Prep Flashcards

1
Q

Which of the following is the true about vulnerabilities in a security context

A

Vulnerabilities can arise from inadequate training and poor access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the role of criticality assessments in risk management

A

Criticality assessments prioritize asset protection based on their importance to overall business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of a criticality assessment in risk management

A

To measure how dependent the organization is on the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it essential to review a terminated employees access to company systems during a workplace violence risk assessment

A

To prevent retaliation or misuse of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which sensor technology is best suited for detecting slow moving objects at long distances

A

Microwave sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might adversaries bypass the protections of a network based intrusion detection system (NDS)

A

By encrypting malicious traffic, with the NDS cannot inspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which lock type is the most vulnerable to key duplication attacks

A

Pin tumbler lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an adversary sequence diagram, what does a low Probability of Neutralization (Pn) suggest

A

The adversary is more likely to escape after detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which rating denotes a safes ability to withstand tool based attacks at 60 minutes

A

TL-60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary goal of ESRM

A

Identifying and managing security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following scenarios would not reduce Probability of Neutralization (Pn)

A

Increased threat deterrence measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of drug investigations, how does the Controlled Substances Act (CSA) classify Ecstasy/MDMA

A

As a schedule 1 drug due to its high potential for abuse and no accepted medical use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not considered when assessing asset criticality in a security framework

A

The likelihood of a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following combinations of factors is LEAST likely to reduce an assets risk

A

High vulnerability but effective detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a recommended best practice for conducting a polygraph examination

A

Asking compound of leading questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not an essential characteristic of a well conducted investigation

A

Expediency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In what situation would a vibration sensor be the most effective choice

A

Detecting the breaking of glass in a window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is most important for ensuring the admissibility of evidence in court

A

Proper documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a responsibility of the personnel security officer

A

Investigation security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of access control measures in personnel security

A

To restrict access to sensitive areas
To prevent unauthorized entry
To protect sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How might a person with a criminal background exploit a ban the box policy to secure employment

A

By delaying the disclosure of criminal history until later the hiring process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can poorly managed crisis communication protocols lead to secondary reputational damage after the initial crisis

A

Stakeholders may receive inconsistent information leading to mistrust
Delayed post crisis messaging reduced confidence in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In high traffic environment which sensor technology would be most appropriate to avoid false alarms while maintaining security

A

Dual technology sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ is the ability of an organization to anticipate, prepare for, respond to and adapt to incremental change and sudden disruption in order to survive and prosper

A

Organizational Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which combination of factors would most likely reduce the Probability of Neutralization (Pn) in a high security systems

A

High detection sensitivity but poorly trained security personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which sensor type is least affected by the presence of moving vehicles in the vicinity of a protected area

A

PIR sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In a threat assessment which combination of factors would reduce the over all risk

A

Low vulnerability and frequent audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An action of event that could result in a loss; an indication that such an action or event might take place is called _________

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which type of sensor is often used in vaults and safes to detect unauthorized tampering or drilling

A

Vibration sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the primary reason for using electromagnetic lock in high security environment

A

Resistance to forced entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Why is it critical to perform a business impact analysis (BIA) before finalizing business continuity plans

A

To determine the potential operational and financial impacts of different types of disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which type of top guarding is most effective in preventing intruders from scaling a fence

A

Inward facing concertina wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In CPTED, what is the primary goal of access control

A

To reduce criminal behaviour by influencing movement patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which standard is used to test and rate the security of vault doors in the event of attacks involving explosives

A

CEN 1143-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the primary operational difference between bistatic and monostatic sensors in physical security systems

A

Bistatic sensors require separate transmitter and receiver units, whereas monostatic sensors have both components in one unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which combination of factors is most likely to reduce the Probability of Detection (Pd) in layered security system

A

Delayed detection systems and reduced sensor sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is a not a investigative interview principle

A

Leading Questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which international standard sets the grading for safes and vaults to resist specific form of attacks like cutting and explosives

A

CEN 1143-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which investigative techniques is most likely to suffer from confirmation bias

A

The REID technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the primary benefit of integrating BCMS with risk management

A

Enhanced organizational resilience
Improved financial performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is a primary limitation of REID techniques when dealing with juvenile suspects

A

It risks increasing false confessions due to suspects vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following type of vault doors typically offers the best composition of fire resistance and security

A

Composite Door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the primary purpose of personnel security investigations

A

To verify the information provided by job applicants
To identify potential risks associated with employees
To ensure the trustworthiness of individuals in sensitive positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the primary challenge of designing physical security systems for remote or isolated facilities

A

Delayed response times due to geographic distance from emergency services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which lamp has the lowest ROI due to frequent replacement and high power consumption

A

Incandescent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Why is it critical to include terrain following sensors in perimeter security systems for high risk facilities

A

Terrain following sensors adjust their detection range based on the contours of the landscape, preventing gaps in coverage that adversaries could explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In laminated glass, what role does PVB (polyvinyl butyral) interlayer play during a ballistic attack

A

It prevents the glass from shattering completely and absorbs the energy from the projectile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which type of lamp experiences the highest energy consumption relative to light output

A

Incandescent lamp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

During disaster recovery planning, why is it important to consider the geographic location of backup facilities

A

To mitigate the risk of the same disaster affecting both primary and backup sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the primary purpose of installing anti pass back systems in access control

A

To prevent employees from sharing their access cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following best describes a threat in the context of risk management

A

A potential danger that could cause harm to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following best defines a threat in the context of risk management

A

A potential danger that could cause harm to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

In a high security facility, which type of sensor would be best for monitoring areas with frequent foot traffic but requiring detection of unauthorized access

A

Infrared Beam Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which type of evidence is most likely to be challenged in court as unreliable

A

Eyewitness testimony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

When assessing the vulnerability of a facility, which methodology is most commonly employed to determine critical points

A

Fault Tree Analysis (FTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which sensor would be best suited for monitoring entry points in areas prone to significant vibrations, such as near railroads

A

Microwave sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following is most likely to result in a false positive when using the REID technique

A

Accusatory questioning without corroborating evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following combinations would reduce overall vulnerability n a critical infrastructure system

A

Enhancing response protocols and reducing threat likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which investigative method is most likely to prevent bias

A

Using multiple sources of evidence
Blind interviewing techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

______ principle says a single person can supervise only a limited number of staff members effectively

A

Span of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which type of vault door is specifically designed to resist attempts at forced entry using explosives

A

Blast resistant vault door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following is not an assumption of McGregor’s Theory X

A

Employees seek responsiblity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following is the primary strength of using financial records in a defalcation case

A

Financial records directly link the suspect in crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the primary vulnerability of high security safes with electronic locks during a power outage

A

Inability to unlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

In the investigative process, what reflects the mindset of the investigator

A

Simple statement of abstracts encountered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What makes active infrared sensors particularly effective for perimeter security in a gated community

A

Active infrared beams form an invisible barrier that, when broken immediately alerts security personnel to a potential intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

In a covert surveillance operation, what is the most effective way to maintain a continuous watch on a mobile target

A

Using both fixed and mobile surveillance teams, coordinated with electronic tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

In the context of investigative interviewing, which method prioritizes eliciting information rather than extracting

A

PEACE Model
Cognitive Interview Technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

In a criticality assessment, what is the main factor that determines an assets protection priority

A

The assets role in maintaining business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

In an undercover investigation, how does the progression of interviews typically differ from regular investigation

A

Undercover investigations work toward those less involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following sensors is designed to detect the proximity of a metallic object without direct contact

A

Magnetic sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following is not a common method of personnel security training

A

Physical Fitness Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which two factors are seential in calculating the Probability of Interruption (Pn)

A

Time delay and response force readiness
Adversary speed and detection system placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the main purpose of implementing security metrics

A

To measure security effectiveness
To ensure regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the primary reason for installing double concertina wire on a perimeter fence

A

To create a secondary barrier between two lines of defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How does the uses of passive sensors in a retail environment benefit the business beyond security

A

Passive sensors gather data on customer traffic patterns, which can be used for marketing and layout optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which design feature of a high security vault enhances protection against crowbar or prying attacks

A

Anti-pry lip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the primary challenge of providing executive protection in high threat environments

A

Balancing overt and covert security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following is least likely to be considered indicative evidence in a criminal investigation

A

A suspects confession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is the primary disadvantage of relying on eyewitness testimony

A

Subjectivity
Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which property of glass ceramic makes it suitable for high security applications where thermal resistance is critical

A

It has a low coefficient of thermal expansion, making it resistant to extreme temperatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In what scenario would bistatic sensors outperform monostatic sensors

A

In large open areas where a separate transmitter and receiver can cover greater distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is the main goal of personnel security screening

A

To protect sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which factors are most likely to influence the severity of a vulnerability

A

The assets criticality and the threats capability to exploit it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following is a primary difference between active and passive infrared sensor in intrusion detection

A

Active require both a transmitter and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following factors would most likely reduce the Probability of Interruption (Pi) for an adversary attack

A

Enhanced detections but low personnel response readiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which lock component engages or disengages the bolt of a vault door

A

Cam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is the primary purpose of a root cause analysis in investigation

A

Preventing future incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

How might poor lighting in secure areas impact access control systems

A

It can make biometric scanners and card readers less effective by reducing visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is the main purpose of implementing security metrics

A

To measure security effectiveness
To ensure regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is the primary operational advantage of active ultrasonic sensors in detecting intruders in large, empty spaces

A

Ultrasonic sensors cover a larger volume of space, reducing the number of sensors required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which business function is primary responsible for managing the flow of goods and services

A

Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following types of evidence is least likely to be used to prove intent in a criminal investigation

A

Testimony from expert witness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is the primary goals of financial management within security operations

A

Ensuring operational efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is the primary function of probability of success (Ps) in a security systems adversary sequence diagram

A

To estimate the likelihood that an adversary will achieve their objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

In which scenario is mobile surveillance most effectively utilized

A

Following a suspect during their daily activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is a key limitation of traditional risk assessments in crisis management planning

A

They often fail to account for rapidly evolving risks like cybersecurity threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which type of glass is most appropriate to use in high traffic public areas where safety and impact resistance are paramount

A

Tempered glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which factor is most likely to increase the probability of detection (Pd) in a high threat environment

A

Increased sensor sensitivity and response times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which type of cable is most suitable for perimeter surveillance systems requiring long distance data transmission without signal loss

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

How might an adversary exploit the vulnerabilities of a monostatic sensor in a high traffic facility

A

By moving in and out of the sensors detection range in quick succession, overwhelming the system and causing gaps in detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which factors is most likely to influence the severity of a vulnerability

A

The assets criticality and the threats capability to exploit it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which attack method is the most effective against older combination lock safes

A

Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which of the following is not a method for ensuring data integrity

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which of the following sensors would be the most appropriate for detecting intrusions through metal doors

A

Magnetic sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Which of the following is a primary benefit of conducting a security audit

A

Identifying potential security breaches
Ensuring compliance with regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which type of lock is most vulnerable to shimming

A

Padlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Which of the following scenarios would reduce the Probability of Neutralization (Pn)

A

Enhanced threat deterrence but slow response protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is the legal risk of coercive tactics during an interoggation

A

Coerced confessions may be deemed inadmissible in court due to constitutional violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

In what situation might end to end encryption (E2EE) be less effective for protecting sensitive data

A

It endpoints themselves are compromise, encrypted data can still be accessed in it decrypted form at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which of the following would not be considered a motivation according to Herzberg

A

Job security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is the primary function of a security badge system

A

To control access to secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

How might adversaries bypass thermal sensors without triggering an alarm

A

By using heat resistance materials to block their body heat from being detected by the sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which of the following represents a legal constraint on the use of surveillance in private investigations

A

Video surveillance may not record audio without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which combination of factors would most likely reduce the Probability of Interruption (Pi) in a high security environment

A

Increasing personnel presence but reducing detection accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which of the following is true of Herzberg’s hygiene factors

A

They prevent job dissatisfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What is the primary purpose of a crisis management plan

A

Ensuring effective response to crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Which type of sensor is designed to detect intrusion based on pressure variations in the ground or floor

A

Pressure sensitive volumetric sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Why might an organization review a potential hires travel history as part of a background investigation

A

To identity associations with high risk countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Which of the following is a common physical barrier in security

A

Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is the primary goal of ESRM

A

Identifying and managing security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Which of the following is not a core element of the CARVER risk assessment method

A

Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Which of the following combinations most increases an organizations risk exposure

A

High criticality and high vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Which lamp technology is most sensitive to frequent power cycling, resulting in a shorter lifespan if turned on and off regularly

A

Metal Halide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is the primary disadvantage of using an active infrared sensor system in outdoor environments

A

Susceptibility to interference from direct sunlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is the biggest challenge in using RFID technology for access control in sensitive areas

A

RFID signals can be intercepted and cloned by malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Which fire resistance rating is appropriate for a wall separating a high security vault from an adjacent room in a commercial building

A

2 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is the primary benefit of using infrared beam sensors in outdoor perimeter security

A

Ability to detect in total darkness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Which of the following is not a benefit of a virtual private network (VPN)

A

Enhancing data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which of the following is least likely to be concern during the recovery phase of a natural disaster crisis

A

Maintaining the chain of custody for evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What is the role of consequence criteria when valuing an asset in security risk management

A

It determines the potential impact on business operations if the asset is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What is the biggest challenge in using RFID technology for access control in sensitive areas

A

RFID signals can be intercepted and cloned by malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What is the main advantage of using digital forensics in investigations

A

Ability to analyze large volumes of data quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

When conducting a criticality assessment, which of the following questions should be answered

A

What are the potential consequences of asset loss
How difficult would it be replace the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is the primary benefit of integrating ESRM with business operations

A

Enhanced organizational resilience
Improved financial performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Which of the following factors is least relevant when determining the likelihood of a security incident

A

The cost of asset recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Which of the following best describes the chain of custody

A

Documenting evidence collection
Ensuring evidence integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

How might criminals exploit weaknesses in perimeter security if there is not redundancy in the design

A

By disabling a single security measure such as fence or sensor, without triggering alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Which of the following combinations would least likely increase risk in a security framwork

A

Moderate threat likelihood and frequent security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Which of the following is not a responsibility of personnel security

A

None of the below
(Conducting background checks on employees, Implementing physical security measures, Developing security policies and procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

How does the design of line detection fiber optic sensors enhance their ability to detect perimeter intrusions in harsh environments

A

They use light refraction along a continuous fiber to detect disturbances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Which of the following is least likely to be effective in reducing risk of false confessions during a REID interrogation

A

Offering the suspect a reduced sentence in exchange for cooperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What is a potential pitfall of relying solely on criminal background checks when assessing personnel risks

A

They provide no insight into the individuals current behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Which of the following is most likely to hinder effective decision making during the initial phase of crisis

A

Conflicting information from different sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What advantage does chemically strengthened glass offer over tempered glass in high security installations

A

Higher resistance to thermal stress and mechanical impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What is the main weakness of older combination locks used on vaults and safes

A

Susceptibility to manipulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Which of the following is least likely to be considered conclusive evidence in a drug trafficking case

A

A character witnesses testimony about the suspects prior behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Which of the following is a common challenge in conducting undercover operations

A

Maintaining the undercover agents cover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What type of safe would be more appropriate for securing digital media again both fire and burglary

A

Data safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

How might adversaries bypass electromagnetic locks used in high security facilities

A

By disabling power supply to the locks, rendering them ineffective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Which of the following factors would most effect the accuracy of a PIR sensor in a warehouse environment

A

Large temperature fluctuations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Which type of sensor is least likely to detect objects moving at slow speeds

A

Microwave sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Which of the following is least probable to enhance the response of a Physical Protection System (PPS)

A

Installing additional motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Which of the following types of evidence is most likely to be considered conclusive in a criminal investigations

A

DNA evidence from the suspect at the crime scene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Which rating does TL-15 safe receive if it can withstand a torch attack for 15 minutes

A

TRTL-15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Which feature of LED lighting makes it preferred choice in high security environments

A

Low maintenance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Which factors would most likely increase the overall threat landscape in a critical infrastructure system

A

Increasing asset visibility and reducing personnel presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

In an investigation involving digital evidence, which of the following would most likely compromise the evidence

A

Powering down the computer before imaging the drive
Using the original device for analysis instead of a copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Which sensor type of least affected by the presence of moving vehicles in the vicinity of a protected area

A

PIR sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which of the following is the most effective early intervention to prevent workplace violence

A

Offering mental health resources and collect resolution training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Which of the following is an example of a strategic risk

A

A change in regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Which lighting system is best suited for security applications in environments with frequent power fluctuations

A

LED lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Why are the fiber optic cables preferred over copper cables for long distance perimeter security installations

A

Fiber optic cables are immune to electromagnetic interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Which of the following is not considered in the calculation of Earnings before interest, taxes, depreciation and amortization (EBITA)

A

Tax obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Which of the following is not a standard method used to calculate probability of detection (Pd) in a PPS

A

Environmental impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Key for PSIM system

A

Cost
Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Which of the following is a major risk associated with sting operations

A

Entrapment of the suspect
Compromising the undercover officers identity
Legal challenges to the operations methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Which of the following is most likely to be considered a precursor to an organizations theft problem

A

Substance abuse issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Which of the following is a key difference between a controlled buy and a buy bust operations

A

A buy bust focuses on immediate arrest, while a controlled buy gathers long term intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Which of the following is a least likely to influence a company’s ROI on a security project

A

The length of the project implementation phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Why is the integration of cybersecurity into business continuity plans essential

A

Cybersecurity incidents can cause business disruptions similar to physical disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Which fence type would be most suitable for a high security installation in an urban area with strict aesthetic regulations

A

Wielded wire mesh fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Selection devices in the personnel selection process used by managers to reduce accept and reject errors include

A

Application from, pencil and paper test, performance simulation test, interviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Which of the following best explains why asymmetric encryption is typically slower than symmetric encryption

A

It uses larger key sizes for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Which of the following is not a characteristic of strong encryption algorithm

A

Speed of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Which type of glass is most effective in preventing unauthorized access through forced entry

A

Laminated glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Which of the following is not typically included in an investigation report

A

Detailed financial analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is

A

Economic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Which of the following is a not a benefit of using video surveillance in investigation

A

Privacy protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

What is the main purpose of a forensic interview

A

Gathering detailed information from witnesses or suspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Which combination of factors is most likely to improve employee motivation according to Maslow’s theory

A

Satisfying esteem needs and offering responsiblity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

According to Maslow which of the following needs must be satisfied before esteem needs can be addressed

A

Safety needs
Social needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

In terms of security trends, how does Artificial Intelligence (AI) impact modern security operations

A

By providing advanced threat detection and predictive analytics capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Which combination of factors would increase the Probability of success (PoS) for and adversary targeting critical infrastructure

A

Weak detection systems and delayed incident recovery protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

In the context of security lighting, what is luminance

A

The perceived brightness of a light source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Which of the following is the most critical factor when selecting a security alarm system

A

The response time of law enforcement or security personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Why might organizations face legal liability if they fail to implement effective emergency response plans

A

If negligence results in harm to employees or customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Which of the following is least likely to directly affect a company’s Gross Operating Profit (GOP)

A

Tax obligations for the current year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Which of the following combinations would most likely result in a higher probability of interruption (PoI)

A

Increasing physical security measures and enhancing detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Which type of vault door is specifically designed to resist attacks with tools like torches and drills

A

Blast resistant vault door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Which of the following is not a common type of phishing attack

A

Ransom phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Which of the following is not a typical goal of protection of depth

A

Ensuring that no vulnerabilities exist within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

How might an adversary exploit weaknesses in door locking mechanisms in high security environments

A

By tampering with electronic door locks to disable them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

How might adversaries bypass the detection sensors in a perimeter security system

A

By passing under or over the sensors detection range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Which of the the following is the most critical method for ensuring that a security policy is enforced consistently across the organization

A

Monitoring employee compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Which of the following is not a common method for ensuring the integrity of digital evidence

A

Immediate analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Which of the following is least likely to be common element in crisis communication plan

A

A financial recovery strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What is the main objective of personnel security screening

A

To ensure the loyalty and trustworthiness of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Which of the following is a not a common vulnerability of CCTV systems in physical security

A

Inability to detect thermal signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

How does the identification of a threat vector affect the overall risk equation in a security system

A

It increased overall risk by highlighting potential weaknesses that could be exploited by external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Which of the following is least likely to be a role of the crisis management leader during a large scale evacuation

A

Making decisions about the financial impact of the crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Which of the following is least likely to complicate the recovery phase of crisis management

A

Lack of media involvement in post crisis reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

What is the primary goal of a background check

A

Ensuring candidate suitability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

What is the primary disadvantage of using physical surveillance in an investigation

A

High cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

What is the primary risk of falling to evaluate contractors during a personnel risk assessment

A

Contractors may have conflicting loyalties that put the company at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Which of the following is the best example of a Key Performance Indicator (KPI) for a security program

A

Employee compliance with security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Which of the following is a significant disadvantage of ultrasonic sensors in outdoor environments

A

They are sensitive to air turbulence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Which of the following is a key consideration when designing a secure access control system

A

Reliability and redundancy
User convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Which of the following is a most likely to cause an investigator to miss critical evidence during a crime scene search

A

Lack of proper search training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

What is the purpose of personnel security policy

A

To ensure compliance with legal and regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

In the context of risk management, which of the following is the best example of a vulnerability

A

A lack of sufficient detection systems at the perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Which of the following is most likely to provide justification for actions taken during a crisis response

A

Detailed records of threat evaluation deliberations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

What is the primary function of line detection sensors in perimeter security systems

A

Detecting vibration along a fence line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Which of the following factors would most likely decrease an assets vilnerability

A

Frequent security audits and improved detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

How might adversaries bypass the protections of a network based intrusion detection system (NDS)

A

By encrypting malicious traffic, which the NDS cannot impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Which of the following is not a principle of secure coding

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

What is the primary goal of encryption in information security

A

Preventing unauthorized access
Ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Which of the following is most likely to be the key question in a bomb threat assessment

A

Could the threatener have done what was claimed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Which component is typically the most susceptible to false alarms in a PIR (Passive Infrared) sensor system

A

Pyroelectric sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

What is the primary function of a time delay feature on a safe used in banking environments

A

To discourage robbery by delaying access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach

A

Reduced focus on regulatory requirements and compliance audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Which of the following is not a benefit of personnel security programs

A

Increasing operational costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Which of the following is not a benefit of conducting security audits

A

Reducing operational costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Which of the following is most likely to enhance the deterrent function of a security system

A

Installing visible barriers and deterrent signage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Which of the following is a critical consideration when implementing a physical security information management (PSIM) system

A

Scalability and integration with existing security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

What is the primary characteristic of a high pressure sodium light in security lighting

A

Poor color rendition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

Which of the following is not considered a strength of a deductive risk assessment

A

It focuses on general patterns and trends to predict risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

What is the most common weakness in using character witnesses in criminal investigations

A

They often lack direct knowledge of the crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

Which UL standard covers the testing and certification of high security safes for commercial applications

A

UL687

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

How can a suspect use counter surveillance tactics to avoid being tracked

A

Constantly remain in high populated areas
Use physical disguises to alter their appearance
Avoid using electronic communication devices altogether

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Which of the following is not a method of personnel security

A

Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

How does deployment of bistatic radar enhance the security monitoring capabilities at international borders

A

Bistatic radar systems are most difficult to detect and jam than monostatic systems, making them ideal for covert operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Which of the following is a key consideration when calculating risk for an organization

A

The degree of asset vulnerability to various type of threats
The likelihood that internal policies will prevent their escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

What is the purpose of a personnel security policy

A

To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

Which of the following is least likely to improve a company’s current ratio

A

Increasing inventory levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

What is the primary purpose of a digital certificate in PKI

A

Authenticating identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

What is the primary risk of failing to evaluate contractors during a personnel risk assessment

A

Contractors may have conflicting loyalties that put the company at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

Which vault rating is required for securing extremely high value assets, offer resistance to both tool and explosive attacks

A

TRTL-30X6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Which of the following is most likely to increase the complexity of a crisis response

A

Multiple simultaneous incidents in different locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

Which of the following is not typically a feature of an electronic access control system

A

Surveillance cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

Which of the following is most critical factor when selecting a security alarm system

A

The response time of law enforcement or security personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

What is the main disadvantage of installing a high tension electrified fence without any physical barrier such as chain link or mesh

A

The lack of physical barrier allows intruders to bypass the fence with insulation tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

Which of the following is most significant risk of using hostile witness in court

A

The witnesses’ testimony may be dismissed due to bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

Which of the following is a least likely to affect the calculations of a company’s current ratio

A

Long term assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

In digital forensics which of the following is most likely to cause the loss of critical evidence during the collection process

A

Failure to image the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Which of the following is a strength of using REID in investigative interviews

A

It builds a narrative to help the suspect justify their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Which of the following principles is most essential when conducting a buy bust operation

A

Proper documentation of the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

What makes inductance based sensors suitable for integration into electronic article surveillance (EAS) systems in retail environments

