Prep Flashcards
Which of the following is the true about vulnerabilities in a security context
Vulnerabilities can arise from inadequate training and poor access control
Which of the following best describes the role of criticality assessments in risk management
Criticality assessments prioritize asset protection based on their importance to overall business operations
What is the primary function of a criticality assessment in risk management
To measure how dependent the organization is on the asset
Why is it essential to review a terminated employees access to company systems during a workplace violence risk assessment
To prevent retaliation or misuse of sensitive information
Which sensor technology is best suited for detecting slow moving objects at long distances
Microwave sensor
How might adversaries bypass the protections of a network based intrusion detection system (NDS)
By encrypting malicious traffic, with the NDS cannot inspect
Which lock type is the most vulnerable to key duplication attacks
Pin tumbler lock
In an adversary sequence diagram, what does a low Probability of Neutralization (Pn) suggest
The adversary is more likely to escape after detection
Which rating denotes a safes ability to withstand tool based attacks at 60 minutes
TL-60
What is the primary goal of ESRM
Identifying and managing security risks
Which of the following scenarios would not reduce Probability of Neutralization (Pn)
Increased threat deterrence measures
In the context of drug investigations, how does the Controlled Substances Act (CSA) classify Ecstasy/MDMA
As a schedule 1 drug due to its high potential for abuse and no accepted medical use
Which of the following is not considered when assessing asset criticality in a security framework
The likelihood of a successful attack
Which of the following combinations of factors is LEAST likely to reduce an assets risk
High vulnerability but effective detection systems
Which of the following is not a recommended best practice for conducting a polygraph examination
Asking compound of leading questions
Which of the following is not an essential characteristic of a well conducted investigation
Expediency
In what situation would a vibration sensor be the most effective choice
Detecting the breaking of glass in a window
Which of the following is most important for ensuring the admissibility of evidence in court
Proper documentation
Which of the following is a responsibility of the personnel security officer
Investigation security incidents
What is the purpose of access control measures in personnel security
To restrict access to sensitive areas
To prevent unauthorized entry
To protect sensitive information
How might a person with a criminal background exploit a ban the box policy to secure employment
By delaying the disclosure of criminal history until later the hiring process
How can poorly managed crisis communication protocols lead to secondary reputational damage after the initial crisis
Stakeholders may receive inconsistent information leading to mistrust
Delayed post crisis messaging reduced confidence in the organization
In high traffic environment which sensor technology would be most appropriate to avoid false alarms while maintaining security
Dual technology sensor
______ is the ability of an organization to anticipate, prepare for, respond to and adapt to incremental change and sudden disruption in order to survive and prosper
Organizational Resilience
Which combination of factors would most likely reduce the Probability of Neutralization (Pn) in a high security systems
High detection sensitivity but poorly trained security personnel
Which sensor type is least affected by the presence of moving vehicles in the vicinity of a protected area
PIR sensor
In a threat assessment which combination of factors would reduce the over all risk
Low vulnerability and frequent audits
An action of event that could result in a loss; an indication that such an action or event might take place is called _________
Threat
Which type of sensor is often used in vaults and safes to detect unauthorized tampering or drilling
Vibration sensor
What is the primary reason for using electromagnetic lock in high security environment
Resistance to forced entry
Why is it critical to perform a business impact analysis (BIA) before finalizing business continuity plans
To determine the potential operational and financial impacts of different types of disruptions
Which type of top guarding is most effective in preventing intruders from scaling a fence
Inward facing concertina wire
In CPTED, what is the primary goal of access control
To reduce criminal behaviour by influencing movement patterns
Which standard is used to test and rate the security of vault doors in the event of attacks involving explosives
CEN 1143-1
What is the primary operational difference between bistatic and monostatic sensors in physical security systems
Bistatic sensors require separate transmitter and receiver units, whereas monostatic sensors have both components in one unit
Which combination of factors is most likely to reduce the Probability of Detection (Pd) in layered security system
Delayed detection systems and reduced sensor sensitivity
Which of the following is a not a investigative interview principle
Leading Questions
Which international standard sets the grading for safes and vaults to resist specific form of attacks like cutting and explosives
CEN 1143-1
Which investigative techniques is most likely to suffer from confirmation bias
The REID technique
What is the primary benefit of integrating BCMS with risk management
Enhanced organizational resilience
Improved financial performance
Which of the following is a primary limitation of REID techniques when dealing with juvenile suspects
It risks increasing false confessions due to suspects vulnerability
Which of the following type of vault doors typically offers the best composition of fire resistance and security
Composite Door
What is the primary purpose of personnel security investigations
To verify the information provided by job applicants
To identify potential risks associated with employees
To ensure the trustworthiness of individuals in sensitive positions
What is the primary challenge of designing physical security systems for remote or isolated facilities
Delayed response times due to geographic distance from emergency services
Which lamp has the lowest ROI due to frequent replacement and high power consumption
Incandescent
Why is it critical to include terrain following sensors in perimeter security systems for high risk facilities
Terrain following sensors adjust their detection range based on the contours of the landscape, preventing gaps in coverage that adversaries could explicit
In laminated glass, what role does PVB (polyvinyl butyral) interlayer play during a ballistic attack
It prevents the glass from shattering completely and absorbs the energy from the projectile
