineering Insider Threats Physical Security Breaches
1582
How does the adversary sequence diagram help in determining the effectiveness of security response measures
By visualizing potential adversary actions and response timings
1583
Which of the following is least likely to be a critical element in crisis management raining exercises
Updating crisis management plans in real time
1584
What is the primary purpose of a locks cam mechanism
To retract the bolt
1585
What challenge must be considered when deploying microwave sensors in an urban environment
The potential for the microwave signals to interfere with local Wi-Fi networks
1586
Which of the following is not a common financial ratio used to assess a company's profitability
Quick Ratio
1587
Which of the following is not a benefit of biometric authentication
Low Cost
1588
______ is used to compare the desirable of different ways of spending
Return on investment
1589
Which of the following scenarios represents a deductive approach in a risk assessment
Starting with specific event and tracking all possible outcomes
1590
What is the most significant challenge of using unmanned aerial vehicles (UAVs) for physical security in large facilities
UAVs have limited battery life, reducing their effectiveness for continuous surveillance
1591
In disaster recovery what is the key purpose of the recovery point objective (RPO)
To define the acceptable amount of data loss in terms of time
1592
Which of the following is most likely to be a challenge in executing a business continuity plan (BCP)
Gaps in employee crisis training
1593
What is the purpose of a personnel security risk assessment
To identify vulnerabilities and threats
1594
Which of the following lamps is best suited for environments requiring high intensity, uniform light distribution
Metal Halide
1595
In the formula Risk = Cube root of (Threat x Vulnerability x Impact), which factor can be reduced to have the greatest effect on overall risk
Vulnerability
1596
How does beam divergence in laser sensors affect the accuracy of long range perimeter security systems
Greater divergence increase detection range but reduces precision
1597
Which type of sensor is most effective at detecting an intruder who remains stationary for an extened period
Ultrasonic sensor
1598
What is the primary advantage of using microwave sensors in perimeter security
Less affected by weather conditions
1599
Which of the following sources of information is not typically considered part of the investigative process
A record A custodian of record A public official
1600
Which of the following is not a liability
Accounts payable
1601
In a museum setting, how does the use of inductance based sensors complement the security provided by CCTV cameras
Inductance sensors can detect unauthorized removal of metallic artifacts, which may not be visible on camera
1602
Which of the following characteristics is most important in ensuring that a vaults locking mechanism is resistant to tampering
UL 768 compliance
1603
Which of the following is not a recommended feature for effective lighting in perimeter security
Motion sensor activated lighting to minimize operational units
1604
How might an intrusion detection system (IDS) be circumvented in a high security facility
By exploiting areas where sensors have not been installed
1605
Which lock mechanism is least susceptible to impressioning techniques
Disc Detainer lock
1606
When conducting pre employment background checks , the most important information collecting tool is
The interview
1607
Which type of sensor is most effective in detecting intruders in complete darkness
Thermal imaging sensor
1608
Which of the following is not a factor considered in personnel security
None of the above (Criminal history, Financial stability, Educational background)
1609
Which of the following combinations would increase the likelihood of a successful attack on critical infrastructure
Strong detection capabilities but slow response times
1610
What is the primary purpose of installing anti pass back systems in access control
To prevent employees from sharing their access cards
1611
In physical security design why is it important to conduct a threat analysis specific to the facilitiys industry
Different industries face unique risks and require tailored security measures
1612
Which of the following is most likely to improve the overall detection capability of a physical protection system (PPS)
Installing additional intrusion detection sensors in vulnerable areas
1613
Which of the following factors is most likely to increase the overall threat landscape in an organization
Reducing the number of physical barriers around assets
1614
Which of the following is not considered an advantage of using inductive risk analysis methods
They allow for a detailed assessment of asset vulnerabilities
1615
Which of the following investigative resources is most likely to provide information on regulations of common carriers interstate commerce or railroad accidents
Interstate commerce commission
1616
Which of the following is most likely to be classified as intellectual property under US Law
A software program developed by a company for internal use
1617
Which lamp is known for having poor performance in cold temperatures, making it unsuitable for outdoor security lighting in cold climates
Compressed fluorescent
1618
Which of the following is least likely to be considered conclusive evidence in an embezzlement case
Eyewitness testimony from coworkers
1619
Which of the following components of the REID technique might increase the risk of false confessions
Offering the suspect a moral justification Presenting false evidence
1620
Which of the following best describes the operation of a thermal imaging sensor
Detects changes in temperature within a defined area
1621
Which of the following is a key component of a security incident response plan
Training employees on communication protocols
1622
What is the primary advantage of using motion activated security lighting in residential areas
It reduces light pollution and energy consumption while maintaining security by illuminating only when needed
1623
In the adversary sequence diagram, what impact does a longer time delay have on the Probability of Success (Ps) of an adversary
It decreases Ps giving security forces more time to neutralize the threat
1624
What is the principal drawback of using keypad lock in high security environments
Susceptibility to wear patterns revealing the code
1625
Which of the following is not a method of digital evidence preservation
Data compression
1626
Which of the following is least likely to be an effective method for handling hostile witnesses
Using confrontational techniques to force answers
1627
Which key component in a pin tumbler prevents the lock from opening without the correct key
Driver pin
1628
Which of the following is a critical consideration when designing a secure access control system for a data center
Reliability and and redundancy of access control mechanisms
1629
How does tempered glass differ from laminated glass in terms of its reaction to impact
Tempered glass breaks into small, blunt fragments, while laminated glass cracks but remains intact
1630
Which of the following is a key principle of information security
Expense
1631
Which of the following sensor types would be most appropriate for detecting vehicles approaching a secured facility
Magnetic sensor
1632
What is the primary goal of a security policy
Defining acceptable use of resources
1633
________ is a set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services and processes
A standard
1634
Which of the following is a recommended best practice when investigating allegations of workplace misconduct
Document every step of the investigation in detail
1635
In access control systems, which of the following is considered a dual factor authentication method
card reader and fingerprint scan
1635
Which of the following is a key vulnerability of monostatic infrared sensors
Susceptibility to dust and fog interference
1636
Which of the following is most probable to reduce the overall risk exposure for an organization
Developing contingency plan for high risk assets
1637
Which of the following is most likely to be compromised by an advanced persistent threat (APT)
High value targets such as government agencies and financial institutions
1638
Which of the following is least likely to be considered when determining the fair market value of a patent
The cost of acquiring the patent from the original inventor
1639
Which of the following combinations would increase the probability of interruptions (PoI) for an adversary attack on critical infrastructure
Increasing physical barriers and improving detection systems
1640
In a fraud investigation, which tool is most effective for tracing illicit transactions across multiple jurisdictions
Data analytics
1641
In criminal investigations involving organized crime, why is it crucial to use asset forfeiture as a tactic
To disrupt the financial operations of the criminal organization
1642
Which of the following is the most effective method of reducing risk when a high threat asset is involved
Implementing layered physical security
1643
Which of the following is not a benefit of biometric authentication
Low cost
1644
Which type of vault lock is least likely to be affected by mechanical failure
Biometric lock
1645
What is the primary disadvantage of using capacitive sensors in outdoor environments
High sensitivity to moisture
1646
Which business principle involves evaluating the organizations internal and external environments
Strategic management
1647
Which of the following is most likely to lead to a dismissal of evidence collected in an undercover investigation
The undercover agent influencing the suspects actions
1648
Which of the following best describes the operation of an acoustic glass break sensor
Detects specific frequencies associated with breaking glass
1649
Why is it essential to involve both IT and business units in disaster recovery planning
Disaster recovery requires input from IT to address technical issues and from business units to prioritize critical operations for recovery
1650
Which of the following weakness is most likely to arise from using circumstantial evidence in court
Circumstantial evidence is easily refuted by the defense
1651