A

These sensors are highly sensitive to changes in magnetic fields, ideal for tagging and tracking merchandise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

Which of the following is most likely to affect the current ratio but not the quick ratio

A

Change in inventory levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

What are the three general methods for valuing assets

A

Monetary value, consequence criteria, policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

Which lighting type is best suited for use with security cameras that operate in low light conditions

A

Infrared lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Which of the following is not typically included in due diligence investigation

A

Psychological evaluations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

In a sting operations, which of the following is least likely to contribute to entrapment

A

To suspect initiating the criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

Which of the following is least likely to be a consequence of conducting an illegal search during a workplace investigation

A

Termination of the employee being investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

During disaster recovery planning, why is is important to consider the geographic location of backup facilities

A

To mitigate the risk of same disaster affecting both primary and backup sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

Which of the following is an example of a physical security vulnerability

A

Inadequate lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

In a risk management framework which of the following is false

A

High threat likelihood always leads to higher risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

Which vault door design offers the highest level of protection against explosives

A

Concrete line vault door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

Which of the following is a key principle of defensible space

A

Territoriality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

Security through obscurity

A

Hiding Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

What is the primary goal of security policy

A

Defining acceptable use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

Which of the following is least likely to result from poor session management in web applications

A

Data integrity issues in stored sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

Which of the following factors is most likely to lead to security policy failure in a large organizations

A

Lack of leadership engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

Which of the following is least likely to be considered one of the three types of emergency operation plans

A

Focused plan for a specific employee group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

In the contrast of adversary path diagram (ASD), what is the best description of delay points

A

Locations where physical barriers slow the adversary’s progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

Which of the following is not a common type of forensic analysis

A

Surveillance Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

Which of the following strategies is most effective in reducing the risk of false confessions in REID interrogations

A

Minimizing confrontational tactics and focusing on open ended questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

Which of the following is least likely to be considered a form of pressure in the context of Cressey’s Fraud Triangle

A

Weak security controls that allow unauthorized access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

What is the primary function of a volumetric sensor in perimeter security

A

Detect changes in air volume over large areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

A matrix that describes a particular situation with respect to each of the risks identified by relating the risk to an asset is called

A

Vulnerability matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

How can terrain following sensors be used to prevent tunnelling in perimeter security systems

A

By adjusting their detection range to cover underground areas, detecting movement below the surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

What does a mantrap help prevent

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

Which of the following is least likely to increase EBITA

A

Increasing depreciation expenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

Which of the following best describes the deter function in a security system

A

Reducing the desire or motivation to attempt an intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

Which of the following is the best way to ensure the integrity of confidential information in a company

A

Encrypting all sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

What is the correct formula for determining the Probability of Success (Ps) in an adversary sequence diagram

A

Ps = Probability of detection x Probability of interruption x Probability of neutralization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

Which of the following is not a characteristic of a successful risk mitigation strategy

A

It eliminates the probability of all risk events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

What is the primary purpose of a crime scene investigation

A

Identifying suspects
Collecting evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

Which of the following best reflects the finding of General Strain Theory when applied to a fraud case involving

A

The suspect faces financial pressure due to unexpected personal expenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

Which of the following is not a method for achieving data integrity

A

Data replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

Which of the following factors is most relevant when determining asset vulnerability in a security assessment

A

The likelihood of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

According to Herzberg, which of the following would not increase job satisfaction

A

Job security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

In crisis management, what is the significance of the recovery time objective (RTO)

A

It defines the maximum acceptable downtime for critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

Which of the following is not an advantage of Protection in depth

A

It eliminates the need for other types of security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

Which of the following is not a factor in calculating the Probability of detection (Pd)

A

Threat likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

What is the primary goals of a business organization

A

To maximize shareholder value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

Which of the following is not a benefit of using thermal imaging sensors in security applications

A

High cost of implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

What is the primary disadvantage of using infrared sensors for outdoor security

A

Susceptibility to environmental factors like sunlight and temperature changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

Which of the following best describes the role of ESRM in a corporate setting

A

To align security practices with the organizations risk appetite and business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

Which of the following is the most significant disadvantage of incandescent lamps in security lighting applications

A

Short lifespan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

In a vault protection scenario, why is it critical to assess both strike and restrike times

A

To ensure the vault door can withstand multiple forced entry attempts within a specified timeframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

What is the most significant risk when relying on security guards alone for access control

A

Guards may be bribed or compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

In the context of the PEACE model, what does the Preparation and planning stage entail

A

Developing an interview strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

How can psychological profiling be used in an executive protection context

A

To assess potential threats based on patterns of behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

How might adversaries exploit gaps in an organizations disaster recovery plan during a global crisis event

A

By targeting critical infrastructure that is left vulnerable due to diversion of resources towards immediate crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach

A

Reduced focus on regulatory requirement and compliance audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

Which of the following is least likely to be characteristic of an effective budget development process

A

Arbitrary selection of line item values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

The ability of an adversary to physical enter and egress from the target in CARVER is called

A

Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

How does the probability of detection (Pd) relate to time delays in the adversary sequence diagram

A

Pd decreases as time delay increased due to slower detection rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

Which of the following is not part of the formula to calculate the current ratio

A

Fixed assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

The management principle that suggests one supervisor can effectively control a limited number of people is

A

Span of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

What is the primary limitation of encryption as a method of data protection

A

It does not prevent access but only ensures that the data is unreadable without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

Which of the following best describes the inductive approach to risk assessment

A

Generalizing from specific incidents to broader security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

What is the primary limitation of using encrypted messaging services in covert investigation

A

It can be difficult to establish the authenticity of decrypted messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

Which of the following techniques is most effective in cross examining an expert witness

A

Confronting the expert with inconsistencies in their testimony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

How might criminal organization use shell companies to evade detection in an investigation

A

By laundering illegal funds through seemingly legitimate businesses
By creating false employment records for investigators to follow
By masking the true ownership of valuable assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

What is the primary goal of an internal audit

A

Detecting fraud
Evaluating compliance with policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

Which of the following is most likely to affect the calculation of the quick ratio but not the current ratio

A

Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

Which of the following factors is most critical for ensuring the effectiveness of a security policy

A

Consistent enforcement of the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

In Business Continuity Planning (BCP) which of the following is least relevant when determining Recovery Time Objectives (RTO)

A

The cost of new security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

When it is necessary to question a witness about sexual deviation all of the following should be avoided except

A

Allowing the witness to frame the testimony in his or her own word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

Which of the following is not included in the calculation of the quick ratio

A

Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

Which type of leadership style is characterized by a focus on building strong relationships with team members

A

Transformational Leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

What is the primary objective of a forensic interview with a child witness

A

To gather accurate and reliable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

Which of the following is not a method of ensuring data integrity

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

What is the primary goal of incident planning

A

Minimizing damage from incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

What is the main benefit of diversification in a business portfolio

A

To spread risk across different investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

Which of the following is not a factor to consider when conducting a personal security investigation

A

Social media activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

Which Security Principle involves using multiple layers of security measures

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

What is the primary goal of encryption in information security

A

Preventing unauthorized access
Ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

What is the purpose of a business continuity policy

A

To provide guidelines and procedures for maintaining business operations during disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

Which of the following is a key benefit of effective risk management

A

Enhances organizational resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

What is the goal of emergency preparedness

A

To ensure a quick and effective response to emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

What is the purpose of a risk management strategy

A

To outline the approach for managing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

What does CPTED stand for

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

Which of the following is an example of a physical security control

A

Security cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

Which concept involves identifying potential threats and vulnerabilities

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

What is the importance of conducting background checks

A

To verify the credentials and history of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

What is the primary objective of business continuity testing

A

To ensure the effectiveness of business continuity plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

What is the main purpose of access control

A

To restrict unauthorized entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

Which of the following is a key principle of defensible space

A

Territoriality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

Which of the following best describes defense in depth

A

Multiple, overlapping security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

What is the most critical consideration when designing a layered defense strategy in physical security

A

Depth and redundancy of security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

Which of the following best describes chain of custody in evidence handling

A

Documenting every person who handled the evidence
Ensuring evidence is kept secure
Preventing evidence tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

What is the common goal of both physical and information security

A

To protect assets from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

What is the of a break even analysis

A

To determining the point which revenue equals costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

What is the primary function of a security officer

A

To monitor and protect property and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

Which of the following is not a common type of phishing attack

A

Ransom phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

Which of the following is not typically included in the ESRM framework

A

Marketing strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

Which of the following is not a method for ensuring the security of investigative files

A

Allowing unrestricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

What is a fundamental principle of physical security

A

Denying access to unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

What is the purpose of a crisis management plan

A

To outline procedures for handling crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

What is the main objective of conducting a root cause analysis in an investigation

A

To identify the underlying reason for an issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

What is the primary purpose of a security policy in ESRM

A

Defining security roles and responsibilities
Enhancing operational efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

Which of the following is not a core component of Business Continuity Management Systems (BCMS)

A

Marketing Strategy Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

Which of the following best describes the term least privilege

A

Granting employees with minimum access necessary to perform their duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

What is the role of a project manager

A

To oversee and manage all aspects of a project to ensure it meets its goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

In the context of access control, what is the time based access control system

A

A system that allows access based on the time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

Which of the following best describes security culture

A

The behavior and attitudes of employees towards security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

What is the primary goal of a litigation hold

A

Preventing evidence destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

Which of the following is a physical security measure for protecting information

A

Locked filing cabinets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

Which of the following is not a typical component of a comprehensive investigative plan

A

Making Assumptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

What is the purpose of a security barrier

A

To obstruct or control movement for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

What is the importance of maintaining confidentiality during investigation

A

To protect the integrity of the investigation and the privacy of involved parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

Which financial statement summarizes a company’s revenues and expenses over a period of time

A

Income Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

Which of the following is not a typically responsibility of a Chief Security Officer

A

Developing marketing strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

Which of the following is a potential consequence of a personnel security breach

A

Financial Loss
Reputation Damage
Legal penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

Which of the following best describes a brute force attack

A

Guessing passwords through exhaustive key search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

One whose sexual desires are directed to both men and women is know as

A

Bi sexual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

Which of the following is not a common method for testing a business continuity plan

A

Financial Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

What is the purpose of a security policy

A

To outline security goals and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

In the context of security, what is the primary purpose a security matrix

A

In the context of security, what is the primary purpose a security matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

What is the primary goal of security management?

A

Loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

Which security model focuses on protecting information based on its sensitivity and the need to know principle?

A

CIA Triad

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

What is the primary objective of an organization’s business continuity plan (BCP)?

A

Ensuring critical business functions continue during disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

What is a key component of a company’s code of conduct?

A

Compliance with legal requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

In terms of security management, what does “Due Diligence” refer to?

A

Exercising care and caution in decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

What is the primary purpose of a security audit?

A

Identifying weaknesses in the organization’s security practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

What is the main goal of a workplace investigation?

A

Fact finding and problem solving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

What is the primary purpose of computer forensics in an investigation?

A

Collecting and analyzing digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

In the context of personnel security, what does “Insider Threat” refer to?

A

Disgruntled employees or contractors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

What does the term “Social Engineering” refer to in personnel security?

A

Manipulating people to disclose confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

Which of the following BEST describes the document that tells how much money an organization generates (revenue), how much it spends (expenses), and the difference between those figures (net income)?

A

Income statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

Which of the following types of investigations is considered the “most common type of investigation in many business and organizational settings”?

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

When dealing with suspected chemical or biological agents that are released from a suspicious package, what should be your FIRST goal?

A

Limit distribution of the material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

“The ability of an organization to resist being affected by an event or the ability to return to an acceptable level of performance in an acceptable period of time after being affected by an event”, is called:

A

Organizational resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

“Non-deliberate adverse actions and events, such as hazardous material spills and telecommunications and computer outages, are considered which of the following?

A

Accidental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

Relative to organizational objectives, what is “SMART

A

Specific, measurable, attainable, relevant, time bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

What are the five avenues to address risk?

A

Acceptance, Spreading, Reduction, Transfer, and Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

Employees who are involved in breaking the law in one way will often find it easy to join the operative in trying to break the law in other ways. This behavior is referred to as

A

Cognitive consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

An entry control subsystem is part of the…

A

Detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

The abduction of a hostage in order to coerce someone else into committing a crime is known as a…

A

Tiger kidnapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

What is the primary objective of access control in physical security?

A

Restricting physical access to authorized personnel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

Which physical security measure is designed to protect a facility from vehicle borne threats?

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

What is the primary purpose of a security risk assessment for a physical facility?

A

Identifying vulnerabilities and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

In security planning, what does the term “Vulnerability” refer to

A

The weakness or exposure that could be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

What is the primary goal of a code of ethics in an organization?

A

Promoting ethical behavior and decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

What is the concept of “Due Care” in business principles

A

Taking appropriate steps to protect information/people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

What does a financial audit primarily aim to achieve?

A

Verifying the accuracy of financial statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
390
Q

What is the primary goal of an interview in the context of investigations?

A

Collecting relevant information and evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
391
Q

What is the role of a private investigator in a corporate investigation?

A

Gathering information and evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
392
Q

Which document typically provides an overview of an employee’s job responsibilities, expectations, and performance standards

A

Job description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
393
Q

The best prevention of exposure to workplace violence is…

A

A preemployment background investigation program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
394
Q

What are the three general types of assets

A

People, property, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
395
Q

Which of the following is one of the most cost effective assets protection tools?

A

Training and awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
396
Q

The four elements of emergency management are which of the following?

A

Mitigation, preparedness, response, and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
397
Q

These need not be registered with any outside agency, so the owner can maintain a greater degree of control over the asset. The owner must be able to prove that the information added value or benefit to the owner, was specifically identified, and the owner provided a reasonable level of protection. This is called which of the following:

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
398
Q

“Employment of services, equipment and techniques designed to locate, identify and neutralize the effectiveness of covert technical surveillance devices.”, is the definition for which of the following?

A

Technical surveillance countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
399
Q

What is the primary purpose of an alarm system in physical security?

A

Detecting and alerting to security breaches or emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
400
Q

What is the primary goal of a firewall in information security?

A

Manages the secure in flow and out flow of data in a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
401
Q

In crisis management, what does “Incident Command System (ICS)” refer to?

A

A system for managing incidents and coordinating emergency response efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
402
Q

In information security, what is the primary purpose of a penetration test?

A

Identifying vulnerabilities in a system through controlled testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
403
Q

What does the acronym “CPTED” stand for in the context of security principles?

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
404
Q

In business continuity planning (BCP), what is the primary purpose of a business impact analysis (BIA)?

A

To identify and prioritize critical business functions and the effect of various threats on the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
405
Q

What is “Reasonable Suspicion” in the context of an investigation

A

A legally defined standard that justifies further investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
406
Q

What is the primary goal of electronic surveillance in an investigation?

A

Monitoring and recording electronic communications for investigative purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
407
Q

What is the purpose of a background check in personnel security?

A

Verifying the trustworthiness of an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
408
Q

In personnel security, what is the main goal of a “Non Disclosure Agreement” (NDA)?

A

Protecting sensitive information and trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
409
Q

What does the term “Whistleblower” refer to in personnel security?

A

An individual who reports unethical or illegal activities within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
410
Q

What is the primary purpose of perimeter security in physical security?

A

Protecting assets and personnel by controlling access to a defined area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
411
Q

Which type of security measure is designed to prevent tailgating or piggybacking?

A

Biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
412
Q

In information security, what does “Encryption” involve?

A

Protecting data by converting it into a secure format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
413
Q

What is the main drawback of using mechanical combination locks in high security applications

A

Susceptibility to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
414
Q

The three basic types of glass are

A

Sheet, Plate and Float

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
415
Q

What is the primary characteristic of a high pressure sodium light in security lighting

A

Poor color rendition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
416
Q

What is the primary characteristic of a high pressure sodium light in security lighting

A

Poor color rendition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
417
Q

Which of the following is not a biometric benefit

A

Low cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
418
Q

In the context of security lighting, what is meant by color rendition

A

The ability of a light resource to accurately reproduce colors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
419
Q

Which of the following best describes the principle of operation for a glass break sensor using shock detection

A

Monitors vibration patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
420
Q

Which of the following is not a benefit of using access control systems

A

Reducing security costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
421
Q

Which of the following is not an advantage of using IP based surveillance cameras

A

Lower implementation costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
422
Q

Which of the following is not typically included in a threat assessment

A

Historical weather data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
423
Q

What is the primary goal of network segmentation

A

Limiting the spread of security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
424
Q

Which type of illumination is characterized by a rapid strike time and excellent color rendition

A

Metal Halide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
425
Q

Which of the following is not a common security protocol for secure communications

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
426
Q

In the context of sensors, what is the primary function of a bistatic radar sensor

A

Uses separate location for the transmitter and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
427
Q

What is the primary advantage of using electromagnetic locks in secure facilities

A

Easy integration with access control systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
428
Q

In the context of locks, what is the purpose of a relocking device in a high security safe

A

To automatically relock the safe if an attack is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
429
Q

Containers that are rated for both fire and burglary protection offer either one or two hour fire protection and have TL rating of

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
430
Q

What is the primary characteristic of a mercury vapor light in security lighting

A

Long strike and restrike times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
431
Q

What is the primary goal of penetration testing

A

Identifying and exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
432
Q

Which of the following best describes an active infrared sensor

A

Emits infrared radiation and defects its reflection from objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
433
Q

Which of the following is not a benefit of encryption

A

Enhancing Data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
434
Q

In the context of physical security what is the most critical consideration when selecting a security integrator

A

Experience and expertise in integration complex security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
435
Q

What is a key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage

A

Implementing full cutoff fixtures to direct the light onward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
436
Q

which type of sensor uses changes in capacitance to detect intrusions

A

Capacitance based sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
437
Q

What is a primary advantage of using microwave sensors in perimeter security

A

Less affected by weather conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
438
Q

What makes active sensors particularly effective for border security applications

A

Active sensors emit signals that can detect changes in the environment providing earl warnings of potential breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
439
Q

In what way does the use active infrared sensors benefit a complex security system in a prison environment

A

These sensors trigger alarms if inmates pass certain thresholds even in total darkness, enhancing night time security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
440
Q

what is the primary objective of crisis mitigation

A

To reduce the impact of a crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
441
Q

How often should physical security assessments be conducted

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
442
Q

Which type of lock is designed to be resistant to picking and bumping by using a complex key design

A

Pin tumbler lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
443
Q

In the context of access control, what is the time based access control system

A

A system that allows access based on the time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
444
Q

What is the critical consideration when deploying microwave sensors in a corporate campus environment

A

Ensuring that the frequency of the microwave sensors does not interfere with the campus Wi-Fi and other communication systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
445
Q

In what scenario is it particularly important to use security lighting with high durability and resistance to environmental factors

A

In coastal areas where salt spray, wind and moisture can degrade lighting fixtures quickly, affecting their functionality and the overall security of the area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
446
Q

Which of the following is not a benefit of using thermal imaging sensors in security applications

A

High cost of implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
447
Q

what is the key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage

A

Implementing full cutoff fixtures to direct the light onward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
448
Q

What is the primary purpose of man trap

A

To control entry
To provide a barrier”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
449
Q

Which type of locking mechanism is often integrated into time lock systems for vault security

A

Combination Locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
450
Q

Which of the following is a typical application for seismic sensor in physical security

A

Monitoring ground vibrations near sensitive facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
451
Q

Which type of lock is least suspectable to lock bumping

A

Disc detainer lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
452
Q

Critical in PIDS

A

Accuracy
Response Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
453
Q

How does a volumetric sensor provide an advantage over traditional beam sensors in protecting the interior of a warehouse

A

By creating a three dimensional protection zone that detects movement within the entire covered space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
454
Q

Primary benefit of using intrusion detection systems (IDS) in security operations

A

Real time threat detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
455
Q

What is the most effective method for preventing tailgating in high security areas

A

“Installing additional CCTV cameras
Implementing mantraps or turnstiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
456
Q

Which of the following is not a typical step in risk management process

A

Risk enhancement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
457
Q

In the event of security breach which of the following is the most important initial response action

A

Containing the breach to prevent further damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
458
Q

What are the operational benefits of using bistatic radar sensors for coastline surveillance

A

Bistatic readers are particularly effective at low altitude and small object detection which his crucial for spotting small watercraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
459
Q

What is the primary goal of risk treatment in the ISO 31000 risk management framework

A

To implement measures that reduce the likelihood and impact or risks to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
460
Q

Which of the following sensors is commonly used for perimeter protection by forming an invisible barrier between two points

A

Infrared Beam sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
461
Q

Which sensor type is commonly used in retail stores to detect when doors are open or closed

A

Magnetic Contact Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
462
Q

What advantage does a volumetric sensor have over a perimeter sensor in securing a large ware house

A

Its provides coverage within the entire volume of the space, not just at the entry points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
463
Q

What makes an active sensor preferable for underwater intrusion detection systems compared to passive sensors

A

Active sensors, such as sonar, emit pulses and measure their echoes, which is effective under water where other signals may not propagate well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
464
Q

In what situation would an acoustic sensor be more advantageous than a PIR sensor

A

Detecting glass breakage in secure rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
465
Q

Why are LEDs considered most advantageous for use in motion activated security lighting systems

A

LEDs offer instant on/off capabilities, which is ideal for motion detection scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
466
Q

Which of the following sensor types can detect metallic objects moving in proximity

A

Magnetic sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
467
Q

What is the role of a data loss prevention (DLP) system

A

To detect and prevent unauthorized transmission of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
468
Q

Which of the following is the most critical factor in the effectiveness of biometric security systems

A

False Acceptance Rate (FAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
469
Q

Which of the following is not a benefit of using proximity cards in access control systems

A

Higher level of security compared to biometric systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
470
Q

Which of the following best describes the principle of operation for a passive infrared (PIR) sensor

A

Detects changes in thermal radiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
471
Q

During an emergency, the actual shutdown of equipment should be assigned to

A

People familiar with the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
472
Q

Which type of illumination is known for quick strike and restrike times

A

LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
473
Q

Which of the following best describes the concept of convergence in physical security

A

Integration of physical and cyber security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
474
Q

Record safes for computer media require better protection than paper records because damage to computer media can occur at

A

125 Degrees Fahrenheit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
475
Q

In the context of physical security, what is the most significant advantage of using IP based surveillance cameras

A

Ability to integrate with other network based security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
476
Q

Which of the following best describes security through obscurity

A

High Security Measures
Hiding Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
477
Q

Vulnerability assessment purpose

A

Identify weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
478
Q

Which of the following is not a component of a business continuity plan

A

Marketing strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
479
Q

What is the primary objective of access control systems in physical security

A

To restrict unauthorized access to sensitive areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
480
Q

Which of the following is not a benefit of using surveillance cameras

A

Enhancing data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
481
Q

What is the main purpose of using a security entry vestibule in a high security building

A

To act as a security buffer zone that restricts access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
482
Q

Which type of illumination is known for quick strike and restrike times and excellent color rendition

A

Metal Halide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
483
Q

Which of the following is a significant consideration for a security data center

A

Transportation routes
Redundant power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
484
Q

Which of the following best describes a brute force attack

A

Guessing passwords through exhaustive key search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
485
Q

Which of the following is an example of a physical security measure

A

Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
486
Q

What is the most effective method for preventing tailgating in high security areas

A

Installing additional CCTV cameras
Implementing mantraps or turnstiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
487
Q

How does a line detection sensor work in conjunction witch CCTV systems to enhance security at subway station entrance

A

By triggering the CCTV system to record when someone crosses a specific threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
488
Q

What is the primary purpose of security token

A

Authenticating user identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
489
Q

What is the primary function of a vibration sensor in a security system

A

Monitoring structural vibrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
490
Q

which of the following technologies is commonly used to protect valuable items in museums by detecting touch or proximity

A

Capacitive sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
491
Q

What is the primary advantage of using light emitting diode (LED) in security applications

A

Greater energy efficiency and longer lifespan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
492
Q

What is a major advantage of using fluorescent lighting in interior security settings

A

High energy efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
493
Q

What is the primary advantage of using a biometric lock over a traditional mechanical lock

A

Enhance security through unique user identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
494
Q

Which of the following sensors is least effective for outdoor perimeter protection in high wind environment

A

Ultrasonic sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
495
Q

What is the most effective method for securing a facility’s perimeter

A

Using a combination of physical barriers, surveillance and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
496
Q

What is a primary function of a hard plate in a vault lock system

A

To prevent unauthorized access through physical attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
497
Q

In terms of security lighting, why is it important to consider both strike time and restrike time when planning the installation of new lighting fixtures

A

These times impact how quickly areas can be secured and monitored after initial activation or power interruption’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
498
Q

What are the benefits of integrating adaptive lighting technology in security systems at dynamic environments like airports

A

It allows the lighting intensity to adjust based on natural light levels, enhancing visibility and reducing energy consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
499
Q

Which of the following is not a principle of defense in depth

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
500
Q

How does the implementation of an automated lighting control system, which adjusts based on activity levels enhance a facility’s security during off hours

A

Automated systems ensure that lighting is optimal only when activity is detected, saving energy and reducing wear while maintaining security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
501
Q