In physical security assessments why is it important to include employee behaviour as a potential risk factor
Employees may intentionally or unintentionally compromise security protocols
1652
Which of the following is not a typical goal of protection in depth
Ensuring that no vulnerabilities exist within the system
1653
Which of the following is least likely to be an outcome of effective crisis leadership
Removal of crisis management team members
1654
Which of the following is least likely to be an effective protection against escalation of privilege attacks
Encrypting files stored on the network
1655
What is the typical color rendering index (CRI) of a high pressure sodium lamp
20-30
1656
Which of the following best describes the function of a criticality assessment in a security risk model
To prioritize the protection of assets based on their importance to business continuity
1657
Which of the following is most likely to be the first step in a threat evaluation process
Evaluating the credibility of the threat
1658
Which factor is least likely to increase the Probability of detection (Pd)
Reducing detection sensitivity but enhancing response force readiness
1659
Which of the following is least likely to be considered an intangible asset under international financial reporting standards (IFRS)
Inventory held for sale in the ordinary course of business
1660
Which of the following is most likely to increase the delay time in a PPS
Installing reinforced doors and locks at critical entry points
1661
Which of the following is least likely to be used in a secure email transmission protocol
Simple Mail Transfer Protocol (SMTP)
1662
Which of the following is least likely to influence the CRI (Color Rendering Index) of a security lighting system
The ambient temperature in the environment where the lighting is installed
1663
Which of the following is least likely to be useful when assessing the role of opportunity in an employees decision to commit fraud
Investigating the financial pressures experienced by the employee outside of work
1664
What is the primary weakness of physical evidence such as fingerprints in an investigation
Fingerprints alone cannot prove the intent of a suspect
1665
Which of the following is most relevant for determining the credibility of an informant in a narcotics sting operation
The informants previous track record of providing accurate information
1666
What is the primary role of a crisis management team in BCMS
Coordinating emergency response
1667
How might an organization balance the need for physical security with business continuity during a major construction project
By creating alternative access points that maintain security while allowing for operations to continue
1668
Which of the following is a key weakness of relying solely on insurance to manage security risk
It does not prevent the occurrence of risk events
1669
Which of the following is least likely to be considered when assigning occupant roles in an emergency plan
The hierarchy of the organizational structure
1670
Which of the following is not a type of security control
Operational
1671
Which of the following is a key principle of information security
Confidentiality
1672
Which of the following is not a standard component of a forensic investigation
Financial auditing
1673
What is the purpose of a security clearance
To grant access to classified information To restrict access to sensitive areas To verify an individuals identity
1674
Which of the following is a key principle of personnel security
Need to know principle Least privilege principle Separation of duties principle
1675
In which scenario would physical security rely on active deterrence measures
When the facility depends on visible security to discourage criminal activity
1676
Which of the following are core principles of the PEACE model of investigative interviewing
Planning and preparation Evaluation of evidence
1677
What is the primary goal of security incident management
Identify security weaknesses Responding to incidents
1678
Which of the following is least likely to be considered an all hazards approach in crisis management
Focusing exclusively on natural disaster scenarios
1679
Which of the following is not a characteristic of Balanced protection
Every layer of protection is equally effective in preventing threats
1680
Which of the following is most probable to restart after a power outage and take the longest to do so
Metal halide and mercury vapor lamps
1681
Which sensor technology is most effective for detecting sudden impacts on fences or walls
Vibration sensor
1682
Which of the following factors is least relevant to proving the intent in a defalcation case
The suspects past employment history
1683
In a controlled hire what is the main goal of infiltrating the organization
To gather internal documents and evidence To gain trust and elicit confessions
1684
What is the main advantage of using a monostatic radar sensor over a bistatic sensor in urban environments
More resistant to environmental changes
1685
Which of the following is most likely to complicate the enforcement of a trade secret in a multinational company
The trade secret protection laws vary significantly across different jurisdictions
1686
Which of the following is most probable to result from a failure to conduct regular security audits
Increased risk of undetected vulnerabilities
1687
Which of the following is the most important factor when designing a delay layer in PPS
Extending the time required for an adversary to by pass barriers
1688
How do beam divergence and wavelength affect the performance of laser based perimeter sensors in foggy conditions
Beam divergence and wavelength shifts cause signal attenuation reducing accuracy
1689
What is the primary advantage of using biometric technologies in security systems
High accuracy
1690
Which vault door design is most resistant to both forced entry and fire damage
Composite vault door
1691
Which of the following is not a purpose of personnel security
Ensuring the physical security of facilities
1692
Which of the following is least likely to be classified as an intangible asset on a company's balance sheet
A leased factory building used for production
1693
Which of the following is least probable to be vulnerability of a loop system in an electronic protection system
The loop can be easily extended to cover additional areas
1694
Which of the following factors is least relevant when conducting a cost benefit analysis for security investments
Increased operational efficiency
1695
How to microwave sensors distinguish between legitimate movement and environmental interference such as blowing leaves or heavy rain
By analyzing the Doppler shift in returned microwave frequencies
1696
Which of the following combinations would most likely increase risk without increasing vulnerability
Increased asset visibility and slow recovery times
1697
Which of the following is not a criterion for evaluating bids for security services
Security personnel training background
1698
Which combination of factors would reduce the likelihood of an adversary successfully exploting vulnerabilities
Increasing access control measures and reducing threat likelihood
1699
What is the most effective way to handle inconsistencies in witness testimony using the PEACE model
Ask open ended questions to clarify discrepancies
1700
Which of the following is not a primary goal of a buy bust operation
Protecting undercover operations
1701
Which of the following is least likely to be a primary goal when responding to chem-bio mail attacks
Protecting assets from potential contamination
1702
Which lamp type is generally the most cost effective for high output ssecurity lighting
LED
1703
Which of the following lock offers the highest protection against lock bumping
High security dimple locks
1704
What is the main disadvantage of a fragmented ESRM approach
Increased coordination complexity Higher operation costs
1705
Which of the following factors is most relevant when determining the probability of neutralization (Pn) in a security
Response force readiness
1706
Which of the following is not a common method used to detect insider trading
Reviewing employee performance evaluations
1707
Which of the following technologies is most susceptible to environmental conditions like wind and rain
Vibration sensors
1708
Which of the following is primary disadvantage of using barbed wire fencing in highly populated urban areas
Barbed wire can cause injury to unauthorized personnel and wildlife
1709
What is a major drawback of using vibration sensors for perimeter security in areas with high environmental noise
High susceptibility to false alarms
1710
What is the major benefit of using open ended questions during a cognitive interview with a witness
Open ended questions allow the witness to provide detailed, uninterrupted recollections of events
1711
How might adversaries exploit weaknesses in biometric access control systems
By using high quality reproductions of biometric data to gain unauthorized access
1712
What is the primary goal of personnel security
To ensure the safety of employees
1713
How does increasing the probability of interruption (Pi) affect the adversary's chances of success
It reduces the time an adversary has to act
1714
Why are bistatic microwave sensors preferred over monostatic configurations for security wide area perimeters
They provide improved detection accuracy by separating the transmitter and receiver
1715
Which of the following is least important when conducting a thorough investigation
Ensuring evidence is analyzed within 24 hours
1716
What makes volumetric sensors particularly effective for use in large multi story parking garages
The can detect movements on different levels of the structure, providing comprehensive coverage without the need for sensors on each floor
1717
Which of the following is a common method for mitigating risk
Implementing security controls
1718
Why is annealed glass not recommended for use in high security applications
It shatters into large, sharp pieces upon impact, creating safety hazards
1719
Which of the following is most likely to be considered a major weakness of the Secure Hash Algorithm (SHA) family
Susceptibility to collision attacks
1720
Which of the following features of a vault lock offers the best protection against drilling attacks
Hardened steel plates
1721
In the context of quantitative risk analysis, which of the following formulas is used to calculate Annual Loss Expectancy (ALE)