What is the primary function of a capacitance based sensor

A

To detect variations in capacitance caused by conductive objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
502
Q

In security what is crash rated barrier

A

A barrier designed to withstand vehicle impacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
503
Q

Which type of illumination is known for its high energy efficiency and good color rendition

A

LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
504
Q

What considerations should be taken into account when deploying microwave sensors along a border fence in a desert environment

A

The sensors must be calibrated to ignore small, fast moving sand particles to reduce false alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
505
Q

Which of the following is not a principle of information security

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
506
Q

In the context of security lighting, what is luminance

A

The perceived brightness of a light source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
507
Q

What is key advantage of a combination lock in high security vaults

A

It does not require electricity to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
508
Q

What is the primary function of a security barrier

A

To obstruct or control the movement of vehicles and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
509
Q

Which of the following is a physical security measure for protecting information

A

Encryption software
Firewalls
Locking filling cabinets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
510
Q

Which of the following is the primary purpose of physical security

A

To prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
511
Q

Which of the following best describes the purpose of access control systems

A

To prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
512
Q

Which type of door is typically used for high security areas

A

Solid core door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
513
Q

Which of the following best describes the term least privilege

A

Granting employees the minimum access necessary to perform their duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
514
Q

What is the main advantage of using microwave sensors in security applications

A

Can detect movement through non metallic barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
515
Q

What is the primary function of video analytics in surveillance systems

A

To automatically analyze and interpret video data for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
516
Q

Which of the following best describes a crisis communication strategy

A

A plan to manage communication during a crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
517
Q

Which of the following best describes the use of security screening at access points

A

Checking for prohibited items and verifying identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
518
Q

What is a primary limitation of using ultrasonic sensors in security applications

A

Interference from environmental noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
519
Q

What is the key advantage of using biometric authentication in access control systems

A

High level of security through unique identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
520
Q

What is the primary benefit of using thermal imaging sensors in security

A

Ability to detect intruders in complete darkness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
521
Q

What is a common characteristic of high security fences

A

Anti climb features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
522
Q

Duress alarm function

A

Alert emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
523
Q

What does a security patrol primarily aim to achieve

A

To deter and detect security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
524
Q

What is the primary advantage of using multi factor authentication (MFA) in physical security

A

Increased security by combining multiple authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
525
Q

What is the role of a security control room

A

To monitor and manage security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
526
Q

Which of the following best describes natural access control

A

Using natural barriers to control access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
527
Q

What is the primary function of a volumetric sensor in security systems

A

To detect changes in volume with a defined area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
528
Q

In physical security what is the purpose of a dead zone in surveillance

A

To prevent unauthorized access by limiting surveillance coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
529
Q

Which sensor technology is most effective for detecting motion through walls

A

Microwave sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
530
Q

In physical security what is a mantrap

A

A vestibule with two sets of interlocking doors to control entry and exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
531
Q

What is the primary goal of confidentiality in information security

A

To protect data from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
532
Q

What is the primary purpose of a mantrap in physical security

A

To control access by trapping intruders
To provide a physical barrier against forced entry
To ensure single person entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
533
Q

In the context of emergency response planning, which of the following is the most crucial aspect

A

Detailed evacuation procedures
Comprehensive employee training program
Regular emergency drills and exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
534
Q

What is a zero day vulnerability

A

A vulnerability that is exploited before the developer is aware of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
535
Q

Record safes for computer media require better protection than paper records because damage to computer media can occur at

A

125 degrees Fahrenheit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
536
Q

Which of the following is not a primary goal of a security program

A

Profit Maximization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
537
Q

What is the main advantage of using smart locks in residential security systems

A

Enhanced key control and monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
538
Q

Which of the following is not a method of risk mitigation

A

Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
539
Q

In the context of security sensors, what is a false alarm

A

An alarm triggered without any actual threat or intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
540
Q

What is the importance of adjustable beam angles in security lighting fixtures for a large warehouses

A

Adjustable angles allow the lighting to be customized to specific areas of interest, enhancing surveillance and detection capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
541
Q

How does the restrike time of HID lamps affect security coverage during temporary power disruptions

A

Long restrike times may leave areas temporarily dark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
542
Q

Why would an art museum use a capacitance based sensors for individual high value exhibits

A

To detect any unauthorized contact or proximity to the artwork, which could signal an attempt to tamper with or steal the piece

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
543
Q

Which type of illumination has poor color rendition but is highly energy efficient

A

Low Pressure Sodium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
544
Q

Which of the following is not a common type of sensor used in intrusion detection systems

A

Biometric sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
545
Q

Which type of sensor is most suitable for detecting movement within a confine, indoor space such as a storage room

A

PIR sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
546
Q

How do active infrared sensors improve the security of outdoor concerts or events

A

They can be used to create a perimeter where anyone breaking the infrared beam can trigger an immediate security response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
547
Q

Which type of lock is most resistant to picking and bumping

A

Disk detainer Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
548
Q

Which of the following best describes a security incident report

A

A record of security breaches and responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
549
Q

Which of the following is a key challenge in implementing a security operations center (SOC)

A

High Initial cost
Difficulty in integrating with existing systems
Limited skilled personnel availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
550
Q

What is the primary advantage of using thermal imaging sensors in security applications

A

Ability to detect intruders in complete darkness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
551
Q

In Security lighting, what is color rendition

A

The ability of a light source to accurately reproduce colors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
552
Q

Which of the following describes the principle that an employee should be under the direct control of one and only one immediate supervisor

A

Unity of command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
553
Q

Which of the following best describes the role of a security audit

A

To evaluate the effectiveness of security measures
To identify potential security vulnerabilities
To ensure compliance with security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
554
Q

What is the role security training for employees

A

To ensure employees understand and follow security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
555
Q

Which of the following is not typically included in a security policy

A

Marketing strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
556
Q

Which of the following is not a common feature of high security fence

A

Wooden posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
557
Q

Which of the following is a fundamental principle of GDPR (General Date Protection Regulation)

A

Data minimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
558
Q

What is the primary advantage of using LED lights in security lighting

A

Greater energy efficiency and longer lifespan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
559
Q

Which of the following best describes the concept of resilience in crisis management

A

The ability to recover quickly from crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
560
Q

Which of the following best describes an inductance based sensor

A

Measures changes in inductance caused by metallic objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
561
Q

What is the primary function of a bollard in perimeter security

A

To provide barrier against vehicular threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
562
Q

What is the primary function of a security checkpoint

A

To detect and prevent unauthorized items from entering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
563
Q

What is the primary advantage of using a multi layered security approach

A

Increased redundancy and depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
564
Q

Which of the following best describes a crisis management drill

A

A practice scenario to test crisis response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
565
Q

What is the primary characteristic of a metal halide light in security building

A

Excellent color rendition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
566
Q

What is the role of a crisis management team

A

To manage and respond to crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
567
Q

In the context of physical security, what is the primary purpose of implementing security layers

A

To provide multiple levels of protection to deter, detect and respond to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
568
Q

What is the primary goal of incident response planning

A

Minimizing damage from incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
569
Q

Which of the following is not a characteristic of a class III high security safe

A

Lightweight construction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
570
Q

What is the main purpose of a security incident response plan

A

To manage and mitigate the impact of security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
571
Q

Which of the following is not a benefit of conducting regular security audits

A

Reducing operational costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
572
Q

What is the main purpose of implementing security metrics

A

To measure security effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
573
Q

Which type of sensor is most effective for detecting motion in large open spaces

A

Microwave sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
574
Q

Which of the following is not a characteristic of a strong security policy

A

Profitability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
575
Q

What is the primary benefit of using combination locks in secure facilities

A

No need for keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
576
Q

Which of the following is not a benefit of using thermal imaging cameras for perimeter security

A

Lower cost compared to visible light cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
577
Q

Which of the following describes the principle of a operation for a capacitance based sensor

A

Measure changes to capacitance when a conductive object enters the field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
578
Q

What is the principal function of a double cylinder deadbolt lock

A

Requiring a key for operation from both sides of the door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
579
Q

What type of sensor is most effective for detecting unauthorized entry through walls

A

Microwave sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
580
Q

Which of the following is not a common type of network security threat

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
581
Q

What is the role of security lighting in physical security

A

To deter criminal activity by increasing visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
582
Q

What is the primary purpose of a security breach detection system

A

To prevent unauthorized access to secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
583
Q

What is the most effective method for preventing tailgating in secure facilities

A

Implementing mantraps or turnstiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
584
Q

Which of the following best describes the operation of a mono static radar sensor

A

Transmitter and receiver are co located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
585
Q

Which type of sensor is not affected by changes in temperature

A

Capacitance based sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
586
Q

What is the purpose of security perimeter

A

To delay and detect intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
587
Q

Which of the following is an example of physical security threat

A

Unauthorized entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
588
Q

Which of the following best describes the purpose of a security checkpoint

A

To control and monitor access to a restricted area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
589
Q

Which of the following is a key consideration for physical security information management system (PSIM)

A

Cost
Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
590
Q

Which of the following is not a principle of risk management

A

Risk elimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
591
Q

What is the primary function of video analytics in security systems

A

To automatically analyze video data for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
592
Q

What is the primary purpose of a duress alarm system in a secure facility

A

To alert security personnel of an emergency situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
593
Q

What is the most critical factor in the effectiveness of an intrusion detection system (IDS

A

Detection accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
594
Q

in the context of physical security what is bollard spacing

A

The distance between bollards to prevent vehicle passage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
595
Q

In physical security what is the purpose of a intrusion detection system

A

To direct unauthorized entry into a secured areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
596
Q

Which of the following is a characteristic of a secure password

A

It contains a mix of letters, numbers, and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
597
Q

Which of the following best describes the primary function of a terrain following radar

A

To follow the contours of the terrain for low altitude flight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
598
Q

Which of the following best describes the concept of security by design

A

Integrating security measures into design of facilities from the outset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
599
Q

Which of the following best describes the principle of defense in depth

A

Using multiple layers of security controls to protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
600
Q

What is the primary advantage of using biometric access control systems in high security environments

A

Non intrusive and high accuracy identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
601
Q

What is the primary function of a mortise lock

A

Providing a secondary locking mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
602
Q

Which of the following best describes the concept of defense in depth

A

Using multiple layers of security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
603
Q

What is the primary objective of crisis prepareness

A

To ensure readiness to handle crisis effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
604
Q

Prevent Loading dock access

A

Lighting
Controlled access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
605
Q

What is the primary purpose of a vulnerability assessment

A

To identify weakness in security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
606
Q

What is the main disadvantage of a using physical barriers for security

A

High cost
Complexity of implementation
Reduced flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
607
Q

Which of the following best describes the principle of a mono static radar sensor

A

Transmitter and receiver are co located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
608
Q

What is the purpose of crisis debriefing

A

To review and analyse the response to crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
609
Q

Which of the following best describes the purpose of a security survey

A

To assess the effectiveness of existing security measures and identify improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
610
Q

Which of the following best describes the concept of layered security

A

An approach to security that uses multiple levels of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
611
Q

Which of the following is an example of multi factor authentication

A

Password and fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
612
Q

What is the primary function of a strike plate in a door lock assembly

A

Providing a surface for the bolt to engage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
613
Q

Which of the following is not a component of a security risk assessment

A

Market positioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
614
Q

What is the primary benefit of using security glazing on windows

A

Enhanced protection against forced entry and breakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
615
Q

What is the primary objective of a business impact analysis (BIA)

A

To evaluate the potential effects of disruptions on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
616
Q

What is the purpose of a security risk assessment

A

To identify and evaluate potential security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
617
Q

Which of the following is a primary feature of biometric access control systems

A

Use of unique biological traits for identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
618
Q

What is the role of a security barrier in physical security

A

To obstruct or control the movement of vehicles and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
619
Q

Which of the following is an example of a physical security measure

A

Surveillance cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
620
Q

Which of the following best describes convergence in security

A

Physical and cyber integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
621
Q

Which of the following is not a common objective of a security policy

A

Maximizing employee productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
622
Q

Which of the following is a key component of an effective security strategy

A

Proactive Measures
Reactive Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
623
Q

What is the role of leadership in crisis management

A

To provide direction and support during a crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
624
Q

Which of the following best describes the operation of an inductive proximity sensor

A

Measures changes in inductance when a metal object approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
625
Q

Which of the following is a common physical barrier in security

A

Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
626
Q

Which of the following is key for secure access control

A

Reliability
Convenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
627
Q

In Security lighting, what is meant by the term strike time

A

The time taken for a light to reach full brightness after being switched on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
628
Q

What is the primary function of surveillance cameras

A

To monitor and record activities for security purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
629
Q

Which of the following is a primary goal of physical security

A

Protecting physical assets and people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
630
Q

Which of the following is typical characteristic of a high security lock

A

Resistance to pricking and drilling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
631
Q

Which of the following is considered the most effective method for securing a high value storage areas with a facility

A

Implementing biometric access control and CCTC surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
632
Q

What is the main purpose of security awareness programs

A

To educate employees about security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
633
Q

What is the function of a security barrier

A

To obstruct or control movement for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
634
Q

Which of the following is not a primary objective of physical security

A

To monitor employee productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
635
Q

What is the primary purpose of a vulnerability assessment in physical security

A

To identify weakness in security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
636
Q

Which of the following best describes a safe room

A

A secure room to protect individuals during emergencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
637
Q

What is the role of an escort policy in physical security

A

A guideline for accompanying visitors within secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
638
Q

In the context of emergency response planning, which of the following is the most crucial aspect to ensure the safety of personnel

A

Detailed evacuation procedures
Comprehensive employee training programs
Regular emergency drills and exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
639
Q

Which type of lock is considered the most secure

A

Deadbolt lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
640
Q

Which of the following best describes the role of a security officer during an emergency

A

To ensure orderly and safe evacuation of personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
641
Q

In the context of security sensors, what is a nuisance alarm

A

An alarm caused by environmental factors or harmless stimuli

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
642
Q

The most common types of sensors used with protect vaults are vibration and

A

Contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
643
Q

In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance

A

Increased lighting in open areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
644
Q

Which of the following is not a feature typically found in high security padlocks

A

Wifi Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
645
Q

What is the purpose of security signage

A

To provide warnings and instruction to enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
646
Q

In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance

A

Increased lighting in open areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
647
Q

Which of the following is not a primary goal of security risk assessment

A

Developing new products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
648
Q

What is the primary function of a security information and event management (SIEM) system

A

To monitor and analyze security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
649
Q

Which of the following is the most critical factor in selecting a security fence for a high risk facility

A

Height of the fence
Material of the fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
650
Q

What is the role of lighting in physical security

A

To deter criminal activity by increasing visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
651
Q

In the context of physical security, what is the most effective method for preventing unauthorized access through a loading dock

A

Increased lighting
Controlled access points and surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
652
Q

Which of the following is an example of a security measure for protecting physical assets

A

Security patrols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
653
Q

Which of the following is not a component of a comprehensive security policy

A

Marketing strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
654
Q

In the context of security sensors. What is the probability of neutralization (pn)

A

The probability of an adversary being neutralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
655
Q

Which of the following best describes least privilege

A

Minimum access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
656
Q

What is the primary function of a duress alarm in a security facility

A

To alert security personnel of an emergency situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
657
Q

What is the primary function of a duress alarm system

A

To alert security personnel of an emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
658
Q

What is the primary advantage of using thermal imaging cameras for perimeter security

A

Ability to detect intruders in low visibility conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
659
Q

Which of the following is not a primary consideration when selecting a security integrator

A

Proximity to the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
660
Q

Which of the following is an example of a physical security control for protecting assets

A

Surveillance cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
661
Q

What is a common indicator of a phishing attack

A

An unexpected email asking for personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
662
Q

In the context of sensors, what is the primary function of a passive infrared (PIR) sensor

A

To detect infrared radiation emitted by objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
663
Q

Which of the following is not a component of the Crime Prevention Through Environmental Design (CPTED) strategy

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
664
Q

Which of the following best describes the role of a security officer during an emergency

A

To ensure orderly and safe evacuation of personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
665
Q

In physical security. What is a restricted area

A

An area where access is limited to authorized personnel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
666
Q

Which of the following best describes an intrusion detection system (IDS)

A

A system designed to detect unauthorized access or breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
667
Q

What is the purpose of security badges

A

To identity and control access for employees and visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
668
Q

Which of the following best describes the role of a security operations center (SOC) in physical security

A

To coordinate security efforts and provide real time monitoring and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
669
Q

What is the primary function of a turnstile in an access control system

A

To provide a physical barrier that allows only one person to pass at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
670
Q

Which of the following best describes a crisis

A

An unexpected event that threatens the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
671
Q

In physical security, what is the purpose of a restricted area

A

To limit access to authorized personnel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
672
Q

Which of the following is a key component of a crisis management plan

A

Response procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
673
Q

What is the primary purpose of using a volumetric sensor in security systems

A

To detect changes in volume within a define area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
674
Q

What is data encryption

A

To ensure data is only accessible to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
675
Q

Which of the following best describes anti tailgating devices in access control systems

A

Devices that prevent unauthorized following into secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
676
Q

What is the primary purpose of a crisis management plan

A

Ensuring effective response to crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
677
Q

What is the primary function of an anti pass back feature in an access control system

A

To ensure that an individual cannot re enter an without first exiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
678
Q

What is the main disadvantage of using biometrics for authentication

A

High Cost
Complexity of implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
679
Q

Which of the following is a critical consideration when designing a secure data center

A

Redundant power and cooling systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
680
Q

High value storage method

A

Biometric control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
681
Q

What is the primary role of a Chief Information Security Officer (CISO)

A

Overseeing the organization information security program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
682
Q

Purpose of mantrap

A

Control entry
Provide barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
683
Q

What is the main disadvantage of using keypad locks in high security environments

A

Susceptibility to wear patterns revealing the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
684
Q

In physical security, what is target hardening

A

Making a facility more resistant to attacks through physical measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
685
Q

Which of the following is not an effective preventive measure in physical security

A

Conducting financial audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
686
Q

What is the primary role a chief security officer (CSO)

A

Managing the organizations security strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
687
Q

What does the term personnel security refer to in the ASIS CPP Doman

A

Security Measures for employees and contractors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
688
Q

Which of the following is not a feature typically found in high security padlocks

A

Wi-Fi Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
689
Q

In access control systems, which of the following is considered a dual factor authentication method

A

Card reader and finger print scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
690
Q

Why are strike and restrike times critical factors in the design of high security locks

A

Strike and restrike times determine how quickly a lock can reset after breach attempt, ensuring that repeated forced entry attempts are less likely to succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
691
Q

Which of the following is a primary risk of using narco analysis in legal cases

A

Inconsistent results under controlled substances
Violations of human rights laws
The potential of coerced or fabricated memories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
692
Q

Which of the following is not an assumption of McGregor’s Theory X

A

Employees are motivated by financial rewards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
693
Q

What is the main legal consideration when implementing a workplace violence prevention program

A

Ensuring the program does not violate privacy or discrimination laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
694
Q

Which of the following is not a key component of risk management

A

Risk Elimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
695
Q

What is the main disadvantage of relying solely on physical evidence

A

Susceptibility to environmental conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
696
Q

Which of the following is a physical security measure for protecting information

A

Locked filing cabinets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
697
Q

what type of sensor would be most effective in detecting an intruder in noisy industrial environment

A

Seismic Sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
698
Q

Which of the following is a critical consideration when choosing a cold site for disaster recovery

A

To availability of IT resources to rebuild operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
699
Q

Which of the following is an example of a natural access control

A

Shrubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
700
Q

When considering span of control which factors increases complexity

A

Broader span of control
More sophisticated interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
701
Q

Which of the following is not a benefit of encryption

A

Enhancing data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
702
Q

In a biometric vault lock systems, what is the main advantage over mechanical locks

A

Elimination of physical keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
703
Q

Why might a security system designer opt for passive sensors in a highly secure data center

A

They do not emit energy that could potentially interfere with sensitive data equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
704
Q

What is the primary goal of financial management within security operations

A

Ensuring Operational efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
705
Q

What is the primary risk of failing to evaluate contractors during a personnel risk assessment

A

Contractors may have conflicting loyalties that put the company at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
706
Q

In what scenario might a multi tiered incident command structure actually slow down crisis response

A

When decision making processes become bureaucratic due to excessive layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
707
Q

What is the fundamental difference between threat assessment and vulnerability assessment in a security context

A

Threat assessment focuses on the external environment, while vulnerability assessment focuses on internal weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
708
Q

What is the main purpose of using a terrain following radar in security applications

A

To follow the contours of the terrain for low altitude flight

709
Q

Which of the following is an example of personnel security best practices

A

Regularly updating passwords
Implementing two factor authentication
Conducting background checks on employees

710
Q

Combinations should be changed whenever a person who knows it is terminated or not longer requires access or if there has been some form of compromise. At a minimum, combination should be changed

A

Every 1-2 years

711
Q

During disaster recovery planning, why is it important to consider the geographic location of backup facilities

A

To mitigate the risk of the same disaster affecting both primary and backup sites

712
Q

Which sensor type is least likely to generate false alarms due to movement of small animals

A

PIR sensor

713
Q

What is the purpose of a personnel security policy

A

To ensure compliance with legal and regulatory requirements

714
Q

What is the primary function of line detection sensors in perimeter security systems

A

Detecting vibration along a fence line

715
Q

Why is it important to analyze past incidents of workplace violence in a risk assessment

A

To identify patterns and contributing factors for future prevention

716
Q

How can failure t properly train staff for crisis scenarios undermine a well developed continuity plan

A

Employees may fail to execute their roles effectively, leading to confusion
It increases the potential of human error in communication

717
Q

In the context of business strategy, what is the purpose of a strategic business unit (SBU)

A

An SBU operates as a independent entity with its own strategic planning, responsible for managing a specific set of products or markets

718
Q

What is the primary goal of an incident response plan

A

Preventing future incidents
Ensuring business continuity

719
Q

What is the main purpose of BCMS audit

A

Identifying areas of improvement
Ensuring regulatory compliance

720
Q

Which of the following is not a common method of access control

A

Encryption

721
Q

In risk management context what is the main objective of implementing risk avoidance strategies

A

To completely eliminate the potential for specific risks to occur

722
Q

Which of the following is a potential threat to personnel security

A

Insider threats
Social engineering attacks
Physical security breaches

723
Q

What advantage does volumetric sensor have over a perimeter sensor in securing large warehouse

A

It provides coverage within the entire volume of the space, not just at the entry points

724
Q

Which of the following is not a benefit of using incident response plans in security management

A

Simplifying user management

725
Q

What is the main goal of using the alternative question technique in the REID method

A

To make the suspect choose between two versions of events

726
Q

What is the main purpose of security

A

To protect classified information
To ensure employee satisfaction
To maintain a safe work environment

727
Q

What is the primary purpose of using triangulation in an investigation

A

To cross check information from multiple sources

728
Q

Which of the following is a best practice for securing wireless networks

A

Disabling SSID broadcast

729
Q

In a high security environment what is the primary advantage of using facial recognition technology

A

Non intrusive identification
High accuracy

730
Q

Which of the following is an example of an operational risk

A

A cybersecurity breach

731
Q

Which of the following sensors is most likely to be affected by environmental conditions such as rain or fog

A

Infrared Sensors

732
Q

What is the primary purpose of conducting a security audit

A

Identifying security awareness

733
Q

Which type of lighting has the slowest restrike time after a power outage

A

Sodium vapor lighting

734
Q

Which of the following is not a characteristic of strong personnel security program

A

Lack of security policies and procedures

735
Q

What is the greatest limitation of microwave sensors in detecting slow moving adversaries

A

Microwave sensors rely on detecting Doppler shifts, which may not be significant when and adversary moves slowly

736
Q

Which business function is primarily responsible for managing the flow of goods and services

A

Operations

737
Q

Which of the following is the primary goal of buy bust operations in drug investigation

A

To arrest the dealer and confiscate drugs immediately

738
Q

What is the greatest risk in relying solely on historical data for future crisis management planning

A

It may not account for emerging threats like cyber risks or geopolitical shifts

739
Q

Which of the following is not a typical step in the risk management process

A

Risk enhancement

740
Q

In a combination locks, what is the function of the spindle

A

It transfers movement from the dial to the internal mechanisms

741
Q

Which of the following is the most critical aspect of a witness interview

A

Maintaining objectivity

742
Q

Which of the following is a key concern when conducting a polygraph examination

A

The emotional state of the subject
The training and expertise of the examiner
The physiological variability between individuals

743
Q

What is the primary purpose of building rapport in the PEACE model of interviewing

A

To encourage voluntary cooperation and honesty

744
Q

What is the greatest challenge in securing multi tenant buildings with shared facilities

A

Ensuring that each tenants security measures do not conflict with others

745
Q

Which of the following is a key characteristic of Theory Y as proposed by McGregor

A

Employees are self directed and seek responsibility

746
Q

What is the primary function of a terrain following sensor in a multi layered security system

A

To adapt its detection range and sensitivity based on the natural contours of the landscape, providing seamless coverage in uneven terrain