ALE = Single Loss Expectancy (SLE) x Annual Rate of Occurrence (ARO
1722
Which of the following is an example of a logic bomb
Malware that is triggered by a specific event or date
1723
What is the primary goal of personnel security
To prevent unauthorized access to sensitive information
1724
Which of the following is a key component of a security incident response plan
Training employees on communication protocols
1725
Which of the following factors is most likely to reduce the overall effectiveness of a physical protection system (PPS)
Delayed response times
1726
Which of the following is least likely to be factor when deciding to evacuate or shelter in place during a crisis
The media coverage of the event
1727
Which investigative principle is best supported by timeliness
Efficiency
1728
In a security management plan which of the following best describes the best method for mitigating risk without transferring or avoiding it
Enhancing detection systems
1729
Which of the following is not a benefit of using digital forensics in investigations
Ensuring data privacy
1730
How does the probability of neutralization (Pn) impact the overall responsibility of success (Ps) in an adversary sequence diagram
A high Pn decreases the adversarys probability of success (Ps)
1731
What is the primary goal of personnel security
To prevent unauthorized access to sensitive information
1732
Which of the following is not a typical goal of Protection in depth
Ensuring that no vulnerabilities exist within the system
1733
In security system design, what does the term time delay refer to in an adversary sequence diagram
The period between detection and neutralization of the adversary
1734
Which material is used in high security vault walls to provide enhanced protection against cutting tools
Tungsten carbide
1735
In the context of sting operations what is the term bag head used to describe
An undercover officer used as bait
1736
What is the key advantage of using a magnetic lock of vault security
No moving parts to wear out
1737
How can thermal sensors be compromised in extreme environmental conditions
Extreme temperatures can cause thermal sensors to malfunction or trigger false alarms
1738
What is the most common weakness of fire resistant safes when used for high security burglary protection
Lower resistance to drilling and cutting
1739
Which standard rates the resistance of a safe to attacks by tools, torches and explosives
UL 608
1740
In the context of the adversary path diagram (ASD), which of the following would be considered the most effective delay point
A high fence with surveillance
1741
Which of the following management theories focuses on treating employees as self motivated individuals who thrive on responsiblity
McGregor's Theory Y
1742
Which of the following factors is most relevant when determining asset vulnerability in a critical infrastructure system
The proximity of the asset to potential threats
1743
In CPTED which of the following strategies best represents the principle of natural access control
Limiting points of entry
1744
Which type of evidence is most vulnerable to tampering during a hire profile corporate investigation
Digital evidence
1745
Which of the following is least likely to be recommended approach when dealing with a high profile public crisis
Limiting communication to senior management only
1746
Which of the following is a common type of malware
Ransomware
1747
What is the expected lifespan of a typical LED lamp used for security lighting
50000 Hours
1748
Which of the following is least likely to be considered a tangible asset on a company's balance sheet
A patent for a proprietary manufacturing process
1749
Which of the following is least likely to affect the effectiveness of a fence used for perimeter security
The thickness of the fence posts
1750
Which type of lock is considered the most difficult to manipulate
Disc Detainer Lock
1751
Which of the following is least likely to be protected by a trademark
A newly invented process for manufacturing goods
1752
What is the primary challenge in coordinating crisis management for decentralized organization
Ensuring communication consistency across geographically dispersed teams
1753
What is the purpose of security clearances in personnel security
To grant individuals access to classified information To assess and individuals trustworthiness To prevent unauthorized disclosure of sensitive information
1754
What is a common tactic used by suspects during interrogation to evade detection
Presenting multiple conflicting version of the story
1755
Which of the following vault materials provides the best balance between cost effectiveness and high security in commercial environments
Composite steel
1756
What is the most significant vulnerability of a safe with a mechanical combination lock
Susceptibility to manipulation
1757
Which combination of factors is most likely to lead to job dissatisfaction according to Herzberg
Poor salary and poor working conditions
1758
Which of the following sensors is most effective at detecting fast moving objects across an open area
Microwave sensor
1759
What is the primary advantage of using LED lighting for security purposes over metal halide lighting
Higher energy efficiency
1760
Which of the following factors is least likely to contribute to reducing asset criticiality in a high security environment
Reducing the assets importance to the organizations goals
1761
What is the purpose of surveillance in an investigation
To gather information
1762
What is the main security feature of a safe with a TL-15 rating
Resistance to forced entry for 15 minutes
1763
Which of the following is least likely to undermine the credibility of a hostile witness
Allowing the witness to express themselves freely
1764
Which of the following is least likely to be a characteristic of a controlled buy operation in drug investigations
The undercover officer intentionally increases the size of the drug buy
1765
Which fire rating would be appropriate for a vault designed to protect high value assets in a facility prone to frequent fires
4 Hours
1766
Which of the following is not an essential factor when selecting bullet resistant glazing for a security facility
The refractive index of the glass
1767
Which phase of the PEACE model focuses on ensuring the interviewer remain neutral and unbiased
Plan and prepare
1768
What is the primary purpose of a physical security information management (PSIM) system
To integrate multiple security applications and devices into a unified platform To provide real time incident response
1769
What is primary purpose of sting operation
To induce a suspect to commit a crime
1770
Which of the following weaknesses is most likely to arise from using REID techniques in an interview with a suspect with low mental capacity
The suspect may provide false confessions under pressure
1771
Which of the following is least likely to be considered a vulnerability in mobile device management (MDM)
Regularly updating mobile device operating systems
1772
What is the primary advantage of using biometric locks over traditional locks
Unique identification capability
1773
Which type of cable is most effective at preventing signal loss over distances greater than 100 meters in perimeter security systems
Fiber-optic
1774
Which of the following would most likely reduce the effectiveness of a deterrent in a Physical Protection System (PPS)
The deterrent is not visible to potential adversaries
1775
Which of the following is a limitation of using acoustic sensors for detecting intrusions
Inability to differentiate between ambient noise and actual intrusion sounds
1776
What is the primary advantage of using a dual technology sensor in physical security
Reduced false alarms
1777
Why might it be more important to integrate emergency response protocols with physical security systems in high risk facilities
Integrated protocols ensure that security systems do not interfere with emergency response efforts, such as evacuations
1778
Which type of sensor would be most vulnerable to detection failure in environments with a lot of glass or reflective surfaces
Ultrasonic sensor
1779
In the investigative process, what reflects the mindset of the investigator
Simple statement of abstracts encountered
1780
How might personnel risk assessments prevent potential insider threats from emerging
By identifying vulnerabilities before they are exploited
1781
Which of the following factors is least likely to influence an investigators approach
Investigators bias
1782
What is the main challenge of using social engineering techniques in security investigations
Legal implications
1783
How does the twist rate of CAt6 cables affect their performance in high bandwidth security systems
A higher twist rate increases resistance to external interference
1784
In the context of crisis management, which of the following is most important for maintaining business operations during a disaster
Effective communication channels
1785
Which of the following is most likely to undermine the reliability of eyewitness testimony in a high stress environment
The eyewitness's memory may be distorted by stress
1786
Which of the following is the best method for reducing the threat level in a security system
Implementing proactive detection measures
1787
What is the primary benefit of using mercury vapor lamps in security lighting applications
Long lifespan
1788
Which of the following combinations would most likely increase overall risk in security system
Increasing asset visibility but reducing threat deterrence systems
1789
Which rating denotes that a lock is highly resistant to both physical and covert methods of entry including lock picking and manipulation
UL 437
1790
Which of the following is not a characteristic of an effective security program
Minimal documentation
1791
Which of the following factors is least likely to reduce the Probability of Detection (Pd)
Enhancing detection sensitivity but reducing sensor placement
1792
Which of the following is the primary weakness of using circumstantial evidence in court
It rarely connects the suspect directly to the crime
1793
In a qualitative risk analysis, which of the following factors is most likely to be used to assess risk
The probability of occurrence and impact
1794