747
Q

Which of the following is not a principle of secure coding

A

Data encryption

748
Q

How to amphetamines differ from methamphetamines in terms of chemical structure and investigative focus

A

Methamphetamines contain an additional methyl syrup, making them more potent and more addictive

749
Q

What is the main goal of a risk assessment in BCMS

A

Identifying potential threats

750
Q

How does HIPAA affect healthcare fraud investigation

A

Investigator must obtain patient consent or legal authorization before accessing medical records, ensuring privacy is protected

751
Q

Which of the following is not a requirement for obtaining a personnel security clearance

A

Credit check

752
Q

Which of the following is not a principle of effective management

a. Planning
b. Delegating
c. Organizing
d. None of the above

A

None of the above

753
Q

Which of the following describes the function of a volumetric sensor in physical security

A

Monitors the presence of objects within a defined value

754
Q

Which sensor type is least affected by the presence of moving vehicles in the vicinity of a protected area

A

PIR sensor

755
Q

Which of the following type of vault doors typically offers the best combination of fire resistance and security

A

Composite Door

756
Q

According to Maslow’s Hierarchy of needs, which of the following is considered a basic physiological need

A

Food and water

757
Q

Which of the following is an example of a qualitative risk assessment method

A

Risk Matrix

758
Q

Which of the following is not a factor to consider when conducting a personnel security investigation

A

Social media activity

759
Q

What is the primary goal of an incident response plan

A

Preventing future incidents
Ensuring Business continuity

760
Q

Which of the following is not typically included in a threat assessment

A

Historical weather data

761
Q

What is the primary purpose of a security risk assessment

A

To identify potential threats

762
Q

Which of the following would generally disqualify information form being treated as a trade secret within a company

A

The information has been published in a technical journal

763
Q

In the context of interrogation techniques what is the purpose of theme development in the Reid technique

A

To minimize the suspects perception of moral wrong doing

764
Q

Which type of intelligence is least likely to be admissible as evidence in a court of law

A

Signal Intelligence (SIGINT)

765
Q

Which lighting type has the longest restrike time after a power outage

A

Sodium vapor lighting

766
Q

What is the main disadvantage of implementing excessive security measures

A

Increased complexity
Higher Costs
Reduced Efficiency

767
Q

Which of the following best describes the concept of data carving in digital forensics

A

Reconstructing deleted data

768
Q

What is a major advantage of using active infrared sensors in the security of logistics and shipping yards

A

Active infrared systems can create a grid of beams, any interruption in the beam pattern by unauthorized entry triggers alarms

769
Q

What is the primary benefit of regular BCMS training for employees

A

Increased organization resilience

770
Q

Which of the following is not a common method of ensuring data availability

A

Encryption

771
Q

Which of the following is not a type of security control

A

Operational

772
Q

Which of the following lock types provides the highest level of resistance to key bumping

A

Magnetic lock

773
Q

What is the purpose of conducting background checks on employees

A

To assess their suitability for a specific job role

774
Q

In the context of fire safety, which type of detector is designed to identify a fire in its incipient stage before any smoke is visible

A

Rate of rise

775
Q

Which of the following is an example of a qualitative risk assessment method

A

Risk Matrix

776
Q

Which of the following is a primary objective of a security policy

A

To outline acceptable use of resources
To ensure compliance with legal requirements
To establish a framework for security management

777
Q

What operational principle allows capacitance based sensors to detect intrusions through walls or other barriers

A

They detect changes in electrical fields caused by the proximity of a person or object to the sensor

778
Q

The three basic type of glass are

A

Sheet
Plate
Float

779
Q

What is the best method for ensuring the effectiveness of surveillance in a corporate environment

A

Employing a combination of human and technical surveillance methods

780
Q

Which CPTED principle would most directly involve the strategic placement of shrubbery and hedges

A

Territorial reinforcement

781
Q

What is the primary disadvantage of using undercover operations in investigation

A

Legal and ethical considerations

782
Q

Which sensor technology is typically least effective in detecting slow moving objects

A

PIR sensor

783
Q

What is a key challenge in conducting threat assessments for modern organizations

A

Accurately predicting emerging threats in an ever changing threat landscape

784
Q

In a sting operation targeting organized crime, which of the following factors would be most critical to a successful outcome

A

Security cooperation from lower level members of the organization
Gaining judicial approval for undercover methods
Ensuring all illegal activity is initiated by the suspects

785
Q

Which of the following is not a benefit of using multi factor authentication (MFA)

A

Simplifying user experience

786
Q

In an undercover investigation, what is a primary risk associated with a cold hire

A

Lack of prior planning

787
Q

Cost of security losses can be both direct and indirect, Which of the following is not an example of a direct cost

A

Loss of employees

788
Q

Which of the following is not a benefit of using thermal imaging cameras for perimeter security

A

Lower cost compared to visible light cameras

789
Q

Which of the following is not a common method of detecting tampering in high security locks

A

Magnetic fields

790
Q

In a threat and vulnerability assessment, which factor is most likely to increase the likelihood of a threat

A

The frequency and proximity of similar incidents

791
Q

How might a suspect use a social engineering to gather intelligence on an ongoing investigation

A

By manipulating employee or insiders into revealing confidential information

792
Q

Which of the following best describes the difference between McClelland’s need for achievement and need for power

A

Need for achievement is driven by success, while need for power is drive by influence

793
Q

Which of the following best describes the operation of an active infrared sensor

A

Emits infrared radiation and detect its reflection from objects

794
Q

What is the purpose of personnel security

A

To protect classified information

795
Q

How can organizations failure to include regular testing in its crisis management plan backfire during a real crisis

A

The plan may be not effective in practice as it seems on paper
Employee may not be familiar with their roles and responsibilities
Communication lines might fall under pressure

796
Q

In the context of drug investigations, what is the most effective way to ensure the identification of synthetic cannabinoids like spice during testing

A

Using gas chromatography mass spectrometry (GC-MS) for chemical analysis

797
Q

In what way does the installation of high CRI lighting near art exhibits enhance security

A

It improves the ability of surveillance equipment to accurately capture the true colors of the artworks, which is crucial in the event of theft or damage

798
Q

How can the deployment of honeypots in cybersecurity investigations complicate the evidence collection process

A

It may collect evidence that is inadmissible due to entrapment concerns

799
Q

According to McGregor’s Theory which of the following best describes employees motivation

A

Employees are motivated by intrinsic factors and seek fulfillment

800
Q

The highest priority in any computer security program is

A

Careful screening of personnel

801
Q

What is the purpose of a preemployment screening process in personnel security

A

To determine an individuals potential for misconduct

802
Q

What is the key challenge of integrating business continuity and disaster recovery strategies into a single framework

A

Balancing operational with IT system recovery timelines

803
Q

Which of the following best describes a zero day vulnerability

A

A vulnerability that is known to attackers but not yet patched by the vendor

804
Q

Which of the following is not a principle of secure coding practices

A

Hard coding credentials

805
Q

What is the primary risk of not securing maintenance access points such as HVAC or utility rooms in high security facilities

A

Maintenance areas can provide adversaries with entry points that bypass access control systems

806
Q

In physical security what is force protection

A

Measures taken to prevent or mitigate hostile actions against personnel and facilities

807
Q

What is the primary goal of background checks in personnel security

A

To verify employment history
To assess an individuals character
To identify potential security risks

808
Q

Why are passive infrared (PIR) sensors widely used in residential security systems

A

They are inexpensive compared to other sensor types and effective in detecting human presence through body heat

809
Q

In Herzberg’s theory, which of the following is considered a hygiene factor that can lead to job dissatisfaction

A

Work conditions

810
Q

In the context of financial planning, what is the purpose of a zero based budget

A

To justify every expense in the budget from scratch without relying on historical data

811
Q

What is the main objective of personnel security screening

A

To ensure the loyalty and trustworthiness of individuals

812
Q

How can failure to properly train staff for crisis scenarios undermine a well developed continuity plan

A

Employees may fail to execute their roles effectively, leading to confusion
It increases the potential for human error in communication

813
Q

In the context of security lighting, what is luminance

A

The perceived brightness of a light source

814
Q

Which of the following is not a potential threat to personnel security

A

Workplace accidents

815
Q

Which of the following is not a potential threat to personnel security

A

Workplace accidents

816
Q

Which of the following is a responsibility of the personnel security

A

Investigating security incident

817
Q

Which of the following is the best method for verifying the authenticity of a suspects alibi in a digital fraud investigation

A

Cross referencing financial records
Analyzing IP addresses and digital timestamps

818
Q

Under ISO 31000 which of the following is considered the first step in the risk management process

A

Risk identification

819
Q

What is the primary goal of personnel security

A

To prevent insider threats

820
Q

Which of the following is a best practice for securing wireless networks

A

Disabling SSID broadcast

821
Q

What is the biggest challenge in implementing a workplace violence prevention program

A

Monitoring employees behaviour without violating privacy laws

822
Q

Which vault lock system is most effective at deterring forced entry attempts

A

Time delay lock

823
Q

In the context of cybersecurity, what is the greatest risk posed by privilege escalation attacks

A

Once adversaries gain elevated privileges, they can access modify of destroy critical systems and sensitive data

824
Q

In CPTED, what is the significance of territorial reinforcement

A

It uses physical design elements to define boundaries and create a sense of ownership, deterring criminal behaviour

825
Q

Which of the following is not a advantage of video surveillance

A

Privacy protection

826
Q

What is the purpose of security clearances in personnel security

A

To grant access to classified information
To ensure individuals are trustworthy
To prevent unauthorized disclosure

827
Q

Which of the following would be the least effective application for a capacitive sensor

A

Detecting air temperature changes

828
Q

How might a candidate use a references false identity to mislead an employer during a background investigation

A

By hiring a professional to impersonate the reference during calls

829
Q

What is the main benefit of using electromagnetic locks in secure facilities

A

Easy to integrates with access control systems

830
Q

The three focus areas required to deal with strikes and labor disputes include all the following except

A

Post strike intelligence

831
Q

Which of the following is not a common method of achieving data confidentiality

A

Data replication

832
Q

Which of the following is a not a benefit of encryption

A

Enhancing data availability

833
Q

Why is conducting a social media audit during a personnel risk assessment important

A

To identify any potential reputational risks associated with the individual

834
Q

Which of the following is not a assumption of McGregor’s Theory X

A

Employees seek responsibility

835
Q

In digital forensics, which of the following is most likely to cause the loss of critical evidence during the collection

A

Failure to image the drive

836
Q

Which of the following lighting types provides the least effective illumination for security cameras

A

Sodium vapor lighting

837
Q

What is the main purpose of security policy in ESRM

A

Defining security roles and responsibilities
Enhancing operational efficiency

838
Q

What is the role of security awareness training program

A

To educate employees about security risks and best practices
To enforce compliance with security policies and procedures
To identify potential security vulnerabilities with an organization

839
Q

Why is THC the primary focus in cannabis related investigations

A

THC is the psychoactive component responsible for the intoxicating effects of marijuana

840
Q

Which of the following describes a common vulnerability of electronic locks

A

Dependency on power sources

841
Q

Which security feature is most effective at preventing unauthorized duplications of keys

A

Restricted key system

842
Q

In which case would a warm site be preferable to a hot site for a disaster recovery

A

When the organization can tolerate moderate downtime and costs need to be minimized

843
Q

Which of the following best describes McGregor’s Theory Y

A

Employees seek fulfillment and are motivated by challenges

844
Q

Why might organizations experience extended downtime even with an established business continuity plan

A

Interdependencies between critical systems were not accurately mapped

845
Q

Why is it critical for organizations to have a workplace violence policy in place

A

To address potential risks before violent incidents occur

846
Q

What is the role of security policies and procedures in personnel security

A

To establish guidelines for employee behaviour

847
Q

Security awareness supports many important goals. Which of the following is not a goal supported by security awareness

A

Support the security departments annual budgeting process

848
Q

What is the primary challenge in using active sensors in densely populated urban environments

A

Interference from other electronic devices and signals in the environment

849
Q

Which of the following is not a typical outcome of an effective cognitive interviews

A

Increased witness stress

850
Q

Which of the following is a not a method of risk mitigation

A

Amplification

851
Q

What is the purpose of a personnel security policy

A

To ensure compliance with legal and regulatory requirements

852
Q

Anti-tailgating device function

A

Prevent Access

853
Q

What is the key challenge of integrating business continuity and disaster recovery strategies into a single framework

A

Balancing operational continuity with IT system recovery timelines

854
Q

Why might recovery point objectives (RPOs) in business continuity plans be unrealistic

A

Lack of alignment between business and IT recovery priorities

855
Q

According to McGregor’s Theory X, which of the following management styles is most effective

A

Authoritative Management

856
Q

Which type of lamp would a security professional likely avoid for areas where precise color discrimination is necessary under surveillance cameras

A

Low pressure sodium lamps

857
Q

Why is it critical to perform a business impact analysis (BIA) before finalizing business continuity plans

A

To determine the potential operational and financial impacts of different types of disruptions

858
Q

What is the primary benefit of integrating BCMS with risk management

A

Enhanced organizational resilience
Improved financial performance

859
Q

In Maslow’s hierarchy of needs which of the following needs is considered basic survival need

A

Physiological

860
Q

In what scenario would an adversary exploit the weakness of a line detection sensor system

A

By crossing under or over the detection line without triggering the sensor

861
Q

When dealing with workplace violence what is the mail purpose of conducting a post incident review

A

To identify security gaps and prevent future incidents

862
Q

Which of the following is not a common method of achieving data confidentiality

A

Date replication

863
Q

Which management function involves setting objectives and determining a course of action for achieving those objectives

A

Planning

864
Q

What is the primary goal of a security policy

A

Defining acceptable use of resources

865
Q

What is the function of a glass break detector in a security system

A

Detects changes in sound frequency

866
Q

Why is business continuity planning increasingly incorporating black swan event scenarios

A

Black swan events, though rare, have extreme impacts that can severely disrupt operations if not accounted for

867
Q

What is the purpose of background checks in personnel security

A

To verify the identity of individuals
To asses the trustworthiness of individuals
To identify potential risk or vulnerabilities

868
Q

What is the primary goal of penetration testing

A

Identifying and exploiting vulnerabilities

869
Q

Which of the following is not typically part of the due diligence

A

Interviewing all employees

870
Q

Which sensor is less likely to be triggered by small animals and debris

A

Microwave sensors are less likely to be triggered by small animals and debris, reducing false alarms

871
Q

In what scenario might a hot site become ineffective during disaster recovery

A

If the disaster effects both the primary site and the hot site, redundancy become ineffective

872
Q

Which of the following is not typically considered a red flag for financial fraud

A

Frequent travel for business purposes

873
Q

Which of the following best describes McGregor’s Theory X

A

Employees are inherently lazy and require strict supervision

874
Q

In what scenario might perimeter intrusion detection systems (PIDs) be most effective

A

When monitoring large outdoor areas where access control is difficult to enforce

875
Q

What is the purpose of security clearance

A

To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions

876
Q

What describes security through obscurity

A

Hiding Measures
Visible Deterrents

877
Q

When gathering digital evidence from a suspects computer, what is the most critical first step to ensure data integrity

A

Imaging the entire system without altering any files

878
Q

Which of the following is not a forensic analysis type

A

Surveillance Analysis

879
Q

In physical security systems, why is it important to include redundant alarm systems for high risk areas

A

A failure in one alarm system can leave facility vulnerable without immediate detection

880
Q

What is a key limitation of traditional risk assessments in crisis management planning

A

They often fail to account for rapidly evolving risks like cybersecurity threats

881
Q

When conducting mobile surveillance, why is the use of multiple vehicles an advantage

A

It reduces the likelihood of the target detecting surveillance

882
Q

Which of the following is a critical consideration when choosing cold site for disaster recovery

A

The availability of IT resources to rebuild operations

883
Q

How can failure to update business continuity plans lead to operational risk during crisis

A

Outdated plans may not reflect current risk, technologies or organizational structures

884
Q

What is the main function of a perimeter intrusion detection system (IDS)

A

To detect and alert security personnel to breachers at the perimeter

885
Q

In preventing workplace violence, why might regular behavioral risk assessment be beneficial

A

They assist in identifying early warning signs of potential violence

886
Q

In a risk management context, what is the main objective of implementing risk avoidance strategies

A

To completely eliminate the potential for specific risks to occur

887
Q

What is the primary function of an intrusion detection system (IDS)

A

Detecting and alerting on potential security breaches

888
Q

How does the strike time of a lighting systems influence security measures during a initial power up

A

Longer strike times can delay the effectiveness of security systems

889
Q

In a crisis management plan, what is the main advantage of having a hot site for disaster recovery

A

It reduces recovery significantly since the site is fully operational

890
Q

How does the implementation of bistatic sensors increase the effectiveness of a security system along a national border

A

Bistatic sensor can detect low flying or small , slow moving objects that might not trigger monostatic sensors

891
Q

What is the main disadvantage of using RFID locks in physical security

A

Susceptibility to electromagnetic interference

892
Q

What is the most common defense strategy in drug related cased involving controlled buys

A

Claiming the suspect was entrapped by law enforcement

893
Q

Which is the most crucial aspect when setting up a proprietary investigative unit

A

Selection of professional personnel

894
Q

In Security management, what is the primary goal of a contingency plan

A

To ensure rapid recovery from incidents

895
Q

What is the primary role of threat assessment teams in preventing workplace violence

A

To evaluate potential threats and recommend preventive measures

896
Q

Which of the following is a primary criticism of Herzberg’s Motivation Hygiene theroy

A

It assumes all employees are motivated by the same factors

897
Q

In disaster recovery what is the key purpose of the recovery point objective (RPO)

A

To define the acceptable amount of data loss in terms of time

898
Q

Which of the following is not a purpose of personnel security

A

Ensuring physical measures are in place

899
Q

Which of the following is not a digital evidence integrity method

A

Encrypting

900
Q

Why might using biometric access control present a significant vulnerability in high security environments

A

Biometric data breaches could lead to identify theft with irreversible consequences

901
Q

What is the most effective method for securing a facility’s perimeter

A

Using a combination of physical bearers, surveillance and access control

902
Q

Earnings Before Interest Taxes and Amortization (EBITA) divided by revenue is a formula to calculate

A

Operating profit margin

903
Q

What is the main security feature of a safe with TL 15 rating

A

Resistance to forced entry for 15 minutes

904
Q

In what scenario would a cold site be preferable over hot site for disaster recovery

A

When cost is a major constraint and immediate recovery is not critical

905
Q

In an airport security setting, how can bistatic radar sensors improve the monitoring of unauthorized zone intrusions over monostatic radar sensors

A

Bistatic radar can cover multiple angles and directions, reducing blind spots and enhancing detection capabilities

906
Q

Which of the following is not an appropriate technique for conducting effective interviews

A

Leading the interviewee towards a specific answer

907
Q

In Herzberg’s theory which of the following is considered a motivator that can lead to job satisfaction

A

Achievement

908
Q

Why might a security system designer opt for passive sensors in a highly secure data center

A

They do not emit energy that could potentially interfere with sensitive data equipment

909
Q

Which of the following is a significant risk in cold hire operations

A

The operatives identity being exposed
The operation losing legal standing due to improper procedures
The potential for entrapment claims by the defense

910
Q

Why is it difficult to calculate return on investment (ROI) for business continuity plans

A

Calculating prevention benefits is speculative compared to real time disaster recovery costs

911
Q

What is the primary objective of an asset search in fraud investigation

A

To identify hidden assets

912
Q

Vault lock can be considered a potential security risk if not properly managed

A

Access codes

913
Q

In the context of legal and regulatory compliance, what is the role of Foreign Corrupt Practice Act (FCPA) in security operations

A

It prohibits

914
Q

Which of the following is considered inadmissible in most courts due to reliability concerns

A

Polygraph results

915
Q

What is the primary purpose of an incident response plan

A

To respond effectively to incidents

916
Q

In a large decentralized organization which factor presents the greatest challenge to standardizing crisis management protocols across multiple locations

A

Cultural differences influencing risk perception

917
Q

What is the primary purpose of using surveillance in an investigation

A

To gather evidence

918
Q

Which of the following is not a key consideration in designing a physical security plan

A

Establishing communication protocols

919
Q

Why is continuous monitoring important in business continuity planning

A

Continuous monitoring helps identify new threats in real time, allowing the organization to adjust its plans as necessary

920
Q

A craving for drug is exhibited often by the following

A

Water running from nose or eyes
Frequent yawning or sneezing
Continual itching of arms and legs

921
Q

Which lock type typically has the fastest restrike time

A

Magnetic lock

922
Q

Which of the following is a critical first step when investigating a cybersecurity breach

A

Isolating affected systems

923
Q

What is the main objective of personnel security screening

A

To ensure the loyalty and trustworthiness of individuals

924
Q

Which of the following is not a benefit of conducting a security risk assessment

A

Reducing need for compliance

925
Q

The statement that best describes the purpose of a scrambler in communications security is

A

It disguises information so it is unintelligible to those who should not have access to it

926
Q

How might an employee with a known history of workplace violence bypass traditional risk assessment protocols

A

By hiding their involvement in past incidents through legal settlements

927
Q

How does the integration of microwave sensors into an airports security system enhance its capability to detect unauthorized access

A

These sensors can cover large open areas, such as runways and parking lots, more effectively than other types of sensors

928
Q

How might a disgruntled employee attempt to by pass workplace security measures to carry out an act of violence

A

By utilizing insider knowledge of the facility’s layout and security weakness

929
Q

The highest priority in any computer security program is

A

Careful screen of personnel

930
Q

What type of lock is generally used for securing high value items against unauthorized access in both commercial and residential applications

A

Pin Tumbler Lock

931
Q

In the context of interviewing, what is the primary purpose of an open minded question

A

To encourage detailed response

932
Q

Why might an executive protection team need to coordinate with cybersecurity experts during a high profile event

A

To prevent the executives devices from being hacked

933
Q

How does the integration of the line detection sensors along with the PIR sensors enhance the security of a residential community’s perimeter fence

A

Line detection sensors can trigger lights and cameras, while PIR sensors provide a secondary confirmation of human presence reducing false alarms

934
Q

In an environment with high airflow and temperature changes which sensor type is least likely to trigger false alarms

A

Microwave sensor

935
Q

Which of the following is not a benefit of using incident response plans in security management

A

Simplifying user management

936
Q

An accurate assessment of the kinds of threats or risks affecting the assets to be safeguarded is known as

A

Loss event profile

937
Q

What is the primary risk of failing to evaluate contractors during a personnel risk assessment

A

Contractors may have conflicting loyalties that put the company at risk

938
Q

What is the main advantage of implementing a risk transfer strategy in a security program

A

It shifts the financial burden of a potential loss to a third party usually through insurance

939
Q

Which vault door material offers the best protection against both fire and physical intrusion

A

Composite steel

940
Q

How does the principle of proportionality apply to the implementation of security measures

A

Security measures should be direct proportion to the assessment level of threat and risk

941
Q

In which of the following cases would a cold site be preferred over a hot site

A

If the company can tolerate longer recovery times to minimize costs

942
Q

What is the primary goal of encryption in information security

A

Preventing unauthorized access
Ensuring Data integrity

943
Q

What is the primary purpose of crisis management plan

A

Ensuring effective response to crisis

944
Q

How might adversaries exploit gaps in an organizations disaster recovery plan during a global crisis

A

By taking advantage of delayed response to secondary risks

945
Q

What is the significant advantage of using active infrared sensors in warehouse security systems

A

These sensors can operate in complete darkness, detecting breaches without the need for ambient light

946
Q

In the context of threat assessment what is the most important factor to consider when identifying potential threats

A

The likelihood of occurrence and the impact of the threat on organizational assets

947
Q

Which of the following techniques is designed to allow interviewees to provide their accounts without interruption or pressure

A

PEACE model

948
Q

In the context of threat assessment what is the main objective of a consequence analysis

A

To evaluate the impact that a specific threat could have on the organization

949
Q

What is the primary goal of financial management within security operations

A

Ensuring operational efficiency

950
Q

__________ is used to compare the desirability of different ways of spending

A

Return on investment

951
Q

The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is

A

Economic

952
Q

How does a passive infrared (PIR) sensor detect an intruder

A

By measuring the infrared radiation naturally emitted from objects in its field of view

953
Q

Which of the following is not a characteristic of a strong encryption algorithm

A

Speed of encryption

954
Q

What is the significant advantage of using halogen lighting in terms of color accuracy for security operations

A

They emit a bright white light that enhances the clarity of recorded images

955
Q

What is the role of security policies and procedures in personnel security

A

To establish guidelines for employee behaviour

956
Q

What is the main advantage of performing vulnerability assessments in an organizations security planning process

A

It identifies weakness in the current security infrastructure that could be exploited by threats

957
Q

What is the purpose of background check in personnel security

A

To verify an individuals identity
To assess an individuals character and trustworthiness
To ensure individual meets the requirements for a specific job

958
Q

Which of the following is least likely to be factor in determining the patentability of an invention

A

Whether the invention provides a competitive advantage in its industry

959
Q

What is the critical purpose of Probability of Interruption (Pi) in the adversary sequence diagram

A

To calculate the time between detection and the point of adversary neutralization

960
Q

Which of the following is least likely to be considered a best practice for securing wireless networks in an organization

A

Using static IP addresses for connected devices

961
Q

Wired glass is intended to provide resistance to

A

Shattering and fragmentation

962
Q

Which of the following is a not a method of employee monitoring

A

Job performance reviews

963
Q

What is the primary purpose of physical security

A

To prevent authorized access

964
Q

Which of the following is most likely to prevent unauthorized access in a Bring Your Own Device (BYOD) environment

A

Implementing remote wipe capabilities for lost of stolen devices

965
Q

Which lighting type is know for its energy efficiency and minimal heat emission, making it deal for long term security use

A

LED

966
Q

What is the main purpose of audit trail

A

To document financial transactions

967
Q

Which of the following best describes the best way to lower the probability of interruption (Pi) in a perimeter protection system (PPS)

A

Extend response times

968
Q

What is the main purpose of a root cause analysis in investigations

A

Identifying the cause of an incident
Preventing recurrence of incidents

969
Q

In complex financial fraud investigations, why might investigators analyze corporate board minutes

A

To establish a timeline of decision making related to fraudulent activitiy

970
Q

Which factor most significantly affects the performance of ultrasonic sensors in detecting motion through solid objects

A

The density and composition of the solid material

971
Q

Which of the following is most likely to reduce the likelihood of fraud by addressing both opportunity and pressure within Cressey’s Fraud Triangle

A

Strengthening internal controls and offering employee assistance programs for financial stress

972
Q

How do terrain following microwave sensors adjust their detection patterns when deployed in environments with significant ground elevation changes

A

They continuously adjust the microwave beam’s angle based on feedback from the ground

973
Q

Which of the following would not be considered a motivator in Herzberg’s two factor theory

A

Working conditions

974
Q

According to McGregor which of the following best describes a Theory Y managers approach to leadership

A

Empowering and supportive

975
Q

Which characteristic of Cat6a cables provides better performance in dense networking environments compared to standard Cat6 cables

A

Higher frequency transmission capabilities

976
Q

Which of the following is a key element of a security risk management strategy

A

Implementing effective security controls

977
Q

Which of the following is the most important factor in determining the Probability of interruption (Pi)

A

Sensor sensitivity

978
Q

What is the primary goal of an access control system

A

To prevent unauthorized access

979
Q

What is the primary purpose of a firewall in information security

A

Preventing unauthorized access

980
Q

Which of the following is a least likely to be an important feature of a threat assessment teams deliberations during a bomb threat

A

Ensuring all members understand bomb disposal techniques

981
Q

Which of he following is least likely to be a valid defence in a copyright infringement lawsuit

A

The copyright holder failed to properly register the work before the infringement occured

982
Q

Which of the following is most likely to present a security risk when cloud storage solutions for sensitive data

A

Improper configuration of access permissions

983
Q

What is the primary objective of an employee background check in an investigation

A

To verify the accuracy of the employees resume

984
Q

Which of the following is not typically included i the calculation of EBITA

A

Taxes

985
Q

Which sensor is best suited for detecting the movement of vehicles through a perimeter gate

A

Magnetic loop sensor

986
Q

Which vault rating indicates that a vault can withstand 60 minutes of attack by sophisticated tools and expert burglars

A

Class 3

987
Q

Which of the following combinations would increase the Probability of Loss (PoL) in a security environment

A

High threat likelihood and slow response times

988
Q

What is the primary benefit of using network analysis in fraud investigations

A

Mapping relationships between suspects

989
Q

Which type of glass provides the best protection against ballistic threats

A

Bullet resistant glass

990
Q

In the context of vulnerability assessments, which of the following is least likely to reduce an assets vulnerability

A

Enhancing asset criticality

991
Q

Which factor most influences the detection range of passive infrared sensors in areas with large thermal gradients

A

The emissivity of surrounding surfaces

992
Q

Which of the following is least likely to be considered a factor in deciding whether to evacuate during a bomb threat

A

The proximity of high value assets

993
Q

Which of the following combinations would reduce over risk in a high criticality system

A

Delayed detection systems but immediate response capabilities

994
Q

Which of the following types of evidence is most relevant for establishing intent in an embezzlement case

A

Financial records showing discrepancies

995
Q

What is the primary role of threat likelihood in a the overall risk equation

A

It directly impacts the probability factor, which influences risk

996
Q

Which of the following is least likely to qualify as copyright infringement

A

Copying short portions of a copyrighted work for educations purposes under fair use

997
Q

What is the formula for determining the Expected Annual Loss (EAL) in risk management scenario

A

EAL = Asset value x Probability of Occurence

998
Q

Which three factors are essential in calculating annual loss expectancy (ALE) for an asset

A

Single Loss Expectancy (SLE), frequency of occurrence, control costs

999
Q

Which of the following technologies is considered the gold standard for trace explosives detection but is hindered by high costs and maintenance

A

Mass spectrometry

1000
Q

Which type of lighting is most susceptible to failure in high humidity environments

A

Fluorescent lighting

1001
Q

Which type of laminated glass is most resistant to forced entry, providing a high level of security in access points such as doors and windows

A

Bullet resistant glass

1002
Q

Which of the following is not a characteristic of Maslow’s self actualization level

A

Basic physical survival

1003
Q

Which of the following is least likely to be a requirement for trade secret protection

A

The information must be a public knowledge

1004
Q

Which of the following best describes the impact of a company’s quick ratio when its account receivable collection period increases significantly

A

The quick ratio will decrease because accounts receivable are counted as liquid assets

1005
Q

Which of the following is least likely to be an effective countermeasure for a denial of service (DoS) attack

A

Disabling all external network connections

1006
Q

Which of the following is most likely to enhance the burglary resistance of a vault used for high value asset protection

A

Using composite materials for the vault to resist drilling and cutting

1007
Q

What is the role of security policies and procedures in personnel security

A

To provide guidelines for employee behaviour
To define the organizations security requirements
To ensure compliance with legal and regulatory requirements

1008
Q

What is the primary factor influencing the energy efficiency of high pressure sodium lamps compared to other lighting technologies

A

High Lumens per watt

1009
Q

Which of the following is a least likely to be considered an effective security measure when standoff distance is impossible during a bomb threat

A

Installing blast resistant windows

1010
Q

Which of the following combinations would decrease risk in a high vulnerability system

A

Low threat likelihood and strong response protocols

1011
Q

Which of the following is the most probable to reduce the overall risk exposure for an organization

A

Developing contingency plans for high risk assets

1012
Q

Which of the following is least probable to enhance the response function of a physical protection system (PPS)

A

Installing additional motion detectors

1013
Q

What is the cost benefit formula for determining if a security measure should be implemented

A

if ALE>Mitigation Cost , Implement the control

1014
Q

Which of the following is not a part of the adversary sequence diagram

A

Risk Mitigation

1015
Q

In McClelland’s theory of needs, which need is primarily associated with an individuals desire for influence and control over others

A

Need for power

1016
Q

In a PPS, the delay function is most effective when

A

It provides enough time for response forces to engage

1017
Q

In a physical security risk assessment, what is the primary purpose of a threat vulnerability matrix

A

To prioritize mitigation strategies based on the probability of a threat materializing

1018
Q

Which of the following is most likely to lead to the rejection of a patent application

A

The inventions is considered obvious in light of existing technology

1019
Q

Which of the following is most probable to reduce the effectiveness of a perimeter intrusion detection system (PIDS)

A

Installing detection systems to close to vegetation

1020
Q

In the context of deter, detect, delay which of the following is most critical factor for effective deterrence

A

The visibility of security measures to potential adversaries

1021
Q

Which of the following combinations would reduce overall risk in a high criticality system

A

Delayed detection systems but immediate response capabilities

1022
Q

Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis

A

Lack of shared communication channels

1023
Q

In crisis communication what is the primary disadvantage of over centralizing authority

A

It risk slow communication flows during fast moving crisis

1024
Q

Which of the following is least likely to be a focus of ESRM in terms of risk mitigation

A

Maintaining a purely compliance based approach to security

1025
Q

Which of the following would be most effective in detecting objects approaching at different heights, such as drones or vehicles

A

Microwave sensor

1026
Q

Which lamp type is known for producing a warm, yellow orange light and is often used for roadway and outdoor security lighting

A

High pressure sodium

1027
Q

Which of the following is a least probable to contribute to the success of a protection in depth strategy

A

Reducing the number of patrols within the secure area

1028
Q

Which of the following is most likely to be the most difficult phase of bomb threat evaluation

A

Review phase

1029
Q

Which factor would least likely increase the overall risk score for high criticality assets

A

Enhancing access control systems and reducing incident recovery times

1030
Q

Which sensor technology is least affected by weather conditions such as rain and snow

A

Seisimic sensors

1031
Q

Which sensor type if least likely to be triggered by small animals in outdoor environments

A

Microwave sensor

1032
Q

What is the purpose of personnel security

A

To ensure safety of employees
To protect sensitive information
To prevent unauthorized access

1033
Q

How can failure to properly train staff for crisis scenarios under a well developed continuity plan

A

Employees may fail to execute their roles effectively, leading to confusion
It reduces managements ability to response in real time

1034
Q

Which type of evidence is most likely to be considered suggestive rather than conclusive

A

An eyewitness identification after a lengthy delay

1035
Q

Which of the following factors is most critical when determining Recovery Time Objectives (RTO) in a disaster recovery plan

A

The criticality of business functions

1036
Q

Which of the following is the best method for ensuring that security policy is aligned with organizational objectives

A

Engaging leadership in policy development

1037
Q

In a large decentralized organization, which factor represents the greatest challenge to standardizing crisis management protocols across multiple locations

A

Cultural differences influencing risk perception

1038
Q

Which of the following is the most effective way to measure the success of a risk transference strategy

A

Reduction in insurance premiums

1039
Q

Creating employee and management buy in to a security awareness program is not automatic. Security staff may face several obstacles in implementing a security awareness program. Which of the following is not an obstacle to an effective program

A

Adequate security staffing

1040
Q

Which of the following is most probable to improve the deterrence capabilities of a PPS

A

Installing highly visible security cameras in public areas

1041
Q

Which of the following combinations would most likely reduce the overall probability vulnerability of critical structure

A

Increasing detection systems and enhancing physical security measures

1042
Q

In high risk environment, which type of top guarding offers the best resistance to professional intrusion tools like wire cutters

A

Concertina wire

1043
Q

What is the purpose of security awareness program

A

To educate employees about security policies
To train employees on security procedures
To promote a culture of society

1044
Q

In the CARVER method, which factor measures how easily and adversary can exploit a targets weakness

A

Vulnerability

1045
Q

Which of the following combinations would most likely lead to employee motivation according to Maslow

A

Satisfying esteem and self actualization needs

1046
Q

Which of the following is most likely to influence the design of an organizations crisis communication strategy

A

The size and complexity of the organization

1047
Q

Which of the following is most critical when conducting Business Impact Analysis (BIA) in disaster recovery planning

A

Defining Recovery Time Objectives (RTO)

1048
Q

Which force multiplier would be most relevant when gathering intelligence on an organized crime syndicate

A

Informants within the syndicate

1049
Q

Which type of evidence is most likely to be considered circumstantial

A

Eyewitness testimony

1050
Q

Which of the following is most likely to affect the timing of an organizations business continuity plan activation

A

The duration of the crisis event

1051
Q

Which type of lock is most commonly used for high security applications due to its ability to resist physical destruction and picking

A

Lever lock

1052
Q

Which type of sensor is most effective for detecting unauthorized entry through windows

A

Acoustic glass break sensors

1053
Q

What is the primary role of identifying hazard frequency in a security risk model

A

To prioritize risk mitigation strategies based on the likelihood of hazard occurence

1054
Q

What are the four objectives of a vulnerability assessment

A

Facility characterization, evaluation of the facility’s PPS, a site survey of detection, delay and response, data to estimate performance against specific threats

1055
Q

Which of the following is most likely to result in legal liability for an investigator during the course of an investigation

A

Collecting evidence without proper documentation of chain of custody

1056
Q

Which of the following is least likely to improve the burglary resistance of a safe used to store sensitive documents

A

Adding an additional layer of fire resistant insulation to the safe

1057
Q

Which of the following best explains how a company’s trade secrets may be inadvertently disclosed to competitors

A

Filing for a patent based on a trade secret that requires full disclosure of the invention

1058
Q

Which factor is least likely to increase the Probability of interruption (Pi) for an adversary targeting critical infrastructure

A

Increased detection sensitivity but poorly trained response personnel

1059
Q

What are the basis functions of a security officer force

A

Access control, patrol, escort, inspection, monitoring, emergency purpose, dealing with disturbed people, special assignments

1060
Q

According to Herzberg’s theory, which of the following would most likely lead to job dissatisfaction

A

Poor working conditions
Low salary

1061
Q

Which of the following best describes a major challenge of conducting interviews with children using the cognitive interview technique

A

Heightened risk of false memories

1062
Q

Which of the following is most likely to improve the ROI (Return on Investment) of a physical security system involving locks and safes

A

Reducing the frequency of maintenance and replacement of mechanical locks

1063
Q

What is the main reason shielded twisted pair (STP) cables are preferred over unshielded twisted pair (UTP) in high noise environments

A

STP cables reduce electromagnetic interference

1064
Q

Which of the following is not considered a factor in determining the likelihood of a risk

A

Asset value

1065
Q

What is the primary role of a business impact analysis (BIA) in BCMS

A

Identifying critical business functions
Assessing potential business impacts

1066
Q

Why is scalability important when designing access control systems for large organizations

A

It allows the system to grow and adapt to changes in the organizations security needs

1067
Q

Which of the following is not one of the two primary aspects of recovery after information loss

A

Implementing forensic investigation to identify the issue

1068
Q

How does the power consumption of LEDs compare to traditional incandescent lamps for equivalent light output

A

80% Lower

1069
Q

Which of the following is not a common method used to identify a suspect in a digital investigation

A

Data carving

1070
Q

Which of the following strategies best demonstrates risk mitigation in a security system

A

Implementing compensatory controls

1071
Q

Why are passive sensors particularly suitable for use in residential security systemss

A

Passive sensors such as PIR are energy efficient, only activating when needed, which is ideal for home use where energy conservation is important

1072
Q

Which of the following is not a potential risk associated with personnel security

A

Cybersecurity vulnerabilities

1073
Q

Which type of sensor is commonly used in areas where frequent opening and closing of doors occurs, such as lobbies

A

PIR Sensor

1074
Q

Which safe rating is required to store high value assets in banking environments where physical security is paramount

A

TRTL-30X6

1075
Q

In Herzberg’s Hygiene Theory which of the following is an example of a motivator

A

Recognition

1076
Q

In microwave perimeter sensors, what is the primary disadvantage of using a continuous wave (CW) Doppler radar system

A

Continuous wave systems are unable to detect stationary objects

1077
Q

What is the purpose of a background check

A

To verify a persons identity
To assess a persons suitability for a job
To uncover any criminal history

1078
Q

A technique used to disguise digital data information during transmission is

A

Encryption

1079
Q

In a sting operation ,which of the following techniques is most likely to result in the successful prosecution of a suspect

A

Allowing the suspect to initiate all illegal activities

1080
Q

What is the primary advantage of using laminated glass in high security applications

A

Ability to maintain structural integrity after penetration

1081
Q

Which of the following is not true about McGregor’s Theory Y

A

It requires close supervision and control for employees to be effective

1082
Q

Which type of lock is typically installed on vault doors to protect against unauthorized access by restricting access to the locking mechanism

A

Electronic time lock

1083
Q

Which of the following is most probable to improve the effectiveness of a risk mitigation strategy

A

Implementing physical barriers in combination with cyber protections

1084
Q

According to Herzberg, which of the following would not lead to dissatisfaction

A

Job security

1085
Q

Why is barbed tape more commonly used than barbed wire in modern high security perimeters

A

Barbed tape cause more damage to intruders, acting as a stronger deterrent

1086
Q

During an interrogation, how might a suspect attempt to manipulate the outcome using false compliance

A

By pretending to cooperate while subtly altering their statements

1087
Q

Which of the following is a key principle of perimeter security

A

Deterrence

1088
Q

In terrain following radar systems, which environmental factor is most likely to cause signal attenuation

A

Vegetation

1089
Q

Which of the following is best example of risk avoidance in a security strategy

A

Moving high value assets to a location outside the threat zone

1090
Q

Which of the following locks is most resistance to lockpicking

A

Disc detainer lock

1091
Q

Which of the following is least likely to be considered when determining the risk tolerance level with the ESRM framework

A

The organizations legal obligations to external regulatory bodies

1092
Q

Which of the following is most likely to be a challenge in bomb threat assessment

A

Determining the legitimacy of the threat

1093
Q

According to McClelland, which of the following needs is associated with a drive to excel and achieve goals

A

Need for achievement

1094
Q

Which of the following is an example of indirect evidence

A

A behaviour pattern

1095
Q

Which of the following metrics is least likely to be used when quantifying security risks in an ESRM framework

A

Total number of security incidents reported annually

1096
Q

Which of the following best describes the function of a mantrap in a high security environment

A

To control access by trapping intruders
To provide a physical barrier against forced entry
To ensure single person entry

1097
Q

In the context of personnel security, what is the purpose of a background investigation

A

To determine an individuals eligibility for a security clearance

1098
Q

Which of the following is most likely to undermine the effectiveness of crisis management training exercises

A

Failing to involve senior management in drills

1099
Q

Which of the following is not an advantage of using biometric authentication in access control systems

A

Low cost of implementation

1100
Q

Which of the following combinations would most likely result in an overall decrease in risk

A

Low threat likelihood and frequent audits

1101
Q

Why is barbed tape often preferred over traditional barbed wire for high security perimeters

A

Barbed tape is more difficult to cut without specialized tools

1102
Q

Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis

A

Lack of shared communication channels

1103
Q

Which of the following is most probable to be contributor to the cost of replacement

A

Freight and shipping charges

1104
Q

Which of the following is an example of personnel security measure

A

Background checks

1105
Q

Which of the following is not a typical element of a layered security approach

A

Forensic analysis

1106
Q

Which of the following best defines a provisional patent application

A

It allows an inventor to establish a filing data while continuing to develop the invention

1107
Q

Which type of lock is least vulnerable to environment wear and tear in outdoor installations

A

Mechanical combination lock

1108
Q

Which of the following scenarios would result in an increase in the overall threat landscape

A

Increasing the assets visibility to potential adversaries
Improving access control measures but ignoring detection systems

1109
Q

What is the primary goals of a security policy

A

Defining acceptable use of resources

1110
Q

Which of the following is a not a guideline for workplace drug purchases during an investigation

A

Make purchases off company time

1111
Q

What is the primary objective of customer relationship management (CRM)

A

To manage interactions with current and potential customers

1112
Q

Which of the following best describes corroboration in investigations

A

Verifying information through multiple sources

1113
Q

In security system design what does response time refer to in the adversary sequence diagram

A

The time between detection and the neutralization of the adversary

1114
Q

Which of the following is most likely to undermine a company’s ability to protect its trade secrets

A

Failing to document and label sensitive information as confidential

1115
Q

In risk management what role does asset criticality play in determining risk tolerance

A

Critical assets have lower risk tolerance due to their importance in business operations

1116
Q

Which of the following is not a typical goal of protection in depth

A

Ensuring that no vulnerabilities exsit within the system

1117
Q

Which of the following is a passive security measure

A

Security signage

1118
Q

In evidence collection why is it important to secure biological evidence immediately after it is found

A

Biological evidence can degrade quickly if not properly stored, reducing its usefulness in forensic analysis

1119
Q

Which combination of factors increase the likelihood of successful exploitation of vulnerabilities

A

Effective detection but slow response times
High exploitability and delayed recovery protocols

1120
Q

Which of the following is least likely to be method for controlling physical access to information systems

A

Multifactor authentication for remote system access

1121
Q

How does CPTED use the concept of territorial reinforcement to deter crime

A

By using signage and visible security presence to establish a sense of ownership and define the space as private

1122
Q

What is the key element that defines direct evidence in an investigation

A

It directly links the suspect to the crime without needing inference

1123
Q

Which of the following is most likely to pose a challenge when using cognitive interviewing techniques on witneses

A

Witnesses recalling peripheral details rather than key events

1124
Q

Which type of safe is best suited to protect valuable items against fire and heat but offers limited protection against burglary

A

Fire rated safe

1125
Q

What consideration should be given to lighting systems in areas prone to vandalism or tampering

A

Lighting fixtures should be designed to be tamper proof and resistant to vandalism

1126
Q

In a large decentralized organization, which factor represents the greatest challenge to standardizing crisis management protocols across multiple locations

A

Cultural differences influencing risk perception

1127
Q

What is the purpose of a personal security policy

A

To establish rules and guidelines for personnel security
To ensure compliance with legal and regulatory requirements
To protect sensitive information and resources

1128
Q

Which of the following is least likely to affect the quick ratio of a company

A

Selling off inventory at discounted price

1129
Q

Which of the following scenarios would most likely increase the overall threat landscape

A

Reducing the number of security personnel on site

1130
Q

In general, the continuum of violent behaviour starts with

A

General disgruntlement

1131
Q

What is a significant limitation of using barbed wire for top guarding in areas with high foot traffic near the perimeter

A

Barbed wire can cause injury to authorized personnel accessing the area

1132
Q

What vulnerability is commonly exploited in electronic combination locks

A

Bypass through manual override

1133
Q

In Business continuity planning (BCP) which of the following is least likely to be considered a critical business function

A

Employee recreation programs

1134
Q

Which of the following is most likely to decrease the quick ratio of a company

A

Increasing accounts payable

1135
Q

How do terrain following sensors impact the operational tactics of mobile security patrols in large commercial estates

A

By optimizing travel routes to avoid natural obstacles, these sensors enable faster response times and more efficient patrolling

1136
Q

How might adversaries exploit gaps in organizations disaster recovery plan during a global crisis

A

By taking advantage of delayed response to secondary risks

1137
Q

What is the major limitation of using bistatic infrared sensors in narrow corridors or hallways

A

Alignment of the transmitter and receiver becomes more difficult, leading to false negatives

1138
Q

Which of the following is not a characteristic of a successful risk mitigation strategy

A

It eliminates the probability of all risk events

1139
Q

Which of the following is not a typical method used to detect insider trading

A

Analyzing financial statements

1140
Q

What is the biggest risk of relying solely on eyewitness testimony in criminal investigations

A

The accuracy of human memory is subject to influence and distortion

1141
Q

Which of the following best describes the legal privilege typically granted to properly controlled investigative reports

A

Qualified privilege

1142
Q

Which of the following is least likely to influence a fraud suspects ability to rationalize their actions within the fraud triangle

A

The strictness of the organizations internal fraud prevention policies

1143
Q

Which of the following is most likely to present a technical challenge in implementing a centralized ESRM platform for global enterprises

A

Integrating ESRM data from multiple security management systems

1144
Q

In methamphetamine investigations, what makes clandestine labs particularly dangerous for law enforcement officers

A

They use high volatile chemicals that can cause explosions and fires

1145
Q

What is the key difference between a cold hire and controlled hire in an undercover investigation

A

A cold hire involves placing an operative into a suspect organization without prior intelligence, while a controlled hire is based on pre existing information

1146
Q

Which of the following is most likely to increase the difficulty of risk quantification in ESRM

A

The subjective nature of threat likelihood and business impact assessments

1147
Q

How might terrain following sensors be used to compensate for environmental blind spots in perimeter security

A

By adjusting their detection range and angle to follow the natural contours of the land, ensuring full coverage

1148
Q

Which of the following is least likely to affect a company’s ability to maintain trade secret protection over time

A

The company’s employees sign non disclosure agreements

1149
Q

Which of the following is least likely to be considered an inherent vulnerability in a critical infrastructure system

A

Redundant power supplies

1150
Q

Which of the following is most likely to affect the restrike time of a high intensity discharge (HID) lamp in an outdoor security system

A

The frequency of on off switching during night time operation

1151
Q

How might organization ensure that contractors pose minimal personnel security risks

A

By conducting background checks before hiring contractors

1152
Q

What is the main purpose of a security operations center

A

Monitoring and responding to security incidents

1153
Q

Which lock type typically has the longest strike time

A

Mechanical comibnation lock

1154
Q

Which of the following is least likely to enhance the response function in a PPS

A

Relying solely on passive surveillance systems

1155
Q

In a museum setting, how can capacitance based sensors be utilized to enhance the security of displayed items

A

By creating an invisible barrier around each item that when breached, alters the capacitance and triggers an alarm

1156
Q

In the context of a buy bust operation what is the role the undercover officer

A

To engage in a fake transaction to confirm the suspects involvement

1157
Q

How might adversaries defeat multi factor authentication (MFA) systems in a physical access control context

A

By using social engineering to steal authentication factors

1158
Q

Which of the following types of hire is typically used in environments where investigators aim to gathers long term intelligence without making immediate arrests

A

Cold Hire

1159
Q

What is the main risk of relying on open source intelligence (OSINT) in a criminal investigation