Which type of lamp is considered obsolete due to its high energy consumption and low efficiency despite its once widespread use in street lighting
Mercury vapor
1795
Which of the following best describes the concept of saturation in surveillance operations
Ensuring continuous coverage Overlapping surveillance efforts Maximizing observer presence
1796
Which feature of high security vault doors enhances their resistance to both physical and explosive attacks
Reinforce concrete one
1797
What is the main disadvantage of using public key encryption
Reduced performance compared to symmetric encryption
1798
How does the refractive index of tempered glass affect the performance of laser sensors used for break detection in windows
It influences how the laser beam penetrates the glass, allowing for more precise detection of fractures
1799
What is the primary benefit of using the Cognitive Interview Technique over more traditional interrogation methods
It helps retrieve more accurate information
1800
Which of the following is most probable to reduce the likelihood of an attack on a high value asset
Implementing visible deterrents such as CCTV cameras
1801
What is the function of the central conductor in a coaxial cable used in perimeter camera systems
It carries the high frequency signal for video transmission
1802
Which of the following is an example of personnel security control
Two factor authentication
1803
In complex financial fraud investigations why is the collection of metadata often essential
It helps to establish the origin of digital communications
1804
Which of the following is least likely to improve a company's ROI from a new security system
Delaying the implementation timeline to reduce costs
1805
When conducting an investigation why is it important to avoid leading questions during witness interviews
They can inadvertently direct the witness to a specific answer
1806
Which of the following factors would most likely reduce the probability of interruption (Pn) in a hig security environment
Delayed detection systems and slow response times
1807
Which type of safe rating is required for storing sensitive government documents
GSA Class 5
1808
Which type of cable is most vulnerable to interference from nearby high voltage power lines
Unshielded twister pair
1809
Security through obscurity
Hiding measures Visible deterrents
1810
Which factor would least likely contribute to an increase in an assets vulnerability
Strong physical security barriers but delayed detection systems
1811
Which of the following concepts is associated with the span of control in management
The number of employees reporting directly to one supervisor
1812
In a high security facility which of the following would be preferred locking mechanism for securing access to a vault
Dual Control Lock
1813
What is the role of incident response in personnel security
To quickly and effectively respond to security incidents To mitigate the impact of security breaches To identify and address vulnerabilities in the security system
1814
Which of the following is most likely to compromise the availability of a critical business application hosted on a virtual machine
The hypervisor fails to allocate sufficient resources
1815
Why might an investigator use the Reid technique during an interrogation
To encourage the suspect to admit guilt through psychological pressure
1816
Which factor most affects the performance of microwave sensors in detecting metallic objects at close range
The conductivity of the detected metal
1817
Which of the following best explains the difference between Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
TLS be more security successor to SSL providing stronger encryption protocols
1818
What is the primary purpose of implementing an anti passback feature in an access control system
To prevent unauthorized re entry To ensure single entry exit compliance
1819
Which of the following techniques is most often used in inductive risk assessment
Generalizing from specific incidents to broader risk patterns
1820
Which of the following is not considered a deterrent in physical security design
Passive Infrared Sensors
1821
Which of the following best describes the relationship between criticality and risk tolerance in risk management
Assets with higher criticality generally result in lower risk tolerance
1822
Which type of sensor is most effective in detecting intruders in total darkness
Thermal imaging
1823
Which of the following is not one of the strategies of second generation CPTED
Communication
1824
Which of the following vault designs provides the best protection against electromagnetic interference
Lead lined vault
1825
Which of the following is most likely to help investigators detect early signs of fraud by analyzing the pressure component of the Fraud triangle
Conducting regular interviews with employees to assess their financial and personal stressors
1826
Which of the following is least probable to appear on a company's income statement
Cash reserves
1827
Which factor is most likely to reduce the Probability of detection (Pd) in a high threat environment
Weak detection sensitivity and delayed sensor placement
1828
Which of the following would be classified as a hygiene factor according to Herzberg
Salary
1829
Which of the following is most likely to improve the accuracy of probability of detection (Pd) in an adversary sequence diagram (ASD)
Calibrating sensors to optimal settings based on environmental factors
1830
Which lock standard specifically addresses the security and durability of padlocks used in high security applications
UL 437
1831
Why might a security system integrate both volumetric and line detection sensors in a layered security approach
To cover different areas, volumetric for interiors and line detection for exits and entrances
1832
Which of the following is least relevant when selecting Key Performance Indicators (KPIs) for a security program
The frequency of incidents reported
1833
Why might physical security measures need to be adjusted in response to changing business operations, such as new workflows or expanded facilities
Changing operations may create new vulnerabilities or access control needs
1834
Which of the following is not included in the calculation of the quick ratio
Inventory
1835
According to Abraham Maslow which of the following needs is least likely to motivate an employee once it is fulfilled
Physiological
1836
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
1837
How can environmental factors affect the performance of infrared cameras used in physical security systems
Extreme temperatures and humidity can reduce the accuracy of heat signatures
1838
How might criminals attempt to bypass access control systems that use magnetic locks
By tampering with the control panels that regulate the locks
1839
Which of the following is least likely to be a valid form of evidence in an investigation under strict chain of custory rules
Evidence collected by an untrained investigator
1840
Which lock rating standard is globally recognized for testing high security mechanical locks
UL 437
1841
On what conditions should the decision of whether to arm a security officer be based
When the officer may be reasonably expected to use fatal force and life safety is at risk
1842
What is the most significant challenge when presenting digital evidence to a jury
Juries often cannot understand the technical details of digital evidence
1843
Which of the following weaknesses is most likely to arise from relying on eyewitness testimony in a robbery investigation
Eyewitnesses may experience memory distortion due to high stress
1844
Which standard governs the design and rating of vault doors for high security facilities
UL 608
1845
Which of the following is not a benefit of organization
Enhancing data availability
1846
Why is continuous monitoring of personnel security risks important in high turnover industries
High turn over increases the likelihood of insider threats
1847
Security access control key
Reliability Convenience
1848
What is the critical limitation of using Doppler radar for intrusion detection in areas with heavy vehicular traffic
Heavy traffic creates constant frequency shifts, causing false alarms
1849
What is the primary goal of a background check
Ensuring candidate suitability
1850
Which of the following is not included in the calculation of the quick ratio
Inventory
1851
Which firing rating is commonly required for walls in a high risk data center to prevent fire from spreading
3 Hours
1852
Which of the following is least likely to be required when obtaining a trade license for operating a business in a regulated industry
Filing for copyright protection for company materials
1853
How does high vulnerability score affect the calculation of overall risk
It increase overall risk by making the asset more susceptible to threats
1854
Which of the following is least probable to be a critical factor in selecting sensors for perimeter protection
Availability of backup power systems
1855
Which two factors are critical in determining the Probability of Loss (PoL)
Vulnerability and threat likelihood Threat likelihood and vulnerability exploitability
1856
Which of the following is a disadvantage of using fiber optic cables in cold weather environments for perimeter security
Fiber optic cables become brittle and more prone leakage
1857
Which of the following interrogation techniques focuses on minimizing confrontation to obtain confessions
The REID technique
1858
Which of the following is least likely to improve the response capability of a Physical Protection System (PPS)
Reducing the number of access points to the facility
1859
What is the primary security benefit of implementing a lighting system with adjustable intensity and color settings in a cultural heritage
Adjustable settings can adapt to the natural light variations throughout the day, ensuring optimal visibility for security cameras
1860
Which of the following is not a key component of personnel security
None of the above (Background checks, Access control, Physical security measures)
1861
In a monostatic radar system how are objects detected
By measuring the reflection of the transmitted signal from the object
1862
Which type of cable is most suitable for security system requiring the simultaneous transmission of power and data
Cat6 with Power Over Ethernet (PoE)
1863
How does the concept of Hazard fit into the overall security risk equation