A

The information may be outdated or in accurate

1160
Q

What is the primary legal risk in a cold hire operation

A

The investigation may be deemed unethical if the suspect is unaware

1161
Q

Which of the following is most likely to extend the delay time in a security system designed to protect high value assets

A

Installing multiple layers of reinforced barriers

1162
Q

Which of the following is most likely to improve the detection of fraud early by addressing the opportunity component in Cressey’s Fraud Triangle

A

Implementing real time monitoring of financial transactions and data success

1163
Q

Which lighting technology is most susceptible to degradation due to frequent on off cycling

A

Fluorescent lighting

1164
Q

What is the significance of the term bag head in narcotics investigations

A

It is a slang for a person addicted to sniffing glue or paint from a bag

1165
Q

How does hazard differ from a vulnerability in a security context

A

A hazard is an external factor, while vulnerability is an internal weakness

1166
Q

Which of the following is most probable to be considered a violation of privacy laws in a workplace investigation

A

Collecting personal email information from a company email server

1167
Q

Which of the following is not considered in the calculation of Gross Operating Profit (GOP)

A

Taxes

1168
Q

What is the primary benefit of using Doppler radar systems in environments with slow moving intruders

A

The system detects even minimal frequency shifts caused by slow movements

1169
Q

Which of the following is most likely to improve a company’s current ratio

A

Paying down short term debt

1170
Q

Which of the following types of analysis is most likely to help prioritize the allocation of resources in a security budget

A

Cost benefit analysis

1171
Q

What is the primary advantage of using a multidisciplinary team in investigations

A

Broader range of expertise

1172
Q

What is the primary disadvantage of using physical surveillance in investigations

A

High Cost
Risk of detection

1173
Q

Which of the following is not a rule of thumb for lighting levels in security systems

A

Deterrence - 1.5 foot candles

1174
Q

What characteristic of concertina wire makes it more effective as a perimeter defense than traditional barbed wire

A

It is more rigid, making it harder to manipulate

1175
Q

Which factor directly affects the calculation of threat likelihood in risk management

A

The geographical location of the asset

1176
Q

Which of the following lighting types requires a ballast to regulate the voltage and current supplied to the lamp

A

Metal Hallide

1177
Q

Which of the following is most likely to affect the valuation of intangible assets such as patents and trademarks in a company’s balance sheet

A

The company’s ability to enforce its intellectual property rights

1178
Q

Which management concept is most likely to lead confusion if not properly enforced

A

Unity of command

1179
Q

Which type of sensor is least affected by sudden changes in lighting conditions

A

Microwave sensor

1180
Q

Which factor is most likely to reduce the probability of detection (Pd) in an adversary sequence

A

A low number of detection points

1181
Q

Which of the following most directly affects the calculation of risk in a security environment

A

Vulnerability and criticality of assets

1182
Q

In which environment would an ultrasonic sensor be most effective for detecting movement

A

Indoors with reflective surfaces

1183
Q

Which sensor would be best suited for monitoring entry points in areas prone to significant vibrations such as near railroads

A

Microwave sensor

1184
Q

In what environment would a microwave sensor be the most appropriate for detecting intrusions

A

An outdoor perimeter with significant foliage

1185
Q

Which of the following is best method for reducing the threat level in a security system

A

Implementing proactive detection measures

1186
Q

Why are shielded twister pair cables typically preferred over unshielded twisted paid cables in outdoor perimeter systems

A

The shielding provides better resistance to environmental interference

1187
Q

Which of the following vault designs provides the highest resistance to thermal attacks

A

Composite construction

1188
Q

Which of the following is not consistent with McGregor’s theory X

A

Employees are motivated by intrinsic rewards

1189
Q

Which of the following is least likely to be legal challenge during sting operations

A

Misidentification of the primary target

1190
Q

Which of the following is most likely to provide early detection of potential bomb incidents

A

Canine units specifically trained to detect explosives

1191
Q

Which of the following is most likely to compromise a balanced protection strategy in physical security

A

Over reliance on a single detection system

1192
Q

What is the purpose of calculating the annualized loss expectancy (ALE) in a security risk analysis

A

To estimate the financial impact of a specific threat over a year

1193
Q

Which of the following is not a function of a well developed security policy

A

Guaranteeing total risk elimination

1194
Q

Which of the following combinations would increase the overall risk score for critical infrastructure systems

A

Strong incident detection systems but delayed recovery protocols

1195
Q

What is the key operational limitation of terrain following microwave sensors when deployed in mountainous regions

A

The sensors range is reduced by obstructions from high elevation changes

1196
Q

Which vault door rating indicates protection against mechanical and thermal tools for up to 60 minutes

A

TRTL-60X6

1197
Q

Which lighting technology requires consideration of restrike time when planning security operations

A

HID

1198
Q

Which of the following is most likely to reduce the Probability of Neutralization (Pn) in a security system

A

Poor personnel training

1199
Q

Which of the following scenarios illustrates a weakness in the detect function of a PPS

A

The detection system only activates when the intruder is already inside the asset perimeter

1200
Q

Which of the following types of locks would be the most effective against brute force attacks

A

Electromechanical lock

1201
Q

In risk management, what is the main objective of calculating the Single Loss Expectancy (SLE)

A

To estimate the financial impact of a single security incident

1202
Q

How to volumetric sensors differ from the line detection sensors in terms of coverage area in large, open spaces

A

Volumetric sensors cover three dimensional spaces, while line detection sensors monitor a single axis

1203
Q

Which of the following best describes how the quick ratio differs from the current ratio in financial analysis

A

The quick ratio excludes inventory from current assets, while the current ratio includes it

1204
Q

Which of the following scenarios would not increase the Probability of Detection (Pd)

A

Delayed response time

1205
Q

Which of the following is a major limitation of using suggestive evidence in a criminal investigation

A

It does not conclusively prove guilt or innocence

1206
Q

Which of the following is not a characteristic of passive infrared (PIR) sensor

A

Emits infrared radiation

1207
Q

Which of the following is most likely to be an effective control in minimizing opportunity within Cressey’s Fraud Triangle

A

Conducting surprise audits of financial transactions

1208
Q

Which of the following is most probable to reduce the effectiveness of a security audit

A

Focusing solely on physical security and ignoring cyber risks

1209
Q

For security lighting applications, which lamp type is preferred for its energy efficiency and longer lifespan compared to mercury vapor lamps

A

High pressure sodium

1210
Q

Which phenomenon is most likely to interfere with the operation of monostatic radar in foggy outdoor conditions

A

Signal absorption by water droplets

1211
Q

Why is it important to monitor physical security systems for anomalies in usage patterns

A

Unusual access or use patterns can indicate security breaches or insider threats

1212
Q

Which of the following scenarios would least likely increase the overall threat landscape for critical infrastructure

A

Improving the strength of access control systems

1213
Q

Which of the following is least likely to complicate communication during a crisis involving a natural disaster

A

Disruption of power and communication lines

1214
Q

Which of the following is not a step in the personnel security process

A

Reference check

1215
Q

Which of the following would most likely reduce the effectiveness of a qualitative risk assessment

A

Overreliance on subjective judgement rather than hard data

1216
Q

Which of the following strategies is least effective in reducing the vulnerability of an asset in a high risk environment

A

Increasing asset redundancy

1217
Q

Which of the following is not a characteristic of a strong password policy

A

Mandatory periodic changes

1218
Q

What is the primary difference between a threat and hazard

A

A threat is an intentional act, while a hazard is often a naturally occurring event

1219
Q

Which of the following fencing strategies would provide the best deterrence in a high crime industrial area

A

Single layered wielded wire mesh with inward facing razor wire

1220
Q

What type of privilege is most commonly granted to properly controlled investigative reports

A

Qualified privilege

1221
Q

In risk assessment how does the probability of a hazard differ from the probability of a threat

A

Hazards are less predictable and often have wider impacts than threats

1222
Q

Which type of sensor is most effective for monitoring the interior of a vault for unauthorized access

A

PIR sensor

1223
Q

Which safe design feature enhances resistance to punch attacks targeting the locking mechanism

A

Hard plate protection

1224
Q

What is the biggest challenge when trying to balance personal privacy with the need for comprehensive background investigations

A

Ensuring that private information is collected ethically and legally

1225
Q

Which of the following is most likely to result in the loss of trade secret protection within a company

A

Public disclosure of the trade secret through a patent application

1226
Q

Which of the following is least likely to be required for a business to obtain a patent for a new invention

A

The invention must be kept confidential and not publicly disclosed

1227
Q

Which type of lock system is most appropriate for a facility requiring both physical and electronic security features

A

Dual control lock

1228
Q

In risk management which of the following factors is least likely to reduce the overall probability of loss

A

Increasing asset redundancy

1229
Q

How might an organization reduce the potential for workplace violence during high stress company events such as layoffs

A

By providing access to mental health resources and counselling

1230
Q

How does a terrain following sensor enhance the capabilities of mobile security platforms in uneven geographic areas

A

By maintaining a constant altitude or distance from the ground to avoid obstacles

1231
Q

Which of the following is least likely to contribute the risk education in a high threat environment

A

Reducing the assets value

1232
Q

Which of the following is a critical weakness of using informants in drug related investigations

A

Informants may have ulterior motives that compromise the investigation

1233
Q

Which of the following is most likely to challenge an investigators ability to assess the pressure component of the Fraud Triangle during an interview

A

The interviewee downplay the financial or emotional strain they are experiencing

1234
Q

In financial investigations what is the primary purpose of the currency transaction report (CTR)

A

To report large cash transactions to regulatory authorities

1235
Q

Which of the following is least likely to be considered when classifying information as a trade secret

A

The public availability of information in patent filings

1236
Q

Which of the following is a common technique used in cognitive interviews to enhance recall

A

Visualization

1237
Q

When conducting surveillance why is it important to regularly rotate personnel monitoring a target

A

To avoid detection by the target over time

1238
Q

Which of the following factors is most likely to reduce risk in a high impact low vulnerability situation

A

Improving physical security

1239
Q

Which of the following is the most effective way to reduce the risk of employee theft in a retail environment

A

Limiting access to high value inventory

1240
Q

What three critical questions should a risk assessment aim to anwer

A

What can go wrong? What is the likelihood it could go wrong? What are the consequences?

1241
Q

Which of the following is most likely to complicate the use of return on security investment (ROSI) as a key performance indicator in ESRM

A

Difficulty in predicting non quantifiable risks such as reputational damage

1242
Q

How do environmental considerations affect the selection of security lighting for a wildlife preserve area, where light pollution must be minimized to protect animal habitats

A

Implementing fully shielded fixtures to direct light downwards and prevent spill into the habitat areas

1243
Q

Which of the following is most likely to result in a breach of trade secret protection

A

The trade secret is disclosed in a private meeting without a confidentiality agreement

1244
Q

Which principle of investigation emphasizes the need for investigators to avoid personal biases

A

Objectivity

1245
Q

Why are monostatic infrared sensors less effective in detecting objects at extreme distances in outdoor environments

A

Atmospheric attenuation reduces the range of infrared signals

1246
Q

Which of the following combinations would most likely reduce the overall vulnerability of critical infrastructure

A

Increasing detection systems and enhancing physical security measures

1247
Q

Which of the following factors would most likely reduce the probability of detection (Pd) in a critical infrastructure system

A

Delayed sensor placement and low detection system sensitivity

1248
Q

Which of the following is most likely to cause a company’s intangible assets to be overvalued on its balance sheet

A

Overestimating goodwill in a business acquisition

1249
Q

What is the primary operational challenge of using vibration sensors for underground intrusion detection in rocky terrain

A

High false positive rates due to interference from seismic activity

1250
Q

What is the role of continuous monitoring in business continuity planning

A

To provide early detection of risks that may trigger a crisis

1251
Q

How can executive protection teams mitigate the risk of attacks during public events

A

By coordinating security efforts with local event organizers

1252
Q

Which of the following is least likely to be considered when assigning occupant roles in an emergency plan

A

The hierarchy of the organizational structure

1253
Q

Which of the following is the biggest disadvantage of using metal halide lamps in security lighting applications

A

Long restrike time

1254
Q

Why would a security manager opt for fluorescent lighting in a controlled indoor environment like a data center

A

Because it emits a lower level of heat compared to other lighting types, reducing cooling requirements

1255
Q

What is the primary role of a continuity plan in BCMS

A

Ensuring business operations during disruptions

1256
Q

Which of the following best describes the purpose of combining inductive and deductive approaches in risk anaylsis

A

To create a comprehensive risk profile by evaluating specific causes and potential outcomes

1257
Q

Which of the following is least probable to increase the effectiveness of Protection in depth

A

Decreasing the number of detection sensors

1258
Q

Which of the following cables is most suitable for use in high humidity environments due to its resistance to moisture

A

Fiber optic

1259
Q

Why is it critical to involve legal counsel when conducting personnel risk assessments for high level employees

A

To ensure compliance with local, national and international laws

1260
Q

Which of the following is not a direct measure of liquidity

A

Gross profit margin

1261
Q

What is the primary function of an outer jacket in outdoor rated Cat6 cables used in perimeter security systems

A

To provide resistance to ultraviolet (UV) damage

1262
Q

Which of the following best describes the use of security screening at access points

A

Checking for prohibited items and verifying identities

1263
Q

Which of the following is least likely to appear on an income statement

A

Quick ratio

1264
Q

How does using security lighting with a variable intensity feature benefit a facility with fluctuating operational hours like a theater or concert hall

A

It allows for customization of lighting based on the specific security needs at different times, enhancing both safety and energy efficiency

1265
Q

Which of the following theories suggests that individuals are more likely to commit fraud if they are in environment where unethical behaviour is normalized or accepted

A

Differential association theory

1266
Q

Which of the following is least likely to be challenge in international investigations

A

Conducting surveillance in real time

1267
Q

Which of the following is the most critical component of an effective response layer in PPS

A

The speed with which the threat is neutralized

1268
Q

Which of the following is least probable to be an effective method of setting the value of line items in a budget

A

Setting arbitrary limits on expenditures

1269
Q

Which of the following has the highest strike time, making it less suitable for emergency lighting applications

A

Metal Halide Lamp

1270
Q

Which type of glass provides the highest resistance to penetration but shatters into small blunt fragments upon impact

A

Tempered glass

1271
Q

What is the key advantage of using proximity cards in access control systems

A

Non contact and quick authentication process

1272
Q

Which of the following legal risks is associated with sting operations

A

The suspect could claim entrapment in court
The suspect could destroy key evidence before prosecution
Investigators may in advertently break local laws

1273
Q

How do environmental considerations affect the selection of security lighting for a wildlife preserve area, where light pollution must be minimized to protect animal habitats

A

Implementing fully shielded fixtures to direct light downwards and prevent spill into the habitat areas

1274
Q

What is a key disadvantage of using a laser sensor in outdoor perimeter detection

A

Susceptibility to environmental interference such as rain and fog

1275
Q

How do monostatic infrared sensors compensate for signal degradation caused by environmental factors such as rain or fog

A

By automatically adjusting the sensors detection threshold

1276
Q

The management principle that suggests one supervisor can effectively control a limited number of people is

A

Span of control

1277
Q

In an internal investigation which of the following actions could be considered an ethical violation by the investigator

A

Sharing confidential information with unauthorized individuals
Failing to disclose conflicts of interest
Leading the witness to a particular conclusion

1278
Q

Which of the following is not a characteristic of a thermal imaging sensor

A

Limited to detecting movement in daylight

1279
Q

How does a lower probability of interruption (Pi) affect an adversary’s timeline in a security breach

A

It increases the time adversary has to complete their actions

1280
Q

Which of the following is not a benefit of personnel security programs

A

Increasing operational costs

1281
Q

Which of the following scenarios would most likely reduce the Probability of detection (Pd)

A

Increasing detection system accuracy but reducing the number of personnel

1282
Q

Which of the following is a critical weakness of using suggestive evidence in court

A

It is often dismissed as circumstantial

1283
Q

In a logistics warehouse why are inductance based sensors critical for securing loading docks

A

They can detect unauthorized removal of metal based goods by monitoring changes in the magnetic field

1284
Q

Which of the following is a critical weakness of relying solely on financial records in drug investigations

A

Financial records do not provide evidence for the physical transaction

1285
Q

Which of the following combinations would reduce overall risk in a high criticality system

A

Delayed detection systems but immediate response capabilities

1286
Q

Which of the following best describes the concept of separation of duties

A

Ensuring multiple people are involved in critical tasks

1287
Q

Which of the following is not a common method for verifying the authenticity of a digital signature

A

Encrypting the signed document

1288
Q

Which type of lock mechanism would be most suitable for a facility requiring high levels of resistance to both physical and electronic attacks

A

Dual control lock

1289
Q

Why are wielded wire mesh fences often preferred over chain link fences in correctional facility perimeters

A

They offer higher resistance to cutting and climbing

1290
Q

Which of the following is a weakness of qualitative risk analysis when compared to quantitative methods

A

It does not account for the financial impact of a risk

1291
Q

Which of the following is most likely to improve a company’s current ratio

A

Paying off current liabilities

1292
Q

Which of the following weaknesses is most commonly associated with suggestive evidence in court

A

Suggestive evidence is often used without corroborating physical evidence

1293
Q

Why would a security system in a high traffic public area, like a shopping mall, benefit from integrating volumetric sensors into its surveillance system

A

Volumetric sensors are particularly effective in detecting abnormal behaviours such as running or sudden movements which might indicate a security event

1294
Q

When conducting mobile surveillance why is the use of multiple vehicles an advantage

A

It reduces the likelihood of the target detecting surveillance

1295
Q

When providing executive protection why is it essential to regularly rotate security personnel

A

To reduce the chance of security fatigue and complacency

1296
Q

Which type of sensor would be least effective in detecting intrusions in an area to prone to frequent thunderstorm

A

Infrared beam sensor

1297
Q

What is the primary function of a security badge system

A

To control access to secure areas

1298
Q

How does lighting color temperature influence the effectiveness of security equipped with night vision capabilities

A

Warmer color temperatures enhance night vision capabilities by increasing contrast

1299
Q

What advantages doe the integration of bistatic sensors offer for the detection of UAVs (Unmanned Aerial Vehicles) near critical infrastructure

A

Bistatic sensors can cover a larger airspace volume and provide more accurate altitude data than monostatic sensors

1300
Q

Which of the following techniques is least likely to be effective in obtaining a confession during a REID interrogation

A

Asking the suspect to provide their version of events freely

1301
Q

In a sting operation which tactic is most relevant for ensuring the operations success

A

Recording all conversations between the suspect and the undercover officer

1302
Q

How does DMT differ from other hallucinogens like LSD or psilocybin in forensic investigations

A

DMT has a much shorter distance of effect, complicating detection in toxicology reports

1303
Q

Which technique is most effective for interviewing witness

A

Establishing rapport

1304
Q

What is the biggest challenge in conducting personnel risk assessments for employees in remote work environment

A

Remote employees may have access to sensitive information without direct supervision

1305
Q

Why are fiber optic cables preferred over coaxial cables in high security environments

A

Fiber optic cables offer higher bandwidth for video surveillance systems

1306
Q

Which lock type is more resistant to covert manipulation techniques, including picking an bumping

A

Disc detainer lock

1307
Q

What is the primary advantage of using biometric technologies in security systems

A

High accuracy

1308
Q

Which of the following is most relevant category of evidence in a drug trafficking case involving multiple suspects

A

Physical evidence such as drugs

1309
Q

In a high risk facility what is the primary advantage of using iris scanning technology for access control over fingerprint scanning

A

Iris scans are less suspectable to physical wear and environmental factors

1310
Q

Which of the following best describes the purpose of using a controlled buy in a long term investigation

A

To build a case over time by repeatedly purchasing illegal goods

1311
Q

What is the key consideration when selecting lighting for security purposes in environments where color identification is crucial such as parking lots or warehouses

A

The highest possible color rendering index to ensure accurate color perception

1312
Q

In an outdoor security system, what is the main drawback of using Cat5e cables compared to fiber optic cables

A

Cat5e cables have a lower transmission speed over long distances

1313
Q

How do passive sensors differ from active sensors in their method of detecting intrusions

A

Passive sensors monitor disturbances in the environment without emitting energy, relying on changes caused by intruders

1314
Q

How does the probability of neutralization (Pn) directly affect the probability of success (Ps) in an adversary sequence

A

A higher Pn decreases Ps reducing the likelihood of adversary success

1315
Q

What is the main objective of ESRM

A

Identifying and managing security risks

1316
Q

Which of the following best describes the operation of a mono static radar sensor

A

Transmitter and receiver are located at the same site

1317
Q

Which of the following is not the benefit of using a dual technology sensor in a physical security system

A

Reduced installation complexity

1318
Q

Which of the following best describes the purpose of ROI (Return on investment) analysis when assessing physical security systems such as locks and vault

A

ROI analysis measures the financial benefit derived from investing in physical security relative to the cost

1319
Q

Which of the following is the key principle of perimeter security

A

Deterrence

1320
Q

Which of the following is least likely to be considered when developing a security program for a global organization

A

The organizations leadership structure

1321
Q

Which of the following factors would most likely reduce the probability of detection in a high criticality system

A

Low detection system sensitivity and delayed response protocols

1322
Q

What is the primary purpose of using write blocking technology in digital forensic investigations

A

To main the integrity of the original data

1323
Q

Which of the following cognitive techniques is least likely to be used in high pressure interview setting

A

Free recall of the events without interruptions

1324
Q

Which of the following strategies is least effective in reducing the vulnerability of an asset in a high risk environment

A

Increasing asset redundancy

1325
Q

During a sting operation, what is the primary goal of the decoy

A

To trick the suspect into committing a crime

1326
Q

What is the role of human resources in personnel security

A

Conducting background checks
Enforcing security policies
Training employees on security procedures

1327
Q

The term due diligence refers to

A

The effort made by an ordinarily prudent person to prevent harm to another

1328
Q

In the context of fraud detection which financial ratio is most useful for identifying discrepancies in reported revenues

A

Gross Profit Margin

1329
Q

Which of the following is most likely to compromise the integrity of an encrypted file system

A

Storing encryption keys on the same device as the encrypted data

1330
Q

Which factor most directly influences the likelihood of a threat exploiting a vulnerability

A

The alignment between the threats capabilities and the the assets weaknesses

1331
Q

Which of the following is least likely to be considered an effective fraud prevention strategy addressing all three components of Cressey’s Fraud Triangle

A

Hiring external fraud investigators to monitor employees financial transactions

1332
Q

What is the role of REID technique during the interrogation process

A

It is used to psychologically coerce confessions from suspects by using a confrontational approach

1333
Q

Which of the following is most likely to pose a challenge when coordinating with external partners during a crisis

A

Lack of shared communication channels

1334
Q

What is the most significant risk of relying solely on video surveillance in a physical security investigation

A

It provides only a partial understanding of the suspects activities

1335
Q

Which of the following ratios is least likely to provide insight into a company’s liquidity

A

Return on equity (ROE)

1336
Q

In a threat assessment which factor would most likely reduce the Probability of loss (Pl)

A

Strong recovery protocols and low vulnerability

1337
Q

Which of the following types of sensors is typically used to monitor the presence of people within a specific area based on heat signatures

A

PIR sensor

1338
Q

What is the purpose of security clearance

A

To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions

1339
Q

Which of the following would most likely enhance the delay function in a physical protection system (PPS)

A

Adding additional reinforced barriers between the perimeter and the asset

1340
Q

Which of the following is not a benefit of personnel security programs

A

Increasing operational costs

1341
Q

Which of the following factors is most critical when determining the recovery point objective (RPO) in a disaster recovery plan

A

The criticality of data being recovered

1342
Q

What is the primary function of an investigative audit

A

Verifying the accuracy of financial frauds

1343
Q

Which of the following factors is most critical when selecting KPIs for a security program

A

Alignment with organizational risk tolerance

1344
Q

Which management principle emphasizes the need for each employee to receive orders from only one supervisor

A

Unity of command

1345
Q

Which of the following is not a factor considered in personnel security

A

Criminal history
Financial stability
Education background

1346
Q

Why might a security manager opt to integrate terrain following sensors into the security drone systems used for monitoring large agricultural properties

A

To optimize the flight path for energy efficiency by maintaining a consistent altitude over uneven terrain

1347
Q

What is the purpose a termination process in personnel security

A

To ensure the return of all company property
To revoke access to sensitive information and systems
To conduct an exit interview with the employee

1348
Q

Which type of evidence is most likely to be classified as indicative rather than conclusive

A

Financial discrepancies

1349
Q

Which of the following best describes an escalation of privilege attack

A

A user acquiring more permissions than initially assigned

1350
Q

In the context of laminated glass, how does the interlayer material affect the glass’s performance during ballistic impact

A

It dissipates the kinetic energy of projectiles, reducing penetration

1351
Q

Which lighting feature is essential in high security areas such as military bases, where rapid response to incidents is critical

A

Instantaneous strike times to ensure no delays in case of emergency

1352
Q

In the buy bust operations what is the typical sequence of events

A

An undercover agent buys drugs from a dealer and immediately arrest the dealer

1353
Q

Which of the following is least probable to be an effective method of setting the value of line items in a budget

A

Setting arbitrary limits on expenditures

1354
Q

What factor is least likely to reduce the probability of interruption (Pi)