A hazard is a potential event that could negatively impact an assets operation
1864
Why is RJ11 typically not used in modern security networks
RJ11 supports only analog communication transmission making it obsolete for high speed data
1865
Which of the following is not a measure to protect against Social engineering attacks
Implementing strong access controls Conducting regular security awareness training Verifying the identity of individuals before granting access
1866
Which feature of concertina wire makes it particularly effective for use in military facilities and high security zones
The density of the wire making it difficult to cut or climb
1867
Which of the following factors is least relevant when selecting KPIs for a security program
The cost of security measures
1868
Which of the following theories emphasizes the idea that employees are inherently motivated to achieve their fullest potential
Maslow's Hierarchy of Needs
1869
Which of the following would be considered a motivator in Herzberg's theory
Achievement
1870
Which of the following is a key advantage of using the Cognitive Interview over the REID technique
It avoids accusations of coercion by focusing on free recall
1871
Which of the following best describes an event tree analysis
An inductive approach to assess the consequences of a specific event
1872
Which of the following types of sensors is most likely to generate false alarms due to environmental vibrations
Seismic sensor
1873
In an investigation involving intellectual property theft why is it essential to review the suspects communications with competitors
To establish intent and identify co-conspirators
1874
Which of the following is least likely to be a critical element in a crisis simulation exercise
Performing a detailed financial audit
1875
Which of the following is least likely to improve the respond function in a PPS
Installing advances intrusion detection systems
1876
What is the primary limitation of using microwave sensors in a large outdoor environment with varying terrain
Environmental factors such as wind and rain can interfere with detection
1877
In an surveillance operations, what it the primary risk of relying exclusively on one surveillance technique
It limits the ability to collect evidence from diverse perspectives
1878
Which combination of factors would reduce the Probability of Loss (PoL) for a critical infrastructure system
High recovery capability and low threat likelihood
1879
Which of the following factors is most likely to increase the Probability of Detection (Pd) in a security system
Enhancing surveillance coverage
1880
Which of the following is least likely to be a force multiplier in investigations
Increased surveilance personnel
1881
Which type of lamp experiences significant lumen depreciation over its lifespan, leading to reduced light output before the lamp fails
Mercury vapor
1882
Which of the following is most applicable to gambling investigations conducted by a proprietary investigative force
Telephone surveillance
1883
What is the main reason fiber optic cables are immune to electromagnetic interference in high security environments
Fiber optic cables do not emit any electromagnetic radiation
1884
What two values describe sensor effectiveness
Probability of detection and confidence level
1885
What is the primary goal of personnel security screening
To identify potential security risks
1886
Which lighting type has the greatest overall energy efficiency based on lumens per watt
LED
1887
What is the purpose of conducting background checks in personnel security
To verify employment history To assess criminal records To evaluate financial stability
1888
In what scenario would the use of glass break sensors be most appropriate as part of an intrusion detection system
When securing areas with large windows or glass doors
1889
Which of the following is not included in the calculation of the quick ratio
Inventory
1890
Which of the following best describes the quick ratios ability to assess a company's short term financial health
It excludes inventory and prepaid expenses focusing on liquid assets that can be quickly converted into cash
1891
Not a biometric benefit
Convenience
1892
Which of the following factors is least likely to contribute to false confession during a REID interrogation
Using non accusatory language to allow the suspect to provide their narrative
1893
Which of the following factors is most relevant when conducting a cost benefit analysis for security investments
The potential reduction in risk
1894
What is the function of the cladding in a fiber optic cable
To reflect light signals back into the core for signal transmission
1895
How can a suspect used digital dead drops to evade detection in an investigation
By posting seemingly harmless flies in public forums for later retreival
1896
In the Maslow Hierarchy of needs which of the following needs are considered social needs
Love and belonging
1897
Which of the following is least likely to be effective in preventing SQL injection attacks on a web appliciation
Encrypting all data transmitted between the server and client
1898
What is the primary objective of the narco analysis technique
Inducing a trance like state to bypass conscious resistance
1899
________________ examines the outcome of successful adversary attack the likelihood will occur, how it will occur, and how many people will be affected
Risk assessment
1900
Which of the following is least likely to result in a loss of trademark rights
The trademark is used for a different class of goods than that was registered
1901
Which of the following best describes the relationship between probability of detection (Pd) and probability of interruption (Pi)
An increase in Pd enhances the likelihood of Pi
1902
Which of the following is least likely to be a common element in a crisis communication plan
A financial recovery strategy
1903
What is the most effective method for enhancing physical security in a high risk facility
Increased lighting Biometric access control
1904
How does natural surveillance influence crime deterrence in CPTED design
It reduces the need for physical barriers by increasing visibility
1905
Which combination of factors is most likely to reduce the Probability of interruption (Pi)
Strong access control measures but slow response times
1906
In CPTED which of the following strategies best represents the principle of natural access control
Lilmiting points of entry
1907
What is the most significant vulnerability in most vault designs
Roof or floor penetration
1908
Which of the following is most indicative of a successful buy bust operation
The evidence collected is admissible and directly links the suspect to the crime
1909
What is the main goal of personnel security screening
To protect sensitive information
1910
In what security application would a line detection sensor be particularly effective and why
In securing windows and doorways as it can create an invisible line that when broken by an intruder triggers an alarm
1911
In a corporate fraud investigation, what would be the key benefit of using a sting operation
To gain insight into a suspects methods without them knowing To gather evidence through voluntary participation of the suspect
1912
Which of the following is most likely to be the consequence of incorrectly classifying an intangible assets as a tangible asset on a company's financial statements
The company may incorrectly depreciate the assets, affecting profitability reports
1913
Which of the following is not a component of personnel security
None of the below Background checks Security awareness training Physical security measures
1914
How does the frequency of a laser based sensor affect its ability to penetrate through tempered glass in security
Lower frequency lasers pass through tempered glass with minimal signal loss
1915
Which of the following is the least probable impact of high threat low vulnerability scenario
Minimal risk
1916
What is the most significant advantage of integrating physical security systems with building automation systems
It allows security personnel to monitor and control security measures remotely
1917
What factor contributes most to the short lifespan of incandescent lamps compared to other lighting technologies
Fragile filament
1918
Which combination of factors is most likely to increase the overall threat landscape
Increasing detection systems but ignoring response times Reducing the assets physical security but increasing cybersecurity
1919
Which of the following is not a key element of risk management
Avoiding all risks
1920
Which of the following is the most critical method for ensuring that a security policy is enforced consistently across the organization
Monitoring employee compliance
1921
Which of the following best explains how Rational Choice Theory can be used to assess potential fraud risks in a corporate environment
Individuals commit fraud after weighing the potential gains against the risks of getting caught
1922
Which of the following is least likely to be a factor in determining the severity of a crisis
The number of personnel involved in the response
1923
Which type of cable is best suited for securing a perimeter where frequent power outages occur and why
Fiber optic cables because they do not rely on electrical signals
1924
Which of the following is not a criterion for evaluating bids for security services
Security personnel training background
1925
Which of the following is considered the least secure method of securing classified documents
Locked desk drawers
1926
What is the primary challenge when interviewing a suspect who is a sociopath
Their tendency to lie easily and convincingly
1927
In the context of security sensors what is a false alarm
An alarm triggered without any actual threat or intrusion
1928
Which of the following is least probable to be direct outcome of increasing surveillance systems
Improved perimeter protection against cyber threats
1929
Which standard is most commonly used to rate the strength and security of padlocks
UL 437
1930
Which of the following is a the primary goal of a business impact analysis (BIA) in business continuity planning (BCP)
Evaluating the financial impact of potential disruptions
1931
In a risk management model which combination of factors most directly increases over all risk
High vulnerability and high criticality
1932
Which of the following is not a key performance indicator (KPI) for BCMS
Employee satisfaction scores
1933
Which of the following is least likely to align with the General Strain Theory's explanation of why individuals commit fraud
The individual is motivated by the opportunity to exploit weak internal controls
1934
Which of the following is not a key feature of a quantitative risk assessment
It provides subjective ratings for potential threats
1935
The main objective of a CCTV system is
Deterrence
1936
Which of the following investigative techniques is the most effective in detecting fraud within an organization
Internal audits
1937
Which of the following sensors is least likely to be affected by temperature fluctuations
Microwave sensor
1938
In a security audit which of the following factors is most likely to influence the effectiveness of a detection system
The level of personnel training
1938
Which of the following is least likely to be a factor in understanding the rationalization component of the Fraud Triangle when investigating white collar crime
The suspects fear of getting caught and facing severe legal consequences
1939
What is the greatest challenge of implementing a robust data classification framework within a large organization
Ensuring consistent classification across departments with differing data access needs
1940
Which factor is least likely to reduce the Probability of Detection (Pd)
Enhanced response time but poorly trained personnel
1941
_________ The most critical stage calls for identifying and analyzing the organizations problems events that could disrupt operations and assets. One identifies the root causes of those problems and begins to rank them in terms of importance
Plan
1942
Which of the following is least likely to contribute the rationalization component of the Fraud Triangle
Assessing the consequences of being caught and prosecuted
1943
What is the key advantage of using a time delay mechanism in a vaults locking system
Reducing risk of forced entry during robberies
1944
In the context of fault tree analysis, the top event refers to
The ultimate failure or breach that analysis seeks to prevent
1945
Which of the following is least likely to be considered a risk in managing trade secret protection
Disclosing the trade secret to third parties under strict confidentiality agreements
1946
Which type of bias is most likely to affect the outcome of an investigation involving a high profile subject
Authority bias
1947
Which of the following factors is not directly involved in determining the Probability of Neutralization (Pn)
Criticality of the event
1948
In what way does the use of bistatic radar enhance airport perimeter security compared to monostatic radar
The use of multiple receiver sites allows for triangulation, improving the accuracy of object location
1949
Which of the following is least likely to be considered a critical success factor for ESRM in a cloud based IT infrastructure
Ensuring continuous on premises monitoring of physical IT assets
1950
How might a disgruntled employee use social engineering tactics to compromise an organizations personnel security
By manipulating coworkers to reveal sensitive information
1951
Which of the following best explains why qualitative risk assessments are often used in conjunction with quantitative assessments
To provide both subjective and objective insights into potential risks
1952
Which of the following is least likely to be considered when assessing security risks within the ESRM framework
The availability of security technologies for risk mitigation
1953
Which of the following evidence types is least likely to be useful in proving motive in robbery investigation
DNA found at the scene
1954
In which type of operation is it critical to ensure that the suspect initiates all illegal actions to avoid claims of entrapment
Sting operation
1955
Which type of lamp has the shortest expected lifespan requiring frequent replacements in security lighting systems
Incandescent
1956
In a disaster planning scenario three of the following factors are considered primary when assessing vulnerabilities which is not one of the three
Insurance factors
1957
Which aspect of polarized light is utilized in some infrared sensors to improve detection in reflective environments
Polarization prevents scattering from rain or dust enhancing detection accuracy
1958
Why is it essential to cross reference an applicants name with known aliases during background investigation
To identify applicants who may have used different identities to evade background checks
1959
Which of the following best describes security through obscurity
Hiding security measures
1960
How might a suspect use smurfing techniques to evade detection in financial investigations
By making multiple small, structured deposits to avoid triggering reporting thresholds
1961
Which of the following is most likely to be challenge in crisis communications during a cyber attack incident
Handling misinformation spread on social media
1962
Which of the following is least probable to be successful strategy for reducing insider threats
Relying solely on background checks for new hires
1963
Which of the following is not an assumption of McGregor's Theory X
Employees seek responsiblity
1964
What is the primary security concern addressed by a time delay mechanism in a vault
Protecting against unauthorized access during specified times
1965
Which of the following is least likely to be useful strategy in detecting fraud early within the pressure component of Cressey's Fraud Triangle
Hiring external auditors to review corporate financial statements quarterly
1966
Under the REID technique of interrogation what is a key psychological tactic used to eliciting confessions
Minimizing the moral seriousness of the offense
1967
Which of the following is not a liability
Accounts receivable
1968
Which of the following is most likely to challenge the use of fault tree analysis in the ESRM process
Limitations in modelling security incidents with dynamic, real time variables
1969
What is the primary security risk of using chain link fencing in areas with frequent pedestrian traffic
Chain link fences offer little deterrence to individuals with basic tools
1970
Which of the following is not a benefit of implementing Protection in depth
The elimination of all vulnerabilities within a security system
1971
Which of the following is most likely to complicate the application of the Fraud Triangle when investigating a global organization with diverse cultural backgrounds
The concept of rationalization may vary significantly across different cultural contexts
1972
What is the primary goal of network segmentation
Limiting the spread of security breaches
1973
Which of the following describes the relationship between hazard and vulnerability
Hazards can exist without vulnerabilities
1974
Which of the following is not a primary factor in determining risk
Response capability
1975
Which of the following disaster recovery strategies is most likely to minimize downtime during a large scale cyber attack
Hot site backup
1976
Which formula is used to calculate Single Loss Expectancy (SLE)
SLE=Asset Value X Exposure Factor
1977
When we design a PPS the level of protection for a group of assets must meet the protection needs of the ____ in the group
Most critical asset
1978
Which of the following is most likely to be considered an intangible asset under financial accounting standards
A patent for a new technology developed by the company
1979
Which of the following is the best method for reducing the likelihood of loss in security system
Enhancing detection systems
1980
Which of the following is most likely to reduce false confessions in a REID interrogation
Using Non accusatory questioning techniques
1981
Which type of evidence is typically most reliable in a corporate investigation involving employee misconduct
Documentary evidence
1982
Which factor is least likely to increase the Probability of Detection (Pd) in a layered security system
Weak sensor placement and delayed response protocols
1983
Which of the following is most likely to be an outcome of failing to address the opportunity aspect of the fraud triangle in an organization with a history of financial fraud
Fraudulent activities will increase due to weak internal controls and lack of oversight
1984
What is the primary factors contributing to the long longevity of LED lamps compared to incandescent lamps
Less Heat Generation
1985
Which of the following is the most critical method for ensuring that a security policy is enforced consistently across the organization
Monitoring employee compliance
1986
Which of the following is the most critical element of the respond function in the Physical Protection System (PPS)
The ability to neutralize the threat after detection
1987
Which of the following is least likely to be impacted by the restrike time of mercury vapor lamps used in outdoor security lighting
The color rendering performance of the lighting system
1988
Which of the following sensor technologies is best suited for detecting intrusions in high vibration industrial environments
Seisimic sensor
1989
What is the primary advantage of using biometric authentication in an investigation
It is difficult to forge
1990
Which of the following is not a potential risk associated with personnel security
Physical damage to facilities
1991
Which lock mechanism provides the highest level of resistance to key duplication
Disk Detainer lock
1992
Which of the following best describes the concept of triangulation in investigations
Using multiple sources of information to verify facts
1993
In what scenario would a fence with anti climb features be insufficient for perimeter security
When additional sensors and surveillance are not integrated into the system
1994
Which of the following best describes the principle of corroboration in investigations
Using multiple sources to verify information
1995
______ risk assessments are often based on lists and depend on how analysts feel about the solution
Qualitative
1996
Which of the following factors would most likely reduce the Probability of Interruption (Pi) in a high security environment
Delayed detection systems and slow response times
1997
Which lock mechanism is most susceptible to drilling attacks
Pin tumbler
1998
What is the primary purpose of a crisis management plan
Ensuring effective response form crisis
1999