A

Increased detection system accuracy

1355
Q

Which of the following is most likely to provide justification for actions taken during a crisis response

A

Detailed records of threat evaluation deliberations

1356
Q

What is the primary disadvantage of using mechanical locks in high security environments

A

Susceptibility to picking and bumping

1357
Q

Which statement about the relationship between threat, hazard and risk is most accurate

A

Hazards can exist independently or risk, but threats cannot

1358
Q

Which type of light would be most appropriate for a security setting where rapid identification of individuals is necessary such as at a bank entrance

A

LED lamps

1359
Q

Which type of vault construction material offers the highest level of fire resistance

A

Reinforced concrete

1360
Q

In CPTED which of the following strategies best represents the principle of maintenance

A

Keeping fences and barriers in good repair

1361
Q

What role does a microwave sensor play in perimeter security systems and why is it preferred in high security systems

A

It is less prone to false alarms from small animals and environmental factors due to it operational frequency

1362
Q

Which of the following is least likely to affect the ROI (Return of investment) of an advanced physical security system designed for a financial institution

A

The speed of the restrike time for the security lighting system

1363
Q

How does the presence of multi luminate polycarbonate layers in bullet resistant glass effect its overall performance in security applications

A

It provides additional flexibility allowing the glass to absorb more kinetic energy from projectiles

1364
Q

Which of the following is least likely to be considered evidence under strict chain of custody guidelines

A

A report handwritten by the investigator during the incident

1365
Q

In the context of fault tree analysis which of the following represents an intermediate event

A

An event that results from one or more basic events

1366
Q

In Herzberg’s Motivation Theory which of the following is considered a hygiene factor rather than a motivator

A

Job security

1367
Q

Which feature is essential for high security doors

A

Reinforced construction

1368
Q

How might an organization reduce the potential for workplace violence during high stress company events, such as layoffs

A

By providing access to mental health resources and counselling

1369
Q

What is the purpose of personnel security

A

To protect classified information
To ensure employee satisfaction
To maintain a safe work environment

1370
Q

Which of the following is least likely to be impacted by the strike time of a high intensity discharge (HID) lamp in a security lighting system

A

The overall energy consumption of the lighting system

1371
Q

What is the most common method used by bypass poorly installed vault doors

A

Penetration through the floor

1372
Q

What is the typical restrike time for a high pressure sodium lamp after a momentary power interruption

A

3-4 minutes

1373
Q

Which lamp type is best known for its high color rendering index (CRI) making it ideal for indoor applications requiring accurate color distinction

A

LED

1374
Q

Which of the following is most likely to invalidate the results of a polygraph test

A

The use of countermeasures by the suspect

1375
Q

In criminal investigations involving organized crime, why is it crucial to use asset forfeiture as a tactic

A

To disrupt the financial operations of the criminal organization

1376
Q

Which of the following statements is not true regarding narcotics

A

They tend to intensify vision and increase alertness

1377
Q

Which of the following is least relevant when selecting key metrics to evaluate the performance of a security program

A

The number of incidents reported

1378
Q

Which of the following is most probable to be considered a violation of privacy laws in a workplace investigation

A

Collecting personal email information from a company email server

1379
Q

In CPTED which of the following is most likely to deter potential intruders by influencing their behaviour

A

Clear lines of sight

1380
Q

Which of the following is least probable to be direct outcome of increasing surveillance systems

A

Improved perimeter protection against cyber threats

1381
Q

Which of the following is least likely to affect the ROI (Return on investment) of an advanced physical security system designed for a financial institution

A

The speed of the restrike time for the security lighting system

1382
Q

What is the most significant vulnerability of a safe with a mechanical combination lock

A

Susceptibility to manipulation

1383
Q

Which of the following is least probable to improve the deter function in a security system

A

Adding covert detection systems

1384
Q

What is the most effective counter measure to avoid being tracked via digital surveillance tools

A

Avoiding interaction with digital networks entirely

1385
Q

Which of the following is true of Herzberg’s two factor theory

A

Hygiene factors prevent dissatisfaction but do not increase satisfaction

1386
Q

Which of the following is most likely to reduce the strike time of metal halide lamps in a high security perimeter lighting system

A

Installing pulse start ballasts for more efficient ignition

1387
Q

Which type of evidence is least reliable when investigating a hostile witness

A

Character evidence

1388
Q

How can investigators use call detail records (CDRs) during a criminal investigation

A

To track the location and time of suspect’s phone activity

1389
Q

Security barrier purpose

A

Obstruct Access
Deterrent

1390
Q

In budgeting, what is the primary benefit of zero based budgeting (ZBB)

A

ZBB requires that all expenses be justified for each new period, helping organizations eliminate waste and focus on strategic priorities

1391
Q

Which of the following is least probable to be part of an effective deterrent strategy

A

Covertly monitoring employees activities

1392
Q

Which of the following is the primary goal of a business impact analysis (BIA) in business continuity plan (BCP)

A

Evaluating the financial impact of potential distruptions

1393
Q

Which of the following best describes the primary item of expense in an investigations budget

A

Communications

1394
Q

Which of the following is the primary weakness of using an event tree analysis in risk assessments

A

It only considers a linear progression of events

1395
Q

Which factor most influences the fire rating of a high security safe

A

Type of insulation material

1396
Q

Which sensor type would be least effective in detecting intruders in a heavily wooded areas

A

Microwave Sensor

1397
Q

Which of the following is most likely to provide justification for actions taken during a crisis response

A

Detailed records of threat evaluation deliberations

1398
Q

How can integrating alarm systems with access control improve over all security

A

By triggering an automatic lockdown when unauthorized access attempts are detected

1399
Q

What is the main function of a perimeter intrusion detection system (PIDS)

A

To detect and alert security personnel to breaches the perimeter

1400
Q

In the context of vulnerability assessment what is the main purpose of identifying an assets criticality

A

To evaluate the impact on operations if the asset is compromised

1401
Q

Which of the following is not a common method of ensuring confidentiality

A

Data replication

1402
Q

What is the purpose of pre employment screening process in personnel security

A

To determine an individuals potential for misconduct

1403
Q

In CPTED what is the primary goal of access control

A

To reduce criminal behaviour by influencing movement patterns

1404
Q

Which of the following factors is least likely to reduce risk in a high threat, low impact situation

A

Increasing the assets value

1405
Q

Which of the following is most relevant when determining the effectiveness of a physical protection system

A

Probability of detection (Pd)

1406
Q

Which of the following is a key challenge in the implementation of wireless security systems

A

Signal interference and reliability

1407
Q

Which of the following is most likely to affect the credibility of an investigative report

A

Accuracy of the details provided

1408
Q

Which of the following is least likely to be considered in calculating a company’s quick ratio

A

Inventory of raw materials waiting to be used in production

1409
Q

Which of the following techniques is most suitable for evaluating the effectiveness of existing deterrence measures

A

Qualitative risk analysis

1410
Q

Why might a security team in a high end retail environment prefer capacitance based sensors over traditional surveillance cameras

A

Capacitance sensors can detect even the slightest touch or proximity useful for high value items that should not be handled

1411
Q

Which of the following factors is most critical for ensuring the effectiveness of a risk mitigation strategy

A

Alignment with organization risk tolerance

1412
Q

What is the most significant disadvantage of using a time lock system on a high security safe

A

Reduced access during emergencies

1413
Q

Which of the following is not a step in the personnel security process

A

Social media monitoring

1414
Q

Which of the following types of witness is least likely to cooperate during an investigation

A

Hostile witness

1415
Q

Which of the following is not a common method of ensuring data confidentiality

A

Data replication

1416
Q

Which of the following is least likely to be an advantage of using electronic locks over traditional mechanical locks in physical security applications

A

The higher level of physical durability and resistance to forced entry

1417
Q

Which combination of factors is most likely to improve employee satisfaction, according to Herzberg’s theory

A

Improved working conditions and career advancement

1418
Q

According to Herzberg’s two factor theory which of the following is a motivator rather than a hygiene factor

A

Achievement

1419
Q

Which of the following is most likely to be used as a method to prevent unauthorized data recovery from sanitized electronic media

A

Degaussing using strong magnetic fields

1420
Q

Which of the following is least likely to be long term consequence of failing to integrate ESRM with overall business strategy

A

Increased collaboration between security teams and business units

1421
Q

Which type of lamp has a restrike time longer than 10 minutes after power failure

A

Metal halide lamp

1422
Q

Which of the following is an advantage of time locking mechanisms on safes in high security environments

A

Prevents access during non programmed hours

1423
Q

Which of the following is not considered on one of the five main ways to classify exterior intrusion sensors

A

High sensitivity and low sensitivity

1424
Q

In a large decentralized organization which factor presents the greatest challenge to standardizing crisis management protocols across multiple locations

A

Cultural differences influencing risk perception

1425
Q

Which of the following is most likely to be a challenge in managing both digital and physical security risks under the ESRM framework

A

Establishing a consistent risk rating methodology for both digital and physical assets

1426
Q

Which of the following factor is most critical when determining asset vulnerability in a risk management framework

A

The effectiveness of existing security measures

1427
Q

In a fraud investigation which of the following is not a common type of documentary evidence

A

Eyewitness testimony

1428
Q

Which of the following is most likely to be protected by a design patent

A

The ornamental design of a product

1429
Q

Which of the following is most likely to be key element in ISO 27002 guidance for information security policies

A

A statement of management intent and objectives

1430
Q

In laminated glass, how does the thickness of the interlayer affect its ballistic resistance properties

A

Thicker interlayers improve the glass’s ability to disperse kinetic energy from bullets

1431
Q

Which design feature in a vault door enhances resistance to crowbar attacks

A

Recessed door

1432
Q

Which of the following is least likely to increase motivation according to Maslow’s hierarchy

A

Higher pay

1433
Q

In the context of the PEACE model what does the account phase entail

A

Allowing the suspect to tell their story uninterrupted

1434
Q

What considerations should be made when installing security lighting in areas with high pedestrian traffic, such as city squares or public parks

A

Lighting should be sufficient to ensure visibility but designed to minimized glare and light spillage to avoid discomfort to pedestrians

1435
Q

When monitoring communications during an investigation, how might investigators detect counter surveillance tactics

A

Frequent changes in communication devices or platforms

1436
Q

Which material is most commonly used to reinforce vault doors to prevent drilling attacks

A

Boron carbide

1437
Q

In the context of the PEACE model, what does account refer to

A

Allowing the suspect to tell their story uninterrupted

1438
Q

What is the main criticism of using narco analysis as an investigative tool

A

Results are often inconsistent and unreliable
It is not recognized as a legal technique in most countries

1439
Q

Which type of cable is most vulnerable to eavesdropping in high security environments

A

Coaxial

1440
Q

Which factor is least likely to reduce an assets overall risk

A

Improving recovery protocols but delaying detection systems

1441
Q

Which safe design is most resistant to prying attacks

A

Safe with recessed doors

1442
Q

Which of the following management concepts deals with the number of subordinates directly reporting to a supervisor

A

Span of control

1443
Q

Which type of lock typically requires the least maintenance in outdoor environments

A

Mechanical combination lock

1444
Q

Which of the following best describes the process of deductive risk assessment

A

Determining potential consequences of a failure and tracking back to root causes

1445
Q

How might adversaries exploit weakness in multi tenant building security to gain unauthorized access

A

By using social engineering techniques to gain access through shared entrances

1446
Q

How can failure to property train staff for crisis scenarios undermine a well developed continuity plan

A

Employees may fail to execute their roles effectively leading to confusion
It increases the potential for human error in communication

1447
Q

Which of the following is most likely to be considered a critical factor in determining whether an asset is classified as tangible or intangible in accounting

A

Whether the asset can be physically touched or measured

1448
Q

What is the key advantage of a combination lock in high security vaults

A

It does not required electricity to function

1449
Q

Which of the following is an example of physical deterrent in security systems

A

Warning signs

1450
Q

The detect function in a PPS is least effective when

A

The detection system fails to trigger alarms in real time

1451
Q

Which metric best describes the Probability of Interruption (Pi) in and adversary sequence diagram

A

The chance that security forces will interrupt an adversarys action before harm

1452
Q

Which of the following management theories emphasizes the importance of intrinsic rewards in motivating employees

A

Herzberg’s two factor theory

1453
Q

Which of the following is a strength of using undercover officers in sting operations

A

They provide direct access to suspects criminal activities

1454
Q

Which of the following is not a typical indicator of fraudulent activity in financial statements

A

Regular audit adjustments

1455
Q

Which of the following best reflects the principle of opportunity within Cressey’s fraud triangle when investigating a case involving embezzlement

A

The suspect had access to financial systems due to a lack of oversight

1456
Q

What is the main risk associated with the use of sting operations in narcotics investigations

A

They may involve entrapment leading to dismissed cases

1457
Q

Which of the following is not a common method for risk mitigation in ESRM

A

Conducting financial audits

1458
Q

Which of the following best describes the concept of a honeypot in cybersecurity

A

A decoy system used to attract and monitor attackers

1459
Q

What is the key outcome of identifying a threat vector in security planning

A

It highlights potential pathways through which vulnerabilities could be exploited increasing risk

1460
Q

Which of the following factors is most likely to undermine the credibility of a paid informant in a sting operation

A

The informant is paid their testimony

1461
Q

Which of the following is not a benefit of using thermal imaging cameras for perimeter security

A

Lower cost compared to visible light cameras

1462
Q

Which of the following best explains the relationship between vulnerability and criticality in security risk analysis

A

Criticality determines the priority of mitigating vulnerabilities

1463
Q

What combination of factors would result in the highest overall risk score in a critical infrastructure system

A

Delayed detection systems and weak recovery protocols

1464
Q

What is the purpose of personnel security

A

To protect classified information
To ensure the integrity of the organization
To prevent unauthorized access

1465
Q

Which CPTED principle focuses on increasing community involvement to prevent crime

A

Territorial reinforcement

1466
Q

What is the main disadvantage of using symmetric encryption

A

Complexity of key management

1467
Q

Which of the following is not one of the five IS infrastructure management countermeasures

A

Encryption of all data at rest

1468
Q

Which of the following is least likely to complicate the recovery phase of crisis management

A

Lack of media involvement in post crisis reporting

1469
Q

Which of the following best describes a baghead operation in drug related investigations

A

Interviewing a suspect while concealing their identity to avoid retaliation

1470
Q

Which of the following is not typically factored into the calculation of Net Operating Profit (NOP)

A

Interest payments on debt

1471
Q

Which of the following statements is not accurate in the context of criticality in security risk assessments

A

Criticality is directly related to the likelihood of a threat

1472
Q

Which of the following is most likely to be considered the main application of bistatic microwave sensors in exterior protection

A

Detecting human beings crawling or rolling on the ground

1473
Q

In inductive risk assessments, the focus is on

A

Broadly assessing potential outcomes based on specific observed data

1474
Q

Which of the following is not typically in a forensic report

A

Interviewee list

1475
Q

Which of the following is most likely to pose a challenge in patch management for IS infrastructure

A

The use of outdated legacy systems in the network

1476
Q

Which of the following is not a benefit of using access control systems

A

Reducing security costs

1477
Q

In the context of security sensors what is a false alarm

A

An alarm triggered without any actual threat or intrusion

1478
Q

What is the typical restrike time for a metal halide lamp in security lighting applications

A

5-10 minutes

1479
Q

What is the primary purpose of a sting operation

A

Evidence gathering

1480
Q

In a fault tree analysis which of the following best represents a basic event

A

An event with no further explanation required

1481
Q

Which of the following is most likely to result in a successful buy bust operation

A

Ensuring the suspect is unaware of the undercover officers identity

1482
Q

Which of the following is not a factor in calculating Net Operating Profit (NOP)

A

Financing costs

1483
Q

Which of the following factors would decrease the probability of success (PoS) for an adversary targeting high criticality assets

A

Delayed detection systems but immediate response protocols

1484
Q

Why is single mode fiber optic cable typically used in perimeter security systems requiring long distance coverage

A

Its offers better signal integrity over long distances

1485
Q

What makes active infrared sensors ideal for boundary protection in rural estates

A

They can create a invisible fence that when broken by wildlife or humans, triggers and alert

1486
Q

Which of the following factors is least relevant when conducting a cost benefit analysis for security investigation

A

Increased operational efficiency

1487
Q

Which of the following is not a typical characteristic of a forensic investigation report

A

Subjectivity

1488
Q

Which sensor type is most effective at detecting slow, deliberate movements in a confined indoor space

A

PIR sensor

1489
Q

Which of the following is most likely to undermine the credibility of an eyewitness

A

The eyewitness experienced memory distortion due to high stress

1490
Q

Which combination of factors most directly impacts the Probability of neutralization (Pn) in a layered security system

A

Adversarys skill level and the time delay

1491
Q

Which of the following is least likely to be trigger for the pressure component in an employee committing fraud

A

Opportunity presented by weak internal controls

1492
Q

What is the principal benefit of using active infrared sensors for an art gallery’s security system

A

They ensure continuous monitoring even in total darkness without relying on external light sources

1493
Q

In security risk management which of the following can decrease risk without reducing threat levelss

A

Implementing more robust physical barriers
Reducing asset exposure by limiting accessibility

1494
Q

How might background investigators verify the legitimacy of a candidates self employment history

A

By contacting clients or partners listed by the candidate as references

1495
Q

Which of the following environmental factors is most likely to cause interference in a PIR sensors detection capability

A

Rapid temperature fluctuations

1496
Q

Which sensor technology would be most appropriate for detecting an unauthorized vehicle entering a restricted area

A

Inductive loop sensor

1497
Q

What is the key purpose of physical surveillance in an investigation

A

To monitor a suspects activities without their knowledge

1498
Q

In the CARVER method which factor determines how easily an adversary can identify a target

A

Recognizability

1499
Q

Which of the following is least relevant when analyzing witness credibility in a drug trafficking case

A

The witness’s criminal history

1500
Q

What is the primary role of a continuity plan in BCMS

A

Ensuring business operations during disruptions
Enhancing financial performance

1501
Q

Which of the following is least probable to be an effective method of setting the value of line items in a budget

A

Setting arbitrary limits on expenditures

1502
Q

Which of the following investigative methods is most likely to be used in a covert investigation of internal theft

A

Undercover operation

1503
Q

Which of the following would not likely reduce an assets vulnerability

A

Decreasing the assets criticality

1504
Q

How might adversaries exploit from lighting deficiencies around a facility

A

By using shadows to avoid detection and conceal movement

1505
Q

In risk assessment which factor is most critical when evaluating a hazard

A

Its potential impact

1506
Q

Which of the following is not considered in the calculation of Earnings before Interest, Taxes, Depreciation and Amortization (EBITDA)

A

Tax obligations

1507
Q

Which of the following is the best approach for determining the delay time needed in a PPS

A

The combined time of detection, communication and response

1508
Q

Which of the following is a primary weakness of using physical evidence such as seized drugs in a court case

A

It may be mishandled leading to contamination

1509
Q

What is the main reason high pressure sodium lamps are often preferred for outdoor security lighting despite their low CRI

A

Long lifespan

1510
Q

Which of the following is an example of current asset

A

Accounts receivable

1511
Q

Which combination of factors is most likely to increase overall risk

A

High threat likelihood and high vulnerability

1512
Q

Which sensor technology is most likely to experience false alarms caused by moving tree branches

A

PIR Sensor

1513
Q

Which of the following sensor would be most vulnerable to interference from heavy rain or snow

A

Infrared beam sensor

1514
Q

Which of the following best describes the impact of the quick ratio on a company’s financial strategy

A

A higher quick ratio indicates better short term liquidity which may allow the company to take on more short term debt

1515
Q

Which type of sensor would be most effective in detecting underwater movements

A

Ultrasonic sensor

1516
Q

Which of the following is least likely to be a factor in determining the serverity of a crisis

A

The number of personnel involved in the response

1517
Q

Which of the following types of safes is typically used to protect high value asset in retail environments

A

Cash drop safe

1518
Q

What is the average lifespan of a low pressure sodium lamp

A

24000 Hours

1519
Q

Which of the following is most likely to increase the Return on investment (ROI) for a security project

A

Decreasing operating costs without impacting security performance

1520
Q

Which of the following is least probable to occur during an insider threat incident

A

Complete destruction of physical infrastructure

1521
Q

What is the main purpose of a sting operation

A

To gather evidence
To deter future crimes

1522
Q

Which combination of factors would most likely lead to employee motivation according to Herzberg

A

Recognition and opportunities for growth

1523
Q

How can forensic linguistics assist in the analysis of written or spoken evidence

A

By comparing communication patterns to know suspects

1524
Q

What is the main difference between the PEACE model and the REID technique

A

PEACE focus on fact finding while REID focuses on eliciting confessions
REID involves direct accusation while PEACE avoids them
PEACE is more appropriate for witness interviews while REID is designed for suspects

1525
Q

Which of the following best describes the purpose of a forensic analysis

A

Analyzing evidence in a laboratory setting

1526
Q

Which of the following is most likely to be considered a violation of investigative ethics

A

Coercing a suspect into confessing by threatening legal action

1527
Q

Which of the following is most likely to invalidate surveillance footage presented in court

A

The footage contains gaps where the camera lost power

1528
Q

What is the purpose of conducting background checks in personnel security

A

To identify potential risk or threats

1529
Q

Which of the following is least likely to be a challenge in aligning ESRM with an organizations cybersecurity strategy

A

Adopting the latest cybersecurity technologies without integrating them with existing systems

1530
Q

Which lamp type has a warm up period that may require 10 minutes before full brightness is achieved

A

Low pressure sodium

1531
Q

Which of the following sensors is least likely to be affected by high winds

A

Seismic sensor

1532
Q

What is the primary purpose of a security clearance

A

To grant access to classified information

1533
Q

Which combination of factors is most likely to improve employee satisfaction according to Herzberg’s two factor theory

A

Recognition and opportunities for personal growth

1534
Q

In what scenario would a volumetric sensor provide a security advantage over line detection sensors

A

When monitoring, large, open spaces where intrusions can occur from multiple directions

1535
Q

Which type of sensor would be most effective in detecting the movement of metallic objectives such as vehicles over a defined areas

A

Magnetic loop sensor

1536
Q

What is the key difference between adversary interruption and neutralization and neutralization in security planning

A

Interruption refers to detection, while neutralization refers to stopping the adversary

1537
Q

What is the most significant challenge in using smart locks as part of a facilities access control strategy

A

Smart locks can be susceptible to hacking or signal jamming, compromising access control

1538
Q

Which of the following is most likely to increase the likelihood of fraud occurring in an organization, according to the Fraud Triangle

A

Weak organization culture and lack of ethical leadership

1539
Q

Which of the following is most likely to provide justification for actions taken during a crisis response

A

Detailed records of threat evaluation deliberations

1540
Q

Which of the following types of sensors is typically used to detect large, moving metallic objects like vehicles

A

Inductive loop sensor

1541
Q

Which factor most directly influences the Probability of Interruption (Pi) in a security system

A

The response time of security personnel after detection

1542
Q

What is a controlled hire in corporate investigations

A

An undercover employee hired to investigate corporate fraud while remaining covert

1543
Q

Which factor most influences an assets criticality in risk management

A

The assets contribution to key operations processes

1544
Q

Which of the following is the most significant indicator of a potential workplace violence threat

A

An employee who isolates themselves and displays sudden changes in behaviour

1545
Q

Which sensor type uses ultrasonic sound waves to detect movement or intrusion

A

Ultrasonic sensor

1546
Q

How does the installation of razor wire as part of a double barrier perimeter system improve its security

A

Razor wire is installed between the two barriers, creating a no mans land

1546
Q

Walls, Ceilings, and floors of vaults should never be less than ____ inches thick

A

10

1547
Q

What is the primary purpose of a chain of custody in an investigation

A

To document the timeline of the investigation
To ensure evidence integrity

1548
Q

Which of the following is an advantage of microwave sensors over PIR sensors

A

Fewer false alarms in temperature sensitive environments

1549
Q

Which of the following is not commonly used method for determining the effectiveness of a PPS

A

Calculating the return on investment (ROI) for security measures

1550
Q

In Herzberg’s motivation hygiene theory, which of the following factors is least likely to result in job dissatisfaction if absent

A

Personal growth

1551
Q

What is the key advantage of a digital lock over a traditional mechanical lock in vault applications

A

It requires no physical keys

1552
Q

Which type of witness is least likely to provide reliable information in a high stress situation such as a robbery

A

Eyewitness

1553
Q

Which investigative technique is most likely to identify previously undetected financial transaction in a fraud cause

A

Forensic accounting

1554
Q

Which of the following best describes the term volatility in the CARVER method

A

The likelihood of an assets value fluctuating

1555
Q

Which of the following is least likely to be a challenge in aligning ESRM with an organizations cyberssecurity strategy

A

Adopting the latest cybersecurity technologies without integrating them with existing systems

1556
Q

What is the primary function of strike times in relation to vault door systems in high security installations

A

Strike times indicate the resistance of a vault door to multiple forced entry attempts

1557
Q

Which of the following best describes the concept of data at rest

A

Data currently stores in databases or file systems

1558
Q

What three critical questions should a risk assessment aim to answer

A

What can go wrong? What is the likelihood it could go wrong? What are the consequences?