The mechanical lock longest in use and first developed is the _____ lock
Warded
2000
In the context of security risk management which of the following represents the least desirable outcome
High threat, high criticality assets
2001
Which of the following is most likely to complicate post crisis recovery operations
Incomplete documentation of the crisis event
2002
Which sensor technology would be most suitable for detecting motion in an underground parking garage
Microwave sensor
2003
Which of the following is most likely to be the first stage in Cressey's Fraud Triangle that leads to the commission of fraud
The individual experiences financial pressure
2004
Which lock mechanism is considered the most secure against both physical and covert attacks
Disc-detainer lock
2005
Which of the following is the best example of a compensatory measure in a security system
Adding security patrols to offset a weak perimeter
2006
Which of the following methods is commonly used to verify the authenticity of digital evidence during an investigation
Hashing algorithms
2007
Which lamp type is most affected by ambient temperature changes, particularly in outdoor installations
Metal Halide
2008
How might adversaries bypass line detection sensors in a perimeter security system
By passing under or over the sensors detection range
2009
Which type of fencing material provides the best protection against forced entry using bolt cutters
Welded wire mesh
2010
Which of the following is the main vulnerability of using concertina wire in low visiblity environments
Intruders can avoid detection by exploiting gaps in the wire
2011
What is the primary disadvantage of using open source intelligence (OSINT)
Legal and ethical issues
2012
Why might a security engineer choose to deploy inductance based sensors along the perimeter of a power utility substation
To detect any large metallic object approaching the perimeter potentially indicating theft or sabotage attempts
2013
Which of the following is the primary disadvantage of a key operated lock system in high security environments
Susceptibility to key duplication
2014
In an adversary sequence diagram what is the primary benefit of increasing the probability of detection
It extends the time available for security personnel to respond
2015
In narcotics investigation what make methamphetamine particularly challenging to combat
It is easily synthesized from legal over the counter chemicals
2016
Which of the following is not a preservation method for digital evidence
Encrypting
2017
In what way does incorporating environmentally friendly lighting technologies, such as low emission LEDs contribute to a facility's security strategy
Environmentally friendly lighting tends to have higher durability and reliability which is crucial for maintaining constant security coverage
2018
Which of the following is most critical for reducing vulnerability in a physical security environment
Limiting access to high risk areas
2019
Which property of twisted pair cables helps in reducing crosstalk but increases the cables susceptibility to electromagnetic interference
The absense of shield
2020
Which type of lock is most vulnerable to bump key attacks
Pin tumbler
2021
What is the primary vulnerability of Doppler radar systems in detecting small fast moving objects in cluttered environments
The radars signal is scattered by clutter, reducing detection accuracy
2022
According to Herzberg which of the following would not prevent job dissatisfaction
Recognition for achievements
2023
Which of the following is not a high explosive
Nitrocellulose
2024
Which of the following factors most significantly affects the accuracy of a microwave sensor in detecting intrusions
Line of sight obstructions
2025
Which of the following principle is most important for an investigator to main objectivity during an investigation
Avoid making assumptions based on initial evidence
2026
How can active infrared sensors improve the reliability of intrusion detection in high traffic areas
Active infrared sensors emit their own signal allowing for the detection of unauthorized movements even when environmental noise is high
2027
Which of the following is least likely to be an appropriate reason to dismiss a polygraph test as evidence
The test was administered by law enforcement
2028
In the CARVER method, which factor assesses how important a target is to the adversarys overall mission
Criticality
2029
Which of the following is not a step in the adversary sequence diagram
Recovery operation
2030
In what situation would active infrared sensors be preferred over a passive sensors for security purposes
In outdoor environments where rapid detection is needed despite environmental interference
2031
Which of the following is the primary outcome of conducting a criticality assessment
Identifying assets that are essential to maintaining operational continuity
2032
In vulnerability assessments how does the term exploitability relate to risk
The more easily a vulnerability can be exploited the higher the risk
2033
What is the purpose of a personnel security policy
To establish rules and guidelines to personnel security To ensure compliance with legal and regulatory requirements To protect sensitive information and resources
2034
Which factor would most likely reduce the Probability of Loss (PoL) in a high risk environment
Increasing threat deterrence systems and reducing asset visiblity
2035
What is the typical power consumption of an LED lamp that produces the same light output as a 100 watt incandescent bulb
10-15 watts
2036
Which of the following best describes the concept of dilution in trademark law
Unauthorized use of a trademark in a way that reduces its distinctiveness or value
2037
Which of the following factors is most likely to decrease the Probability Of Interruption(Pi) in a security system
Slow response times
2038
Which of the following is the most likely weakness of a high frequency low impact threat to an asset
It is often overlooked due to its perceived insignificance
2039
Which of the following is not a liability
Accounts receivable
2040
Which of the following is not a benefit of using inductive risk assessment methods
It is useful in predicting rare events with little data
2041
Which of the following non verbal behaviors is least likely to be reliable indicator of deception during an interrogations
None of the above (Lack of eye contact, Sweating or nervous fidgeting, Contradictory body language)
2042
What is the relationship between criticality and risk in a risk management framework
Criticality determines the priority of risk mitigating efforts
2043
Which factors would least likely contribute to a reduction in an assets vulnerability
Enhancing detection capabilities but ignoring recovery protocols
2044
How might block chain technology complicate financial investigations involving money laundering
It allows suspects to store funds across multiple encrypted wallets
2045
What is the primary effect of opiates on the human body that makes them a focus of narcotics investigations
The function as depressants often leading to abuse and overdose
2046
Which of the following best describes Subpoena
A legal order to compel testimony or evidence
2047
Which type of malware is designed to spread from one device to another
Virus
2048
Which of the following is least likely to be an effective method for preventing brute force attacks on authentication systems
Encrypting all data transmissions between the client and the server
2049
What is the main characteristic of a high security deadbolt lock compared to a standard deadbolt
It is more resistant to drilling
2050
What is the role of security lighting in physcial security
To deter criminal activity by increasing visibility
2051
What is the primary role of an investigative interview
Gathering information directly from witnesses
2052
What is the primary challenge when assessing personnel risks in multinational organizations
Legal and cultural differences in employee background checks
2053
Which of the following is most likely to challenge a company's ability to enforce its trade secrets in court
The company failed to document the confidential nature of the trade secret in internal policies
2054
Which of the following would most likely reduce the Probability of Detection (Pd)
Decreased detection system sensitivity
2055
Which of the following best describes the concept of a cold hire in undercover investigations
A suspect is hired without knowing they are under investigation
2056
How does vulnerability directly influence overall risk in security risk assessments
Vulnerability increases the likelihood that threats will successfully exploit weaknesses in the system
2057
What is the biggest legal concern when using informants to gather intelligence during an investigation
Evidence obtained through informants may be challenged for entrapment
2058
In an internal investigation which of the following factors is most likely to invalidate the findings
Conflict of interest by the investigator
2059
A person may affect an arrest without warrant when he/she
Has reasonable grounds to believe that an individual has committed a criminal offense Finds an individual commiting any offense
2060
Which of the following is an example of a hygiene factor in Herzberg's theory
Working conditions
2061
IP based camera advantage
Integration
2062
What is the operational principle of a line detection sensor used in securing building entrances
It employs a laser beam that when broken signals an entry or exit event
2063
Which of the following is most likely to increase the risk of credential stuffing attacks on an organizations authentication system
Allowing employees to reuse the same password across multiple systems
2064
Which of the following is the most critical method for ensuring that a security policy is enforced consistently across the organization
Monitoring employee compliance
2065
Which of the following is most likely to cause a bistatic radar system to lose signal coherence
Metallic structures
2066
What is the primary objective of employee monitoring
To ensure compliance with security policies
2067
What is the main benefit of using smart locks in residential security
Remote access and control
2068
Which of the following strategies is the most effective method for reducing risk in a high threat environment
Improving detection systems
2069
Which of the following is least likely to be protected by copyright law