1559
Q

Which standard is most commonly used to rate the strength and security of padlocks

A

BS EN 1303

1560
Q

Which of the following is not a method of employee monitoring

A

Job performance reviews

1561
Q

Which of the following is the most conclusive type of evidence when proving intent in a drug trafficing case

A

Financial records

1562
Q

Which of the following is not a principle of Balanced Protection

A

Ensuring equal levels of protection for all assets

1563
Q

Which of the following is most likely to provide justification for actions taken during a crisis response

A

Detailed records of threat evaluation deliberations

1564
Q

Which of the following legal defences is most commonly used in response to cold hire investigations

A

Entrapment

1565
Q

Which of the following is an example of mechanical access control

A

Deadbolt lock

1566
Q

How do bistatic sensors enhance the security of a large perimeter such as an industrial complex

A

By allowing for the placement of transmitters and receivers at strategic points, increasing the detection zone

1567
Q

Which type of lock is most commonly used for securing access to vaults in high value facilities, combining ease of use with high security

A

Electronic combination lock

1568
Q

What is the main challenge when analyzing audio recordings in a noisy environment during an investigation

A

Audio enhancement software may be unable to filter background noise effectively

1569
Q

Which of the following is least likely to improve the response function in a PPS

A

Installing advanced intrusion detection systems

1570
Q

Which of the following is most likely to hinder ESRMs effectiveness in a rapidly evolving threat landscape

A

Lack of flexible risk management processes

1571
Q

Which of the following is most likely to result in the invalidation of a trademark

A

The trademark is not used in commerce for an extended period

1572
Q

________ is a thorough physical examination of a facility and its systems and procedures conducted to assess the current level of security, locate deficiencies, and gauge the degree of protection required

A

Security survey

1573
Q

Which of the following security measures is most effective for protecting high value physical assets in a corporate environment

A

Access control using biometric identification

1574
Q

Which of the following is not a common personnel security control measure

A

None of the above
(Background checks, Security clearances, Physical access controls)

1575
Q

In narcotics investigations what make methamphetamine labs particularly hazardous

A

Meth labs often use volatile chemicals that can cause explosions, making them dangerous to approach

1576
Q

Which of the following would most likely reduce the effectiveness of a fault tree analysis

A

Incorrectly identifying the root cause of analysis

1577
Q

Which of the following is least likely to influence the ROI of a physical security system involving biometric locks

A

The number of manual override mechanisms for the lock system

1578
Q

Which of the following is least probable to cause nuisance alarms for bistatic microwave sensors

A

Temperature changes between day and night

1579
Q

Which of the following types of evidence is least likely to be used to prove intent in a criminal investigation

A

Testimony from an expert witness

1580
Q

Which sensor would be the most appropriate for monitoring activity inside a highly restricted vault

A

Seismic sensor

1580
Q

In which environment would PIR sensor be least effective

A

Environments with rapidly changing temperatures

1581
Q

Which of the following is not a potential threat to personnel security

A

Social engineering
Insider Threats
Physical Security Breaches

1582
Q

How does the adversary sequence diagram help in determining the effectiveness of security response measures

A

By visualizing potential adversary actions and response timings

1583
Q

Which of the following is least likely to be a critical element in crisis management raining exercises

A

Updating crisis management plans in real time

1584
Q

What is the primary purpose of a locks cam mechanism

A

To retract the bolt

1585
Q

What challenge must be considered when deploying microwave sensors in an urban environment

A

The potential for the microwave signals to interfere with local Wi-Fi networks

1586
Q

Which of the following is not a common financial ratio used to assess a company’s profitability

A

Quick Ratio

1587
Q

Which of the following is not a benefit of biometric authentication

A

Low Cost

1588
Q

______ is used to compare the desirable of different ways of spending

A

Return on investment

1589
Q

Which of the following scenarios represents a deductive approach in a risk assessment

A

Starting with specific event and tracking all possible outcomes

1590
Q

What is the most significant challenge of using unmanned aerial vehicles (UAVs) for physical security in large facilities

A

UAVs have limited battery life, reducing their effectiveness for continuous surveillance

1591
Q

In disaster recovery what is the key purpose of the recovery point objective (RPO)

A

To define the acceptable amount of data loss in terms of time

1592
Q

Which of the following is most likely to be a challenge in executing a business continuity plan (BCP)

A

Gaps in employee crisis training

1593
Q

What is the purpose of a personnel security risk assessment

A

To identify vulnerabilities and threats

1594
Q

Which of the following lamps is best suited for environments requiring high intensity, uniform light distribution

A

Metal Halide

1595
Q

In the formula Risk = Cube root of (Threat x Vulnerability x Impact), which factor can be reduced to have the greatest effect on overall risk

A

Vulnerability

1596
Q

How does beam divergence in laser sensors affect the accuracy of long range perimeter security systems

A

Greater divergence increase detection range but reduces precision

1597
Q

Which type of sensor is most effective at detecting an intruder who remains stationary for an extened period

A

Ultrasonic sensor

1598
Q

What is the primary advantage of using microwave sensors in perimeter security

A

Less affected by weather conditions

1599
Q

Which of the following sources of information is not typically considered part of the investigative process

A

A record
A custodian of record
A public official

1600
Q

Which of the following is not a liability

A

Accounts payable

1601
Q

In a museum setting, how does the use of inductance based sensors complement the security provided by CCTV cameras

A

Inductance sensors can detect unauthorized removal of metallic artifacts, which may not be visible on camera

1602
Q

Which of the following characteristics is most important in ensuring that a vaults locking mechanism is resistant to tampering

A

UL 768 compliance

1603
Q

Which of the following is not a recommended feature for effective lighting in perimeter security

A

Motion sensor activated lighting to minimize operational units

1604
Q

How might an intrusion detection system (IDS) be circumvented in a high security facility

A

By exploiting areas where sensors have not been installed

1605
Q

Which lock mechanism is least susceptible to impressioning techniques

A

Disc Detainer lock

1606
Q

When conducting pre employment background checks , the most important information collecting tool is

A

The interview

1607
Q

Which type of sensor is most effective in detecting intruders in complete darkness

A

Thermal imaging sensor

1608
Q

Which of the following is not a factor considered in personnel security

A

None of the above
(Criminal history, Financial stability, Educational background)

1609
Q

Which of the following combinations would increase the likelihood of a successful attack on critical infrastructure

A

Strong detection capabilities but slow response times

1610
Q

What is the primary purpose of installing anti pass back systems in access control

A

To prevent employees from sharing their access cards

1611
Q

In physical security design why is it important to conduct a threat analysis specific to the facilitiys industry

A

Different industries face unique risks and require tailored security measures

1612
Q

Which of the following is most likely to improve the overall detection capability of a physical protection system (PPS)

A

Installing additional intrusion detection sensors in vulnerable areas

1613
Q

Which of the following factors is most likely to increase the overall threat landscape in an organization

A

Reducing the number of physical barriers around assets

1614
Q

Which of the following is not considered an advantage of using inductive risk analysis methods

A

They allow for a detailed assessment of asset vulnerabilities

1615
Q

Which of the following investigative resources is most likely to provide information on regulations of common carriers interstate commerce or railroad accidents

A

Interstate commerce commission

1616
Q

Which of the following is most likely to be classified as intellectual property under US Law

A

A software program developed by a company for internal use

1617
Q

Which lamp is known for having poor performance in cold temperatures, making it unsuitable for outdoor security lighting in cold climates

A

Compressed fluorescent

1618
Q

Which of the following is least likely to be considered conclusive evidence in an embezzlement case

A

Eyewitness testimony from coworkers

1619
Q

Which of the following components of the REID technique might increase the risk of false confessions

A

Offering the suspect a moral justification
Presenting false evidence

1620
Q

Which of the following best describes the operation of a thermal imaging sensor

A

Detects changes in temperature within a defined area

1621
Q

Which of the following is a key component of a security incident response plan

A

Training employees on communication protocols

1622
Q

What is the primary advantage of using motion activated security lighting in residential areas

A

It reduces light pollution and energy consumption while maintaining security by illuminating only when needed

1623
Q

In the adversary sequence diagram, what impact does a longer time delay have on the Probability of Success (Ps) of an adversary

A

It decreases Ps giving security forces more time to neutralize the threat

1624
Q

What is the principal drawback of using keypad lock in high security environments

A

Susceptibility to wear patterns revealing the code

1625
Q

Which of the following is not a method of digital evidence preservation

A

Data compression

1626
Q

Which of the following is least likely to be an effective method for handling hostile witnesses

A

Using confrontational techniques to force answers

1627
Q

Which key component in a pin tumbler prevents the lock from opening without the correct key

A

Driver pin

1628
Q

Which of the following is a critical consideration when designing a secure access control system for a data center

A

Reliability and and redundancy of access control mechanisms

1629
Q

How does tempered glass differ from laminated glass in terms of its reaction to impact

A

Tempered glass breaks into small, blunt fragments, while laminated glass cracks but remains intact

1630
Q

Which of the following is a key principle of information security

A

Expense

1631
Q

Which of the following sensor types would be most appropriate for detecting vehicles approaching a secured facility

A

Magnetic sensor

1632
Q

What is the primary goal of a security policy

A

Defining acceptable use of resources

1633
Q

________ is a set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, services and processes

A

A standard

1634
Q

Which of the following is a recommended best practice when investigating allegations of workplace misconduct

A

Document every step of the investigation in detail

1635
Q

In access control systems, which of the following is considered a dual factor authentication method

A

card reader and fingerprint scan

1635
Q

Which of the following is a key vulnerability of monostatic infrared sensors

A

Susceptibility to dust and fog interference

1636
Q

Which of the following is most probable to reduce the overall risk exposure for an organization

A

Developing contingency plan for high risk assets

1637
Q

Which of the following is most likely to be compromised by an advanced persistent threat (APT)

A

High value targets such as government agencies and financial institutions

1638
Q

Which of the following is least likely to be considered when determining the fair market value of a patent

A

The cost of acquiring the patent from the original inventor

1639
Q

Which of the following combinations would increase the probability of interruptions (PoI) for an adversary attack on critical infrastructure

A

Increasing physical barriers and improving detection systems

1640
Q

In a fraud investigation, which tool is most effective for tracing illicit transactions across multiple jurisdictions

A

Data analytics

1641
Q

In criminal investigations involving organized crime, why is it crucial to use asset forfeiture as a tactic

A

To disrupt the financial operations of the criminal organization

1642
Q

Which of the following is the most effective method of reducing risk when a high threat asset is involved

A

Implementing layered physical security

1643
Q

Which of the following is not a benefit of biometric authentication

A

Low cost

1644
Q

Which type of vault lock is least likely to be affected by mechanical failure

A

Biometric lock

1645
Q

What is the primary disadvantage of using capacitive sensors in outdoor environments

A

High sensitivity to moisture

1646
Q

Which business principle involves evaluating the organizations internal and external environments

A

Strategic management

1647
Q

Which of the following is most likely to lead to a dismissal of evidence collected in an undercover investigation

A

The undercover agent influencing the suspects actions

1648
Q

Which of the following best describes the operation of an acoustic glass break sensor

A

Detects specific frequencies associated with breaking glass

1649
Q

Why is it essential to involve both IT and business units in disaster recovery planning

A

Disaster recovery requires input from IT to address technical issues and from business units to prioritize critical operations for recovery

1650
Q

Which of the following weakness is most likely to arise from using circumstantial evidence in court

A

Circumstantial evidence is easily refuted by the defense

1651
Q

In physical security assessments why is it important to include employee behaviour as a potential risk factor

A

Employees may intentionally or unintentionally compromise security protocols

1652
Q

Which of the following is not a typical goal of protection in depth

A

Ensuring that no vulnerabilities exist within the system

1653
Q

Which of the following is least likely to be an outcome of effective crisis leadership

A

Removal of crisis management team members

1654
Q

Which of the following is least likely to be an effective protection against escalation of privilege attacks

A

Encrypting files stored on the network

1655
Q

What is the typical color rendering index (CRI) of a high pressure sodium lamp

A

20-30

1656
Q

Which of the following best describes the function of a criticality assessment in a security risk model

A

To prioritize the protection of assets based on their importance to business continuity

1657
Q

Which of the following is most likely to be the first step in a threat evaluation process

A

Evaluating the credibility of the threat

1658
Q

Which factor is least likely to increase the Probability of detection (Pd)

A

Reducing detection sensitivity but enhancing response force readiness

1659
Q

Which of the following is least likely to be considered an intangible asset under international financial reporting standards (IFRS)

A

Inventory held for sale in the ordinary course of business

1660
Q

Which of the following is most likely to increase the delay time in a PPS

A

Installing reinforced doors and locks at critical entry points

1661
Q

Which of the following is least likely to be used in a secure email transmission protocol

A

Simple Mail Transfer Protocol (SMTP)

1662
Q

Which of the following is least likely to influence the CRI (Color Rendering Index) of a security lighting system

A

The ambient temperature in the environment where the lighting is installed

1663
Q

Which of the following is least likely to be useful when assessing the role of opportunity in an employees decision to commit fraud

A

Investigating the financial pressures experienced by the employee outside of work

1664
Q

What is the primary weakness of physical evidence such as fingerprints in an investigation

A

Fingerprints alone cannot prove the intent of a suspect

1665
Q

Which of the following is most relevant for determining the credibility of an informant in a narcotics sting operation

A

The informants previous track record of providing accurate information

1666
Q

What is the primary role of a crisis management team in BCMS

A

Coordinating emergency response

1667
Q

How might an organization balance the need for physical security with business continuity during a major construction project

A

By creating alternative access points that maintain security while allowing for operations to continue

1668
Q

Which of the following is a key weakness of relying solely on insurance to manage security risk

A

It does not prevent the occurrence of risk events

1669
Q

Which of the following is least likely to be considered when assigning occupant roles in an emergency plan

A

The hierarchy of the organizational structure

1670
Q

Which of the following is not a type of security control

A

Operational

1671
Q

Which of the following is a key principle of information security

A

Confidentiality

1672
Q

Which of the following is not a standard component of a forensic investigation

A

Financial auditing

1673
Q

What is the purpose of a security clearance

A

To grant access to classified information
To restrict access to sensitive areas
To verify an individuals identity

1674
Q

Which of the following is a key principle of personnel security

A

Need to know principle
Least privilege principle
Separation of duties principle

1675
Q

In which scenario would physical security rely on active deterrence measures

A

When the facility depends on visible security to discourage criminal activity

1676
Q

Which of the following are core principles of the PEACE model of investigative interviewing

A

Planning and preparation
Evaluation of evidence

1677
Q

What is the primary goal of security incident management

A

Identify security weaknesses
Responding to incidents

1678
Q

Which of the following is least likely to be considered an all hazards approach in crisis management

A

Focusing exclusively on natural disaster scenarios

1679
Q

Which of the following is not a characteristic of Balanced protection

A

Every layer of protection is equally effective in preventing threats

1680
Q

Which of the following is most probable to restart after a power outage and take the longest to do so

A

Metal halide and mercury vapor lamps

1681
Q

Which sensor technology is most effective for detecting sudden impacts on fences or walls

A

Vibration sensor

1682
Q

Which of the following factors is least relevant to proving the intent in a defalcation case

A

The suspects past employment history

1683
Q

In a controlled hire what is the main goal of infiltrating the organization

A

To gather internal documents and evidence
To gain trust and elicit confessions

1684
Q

What is the main advantage of using a monostatic radar sensor over a bistatic sensor in urban environments

A

More resistant to environmental changes

1685
Q

Which of the following is most likely to complicate the enforcement of a trade secret in a multinational company

A

The trade secret protection laws vary significantly across different jurisdictions

1686
Q

Which of the following is most probable to result from a failure to conduct regular security audits

A

Increased risk of undetected vulnerabilities

1687
Q

Which of the following is the most important factor when designing a delay layer in PPS

A

Extending the time required for an adversary to by pass barriers

1688
Q

How do beam divergence and wavelength affect the performance of laser based perimeter sensors in foggy conditions

A

Beam divergence and wavelength shifts cause signal attenuation reducing accuracy

1689
Q

What is the primary advantage of using biometric technologies in security systems

A

High accuracy

1690
Q

Which vault door design is most resistant to both forced entry and fire damange

A

Composite vault door

1691
Q

Which of the following is not a purpose of personnel security

A

Ensuring the physical security of facilities

1692
Q

Which of the following is least likely to be classified as an intangible asset on a company’s balance sheet

A

A leased factory building used for production

1693
Q

Which of the following is least probable to be vulnerability of a loop system in an electronic protection system

A

The loop can be easily extended to cover additional areas

1694
Q

Which of the following factors is least relevant when conducting a cost benefit analysis for security investments

A

Increased operational efficiency

1695
Q

How to microwave sensors distinguish between legitimate movement and environmental interference such as blowing leaves or heavy rain

A

By analyzing the Doppler shift in returned microwave frequencies

1696
Q

Which of the following combinations would most likely increase risk without increasing vulnerability

A

Increased asset visibility and slow recovery times

1697
Q

Which of the following is not a criterion for evaluating bids for security services

A

Security personnel training background

1698
Q

Which combination of factors would reduce the likelihood of an adversary successfully exploting vulnerabilities

A

Increasing access control measures and reducing threat likelihood

1699
Q

What is the most effective way to handle inconsistencies in witness testimony using the PEACE model

A

Ask open ended questions to clarify discrepancies

1700
Q

Which of the following is not a primary goal of a buy bust operation

A

Protecting undercover operations

1701
Q

Which of the following is least likely to be a primary goal when responding to chem-bio mail attacks

A

Protecting assets from potential contanmination

1702
Q

Which lamp type is generally the most cost effective for high output ssecurity lighting

A

LED

1703
Q

Which of the following lock offers the highest protection against lock bumping

A

High security dimple locks

1704
Q

What is the main disadvantage of a fragmented ESRM approach

A

Increased coordination complexity
Higher operation costs

1705
Q

Which of the following factors is most relevant when determining the probability of neutralization (Pn) in a security

A

Response force readiness

1706
Q

Which of the following is not a common method used to detect insider trading

A

Reviewing employee performance evaluations

1707
Q

Which of the following technologies is most susceptible to environmental conditions like wind and rain

A

Vibration sensors

1708
Q

Which of the following is primary disadvantage of using barbed wire fencing in highly populated urban areas

A

Barbed wire can cause injury to unauthorized personnel and wildlife

1709
Q

What is a major drawback of using vibration sensors for perimeter security in areas with high environmental noise

A

High susceptibility to false alarms

1710
Q

What is the major benefit of using open ended questions during a cognitive interview with a witness

A

Open ended questions allow the witness to provide detailed, uninterrupted recollections of events

1711
Q

How might adversaries exploit weaknesses in biometric access control systems

A

By using high quality reproductions of biometric data to gain unauthorized access

1712
Q

What is the primary goal of personnel security

A

To ensure the safety of employees

1713
Q

How does increasing the probability of interruption (Pi) affect the adversary’s chances of success

A

It reduces the time an adversary has to act

1714
Q

Why are bistatic microwave sensors preferred over monostatic configurations for security wide area perimeters

A

They provide improved detection accuracy by separating the transmitter and receiver

1715
Q

Which of the following is least important when conducting a thorough investigation

A

Ensuring evidence is analyzed within 24 hours

1716
Q

What makes volumetric sensors particularly effective for use in large multi story parking garages

A

The can detect movements on different levels of the structure, providing comprehensive coverage without the need for sensors on each floor

1717
Q

Which of the following is a common method for mitigating risk

A

Implementing security controls

1718
Q

Why is annealed glass not recommended for use in high security applications

A

It shatters into large, sharp pieces upon impact, creating safety hazards

1719
Q

Which of the following is most likely to be considered a major weakness of the Secure Hash Algorithm (SHA) family

A

Susceptibility to collision attacks

1720
Q

Which of the following features of a vault lock offers the best protection against drilling attacks

A

Hardened steel plates

1721
Q

In the context of quantitative risk analysis, which of the following formulas is used to calculate Annual Loss Expectancy (ALE)

A

ALE = Single Loss Expectancy (SLE) x Annual Rate of Occurrence (ARO

1722
Q

Which of the following is an example of a logic bomb

A

Malware that is triggered by a specific event or date

1723
Q

What is the primary goal of personnel security

A

To prevent unauthorized access to sensitive information

1724
Q

Which of the following is a key component of a security incident response plan

A

Training employess on communication protocols

1725
Q

Which of the following factors is most likely to reduce the overall effectiveness of a physical protection system (PPS)

A

Delayed response times

1726
Q

Which of the following is least likely to be factor when deciding to evacuate or shelter in place during a crisis

A

The media coverage of the event

1727
Q

Which investigative principle is best supported by timeliness

A

Efficiency

1728
Q

In a security management plan which of the following best describes the best method for mitigating risk without transferring or avoiding it

A

Enhancing detection systems

1729
Q

Which of the following is not a benefit of using digital forensics in investigations

A

Ensuring data privacy

1730
Q

How does the probability of neutralization (Pn) impact the overall responsibility of success (Ps) in an adversary sequence diagram

A

A high Pn decreases the adversarys probability of success (Ps)

1731
Q

What is the primary goal of personnel security

A

To prevent unauthorized access to sensitive information

1732
Q

Which of the following is not a typical goal of Protection in depth

A

Ensuring that no vulnerabilities exist within the system

1733
Q

In security system design, what does the term time delay refer to in an adversary sequence diagram

A

The period between detection and neutralization of the adversary

1734
Q

Which material is used in high security vault walls to provide enhanced protection against cutting tools

A

Tungsten carbide

1735
Q

In the context of sting operations what is the term bag head used to describe

A

An undercover officer used as bait

1736
Q

What is the key advantage of using a magnetic lock of vault security

A

No moving parts to wear out

1737
Q

How can thermal sensors be compromised in extreme environmental conditions

A

Extreme temperatures can cause thermal sensors to malfunction or trigger false alarms

1738
Q

What is the most common weakness of fire resistant safes when used for high security burglary protection

A

Lower resistance to drilling and cutting

1739
Q

Which standard rates the resistance of a safe to attacks by tools, torches and explosives

A

UL 608

1740
Q

In the context of the adversary path diagram (ASD), which of the following would be considered the most effective delay point

A

A high fence with surveillance

1741
Q

Which of the following management theories focuses on treating employees as self motivated individuals who thrive on responsiblity

A

McGregor’s Theory Y

1742
Q

Which of the following factors is most relevant when determining asset vulnerability in a critical infrastructure system

A

The proximity of the asset to potential threats

1743
Q

In CPTED which of the following strategies best represents the principle of natural access control

A

Limiting points of entry

1744
Q

Which type of evidence is most vulnerable to tampering during a hire profile corporate investigation

A

Digital evidence

1745
Q

Which of the following is least likely to be recommended approach when dealing with a high profile public crisis

A

Limiting communication to senior management only

1746
Q

Which of the following is a common type of malware

A

Ransomware

1747
Q

What is the expected lifespan of a typical LED lamp used for security lighting

A

50000 Hours

1748
Q

Which of the following is least likely to be considered a tangible asset on a company’s balance sheet

A

A patent for a proprietary manufacturing process

1749
Q

Which of the following is least likely to affect the effectiveness of a fence used for perimeter security

A

The thickness of the fence posts

1750
Q

Which type of lock is considered the most difficult to manipulate

A

Disc Detainer Lock

1751
Q

Which of the following is least likely to be protected by a trademark

A

A newly invented process for manufacturing goods

1752
Q

What is the primary challenge in coordinating crisis management for decentralized organization

A

Ensuring communication consistency across geographically dispersed teams

1753
Q

What is the purpose of security clearances in personnel security

A

To grant individuals access to classified information
To assess and individuals trustworthiness
To prevent unauthorized disclosure of sensitive information

1754
Q

What is a common tactic used by suspects during interrogation to evade detection

A

Presenting multiple conflicting version of the story

1755
Q

Which of the following vault materials provides the best balance between cost effectiveness and high security in commercial environments

A

Composite steel

1756
Q

What is the most significant vulnerability of a safe with a mechanical combination lock

A

Susceptibility to manipulation

1757
Q

Which combination of factors is most likely to lead to job dissatisfaction according to Herzberg

A

Poor salary and poor working conditions

1758
Q

Which of the following sensors is most effective at detecting fast moving objects across an open area

A

Microwave sensor

1759
Q

What is the primary advantage of using LED lighting for security purposes over metal halide lighting

A

Higher energy efficiency

1760
Q

Which of the following factors is least likely to contribute to reducing asset criticiality in a high security environment

A

Reducing the assets importance to the organizations goals

1761
Q

What is the purpose of surveillance in an investigation

A

To gather information

1762
Q

What is the main security feature of a safe with a TL-15 rating

A

Resistance to forced entry for 15 minutes

1763
Q

Which of the following is least likely to undermine the credibility of a hostile witness

A

Allowing the witness to express themselves freely

1764
Q

Which of the following is least likely to be a characteristic of a controlled buy operation in drug investigations

A

The undercover officer intentionally increases the size of the drug buy

1765
Q

Which fire rating would be appropriate for a vault designed to protect high value assets in a facility prone to frequent fires

A

4 Hours