A unique business method for inventory management
2070
In the CARVER risk assessment method how is recoverability defined
The ease with which an asset can recover after an attack
2071
Which lock type is most vulnerable to damage from electrical surges
Electromagnetic lack
2072
Which of the following is not typically considered a security control
Financial Controls
2073
Which of the following is an advantage of using a biometric lock in a vault security system
Reduced need for rekeying
2074
Which sensor type is most effective for detecting intrusions through concrete walls
Seismic sensor
2075
How does implementation of bistatic sensors increase the effectiveness of a security system along a national borer
Bistatic sensors can detect low flying or small moving objects that might not trigger monostatic sensors
2076
Which of the following is not a common method for security digital evidence
Modifying the original evidence
2077
The law prohibiting the use of unlicensed wireless microphones for purposes of eavesdropping is
The federal communications act
2078
Which of the following is not part of Mc Gregor's theory x
Employees seek responsibility and autonomy
2079
Which of the following is not a type of forensic evidence
Hypothetical evidence
2080
Which of the following best describes the concept of layered security (defense in depth)
Combining multiple, independent security controls to delay and deter threats
2081
Which of the following is most likely to result in a copyright infringement claim
Reproducing large portions of a copyrighted text without the authors permission
2082
What is the primary vulnerability of low cost safes used in residential security applications
High susceptibility to brute force
2083
Which type of lighting provides the best performance in foggy or rainy conditions for outdoor security applications
Infrared lighting
2084
Which of the following is the least important factor when evaluating a hazard in risk management
The ease of threat detection
2085
Which of the following is not a standard procedure for handling digital evidence
Analyzing the evidence on the original evidence
2086
Which of the following techniques is least effective in obtaining a confession during a REID interrogation
Asking the suspect to provide their version of events freely
2087
In a risk management framework which of the following statements is false
High threat likelihood always leads to higher risk
2088
Which of the following is the most effective method for protecting digital evidence from tampering during transport
Sealing it in a tamper evident bag
2089
In CPTED how does the concept of natural access control contribute to crime prevention
By directing the flow of people and vehicles to controlled points of entry
2090
Which of the following is least likely to be a key consideration when selecting a safe for storing high value assets
The strike time of the lighting used in the room where the safe is located
2091
Which of the following strategies is most relevant when interviewing an informant in a narcotics sting operation
Offering protection in exchange for information
2092
Which of the following is least relevant when calculating Annual Loss Expectancy (ALE)
Cost of countermeasures
2093
Which of the following defines an explosion
A flash fire A sudden , violent, and noisy eruption or discharge by material acted upon the force, which causes material to convert into gas and expand or burst A detonation
2094
Which strike time is typically required for high security electromagnetic door locks
1 second
2095
What is the primary purpose of a conducting a personnel risk assessment on a high profile employee
To evaluate whether the individual is trustworthy for sensitive roles
2096
Which of the following statements about the CARVER method is false
It focuses on natural hazards and environmental impacts
2097
Which of the following is not a key characteristic of an event tree analysis
It identifies the root causes of specific failure events
2098
Which of the following is the best example of a vulnerability that could lead to increased risk
An outdates cybersecurity framework that does not account for modern threats
2099
What is the most effective method to reduce annual loss expectancy (ALE)
Reducing the probability of loss events
2100
Which of the following is not a part of the adversary sequence diagram
Risk mitigation
2101
What is the purpose of a security clearance
To grant access to classified information To assess a persons trustworthiness and loyalty To determine if a person is eligible for certain positions
2102
In the context of a Business Continuity Plan (BCP), which of the following factors is most critical for ensuring organizational resilience
Establishing Recovery Point Objectives (RPOs)
2103
Which of the following combinations would least likely reduce overall risk in a high vulnerability system
Increasing asset visibility but reducing incident recovery times
2104
Which type of lamp is most likely to be used for perimeter lighting where color recognition is not a priority
High pressure sodium
2105
In physical security systems, why is it important to include redundant alarm systems for high risk areas
A failure in one alarm system can leave the facility vulnerable without immediate detection
2106
Which of the following is most probable to cause failure in the delay function of a Physical Protection System (PPS)
Lack of redundant barriers at key entry points
2107
A claimants allegation of invasion of privacy would be appropriately supported in a situation where the alleged perpetrator
Mentioned during a televised interview a rumor about the claimant engaging in criminal activity
2108
_______ refers to the efficient handling of the organization as well as its employees
Organization management
2109
In the cognitive interview Technique what is the purpose of asking witnesses to change their perspective when recalling events
To stimulate new memory pathways
2110
Why might a security system designer opt for passive sensors in a highly secure data center
They do not emit energy that could potentially interfere with sensitive data equipment
2111
What is the primary goal of personnel security measures
To minimize the risk of insider threats
2112
Which of the following sensor types is typically used for detecting physical force applied to doors and windows
Vibration sensor
2113
In a span on control system what is the maximum number of direct reports that one manager should typically oversee
7
2114
Which of the following describes the primary strength of a hostile witness in court
Their statements through contradictory, can expose the weaknesses in the opposing sides case
2115
What is the minimum thickness of steel required for a Class 3 vault door according to UL 608
1 inch
2116
What key information does the Gramm Leach Bliley Act (GLBA) require financial institutions to protect
Customer financial records and information only
2117
In what way does a microwave sensor provide advantages over a traditional PIR sensor for outdoor perimeter security
It is less likely to give false alarms due to small animals or environmental factors like wind and rain
2118
In an investigation what is the role of expert witnesses in court
To provide specialized knowledge and opinions that help the court understand technical aspects of the case
2119
Which of the following factors is most critical when determining the Recovery Point Objective (RPO) in a disaster recovery plan
The criticality of data being recovered
2120
In calculating annual loss expectancy (ALE) what impact does a decrease in the annual rate of occurrence (ARO) have on the ALE
ALE decreases as the ARO reduces the likelihood of incidents
2121
What is the main difference between indirect evidence and circumstantial evidence in an investigation
Circumstantial evidence requires interference to connect it to the crime, while indirect evidence does not
2122
Which type of sensor is typically used to detect attempts to cut or climb fences
Vibration Sensor
2123
What is the main purpose of Probability of Detection (Pd) in security systems
To determine the likelihood that a threat is detected before damage occurs
2124
What is the primary purpose of conducting a forensic audit
Detecting financial fraud
2125
How do bistatic sensors offer and advantage in redundancy over monostatic sensors in a security system
Bistatic configurations inherently include multiple devices, which provides natural redundancy in case one fails
2126
Which of the following technologies can be combined with motion sensors to reduce false alarms
Video surveillance
2127
Which of the following is not considered an element of the common law crime of arson
Commercial Building
2128
What is the first step in conducting an investigation
Establishing objectives
2129
In a security program which of the following is the best method for reducing overall risk
Implementing compensatory controls
2130
Which of the following is the most significant risk of using financial records as primary evidence in a criminal case
They are difficult to connect directly to the crime
2131
What is the most critical factor in the effectiveness of biometric access control system
False acceptance rate (FAR)
2132
Which of the following is an example of a personnel security control
Two factor authentication Security cameras Intrusion Detection systems
2133
__________ means that to accomplish the goal, an adversary should be required to avoid or defeat a number of protective devices in sequence, creating additional steps where the adversary may fail or abort the mission
Protection In Depth
2134
Why is it critical to ensure proper grounding of shielded twister pair cables in high noise environments
Grounding improves signal clarity by reducing EMI
2135
Which of the following is not a regulatory requirement of Schedule V controlled substances under the Controlled Substances Act
Use of a secret storage area
2136
In which scenario would the installation of barbed wire be considered less effective in enhancing perimeter security
When installed along the top of an already electrified fence
2137
Which interview technique is most likely to build rapport with a reluctant witness in a non confrontational investigation
The PEACE model
2138
What is the key factor that increases the Probability of interruption (Pi) in a security system
The time available for response once detection occurs