Which type of lamp experiences the highest energy consumption relative to light output
Incandescent lamp
During disaster recovery planning, why is it important to consider the geographic location of backup facilities
To mitigate the risk of the same disaster affecting both primary and backup sites
What is the primary purpose of installing anti pass back systems in access control
To prevent employees from sharing their access cards
Which of the following best describes a threat in the context of risk management
A potential danger that could cause harm to assets
Which of the following best defines a threat in the context of risk management
A potential danger that could cause harm to assets
In a high security facility, which type of sensor would be best for monitoring areas with frequent foot traffic but requiring detection of unauthorized access
Infrared Beam Sensor
Which type of evidence is most likely to be challenged in court as unreliable
Eyewitness testimony
When assessing the vulnerability of a facility, which methodology is most commonly employed to determine critical points
Fault Tree Analysis (FTA)
Which sensor would be best suited for monitoring entry points in areas prone to significant vibrations, such as near railroads
Microwave sensor
Which of the following is most likely to result in a false positive when using the REID technique
Accusatory questioning without corroborating evidence
Which of the following combinations would reduce overall vulnerability n a critical infrastructure system
Enhancing response protocols and reducing threat likelihood
Which investigative method is most likely to prevent bias
Using multiple sources of evidence
Blind interviewing techniques
______ principle says a single person can supervise only a limited number of staff members effectively
Span of control
Which type of vault door is specifically designed to resist attempts at forced entry using explosives
Blast resistant vault door
Which of the following is not an assumption of McGregor’s Theory X
Employees seek responsiblity
Which of the following is the primary strength of using financial records in a defalcation case
Financial records directly link the suspect in crime
What is the primary vulnerability of high security safes with electronic locks during a power outage
Inability to unlock
In the investigative process, what reflects the mindset of the investigator
Simple statement of abstracts encountered
What makes active infrared sensors particularly effective for perimeter security in a gated community
Active infrared beams form an invisible barrier that, when broken immediately alerts security personnel to a potential intrusion
In a covert surveillance operation, what is the most effective way to maintain a continuous watch on a mobile target
Using both fixed and mobile surveillance teams, coordinated with electronic tracking
In the context of investigative interviewing, which method prioritizes eliciting information rather than extracting
PEACE Model
Cognitive Interview Technique
In a criticality assessment, what is the main factor that determines an assets protection priority
The assets role in maintaining business continuity
In an undercover investigation, how does the progression of interviews typically differ from regular investigation
Undercover investigations work toward those less involved
Which of the following sensors is designed to detect the proximity of a metallic object without direct contact
Magnetic sensor
Which of the following is not a common method of personnel security training
Physical Fitness Training
Which two factors are seential in calculating the Probability of Interruption (Pn)
Time delay and response force readiness
Adversary speed and detection system placement
What is the main purpose of implementing security metrics
To measure security effectiveness
To ensure regulatory compliance
What is the primary reason for installing double concertina wire on a perimeter fence
To create a secondary barrier between two lines of defense
How does the uses of passive sensors in a retail environment benefit the business beyond security
Passive sensors gather data on customer traffic patterns, which can be used for marketing and layout optimization
Which design feature of a high security vault enhances protection against crowbar or prying attacks
Anti-pry lip
What is the primary challenge of providing executive protection in high threat environments
Balancing overt and covert security measures
Which of the following is least likely to be considered indicative evidence in a criminal investigation
A suspects confession
What is the primary disadvantage of relying on eyewitness testimony
Subjectivity
Reliability
Which property of glass ceramic makes it suitable for high security applications where thermal resistance is critical
It has a low coefficient of thermal expansion, making it resistant to extreme temperatures
In what scenario would bistatic sensors outperform monostatic sensors
In large open areas where a separate transmitter and receiver can cover greater distances
What is the main goal of personnel security screening
To protect sensitive information
Which factors are most likely to influence the severity of a vulnerability
The assets criticality and the threats capability to exploit it
Which of the following is a primary difference between active and passive infrared sensor in intrusion detection
Active require both a transmitter and receiver
Which of the following factors would most likely reduce the Probability of Interruption (Pi) for an adversary attack
Enhanced detections but low personnel response readiness
Which lock component engages or disengages the bolt of a vault door
Cam
What is the primary purpose of a root cause analysis in investigation
Preventing future incidents
How might poor lighting in secure areas impact access control systems
It can make biometric scanners and card readers less effective by reducing visibility
What is the main purpose of implementing security metrics
To measure security effectiveness
To ensure regulatory compliance
What is the primary operational advantage of active ultrasonic sensors in detecting intruders in large, empty spaces
Ultrasonic sensors cover a larger volume of space, reducing the number of sensors required
Which business function is primary responsible for managing the flow of goods and services
Operations
Which of the following types of evidence is least likely to be used to prove intent in a criminal investigation
Testimony from expert witness
What is the primary goals of financial management within security operations
Ensuring operational efficiency
What is the primary function of probability of success (Ps) in a security systems adversary sequence diagram
To estimate the likelihood that an adversary will achieve their objective
In which scenario is mobile surveillance most effectively utilized
Following a suspect during their daily activities
What is a key limitation of traditional risk assessments in crisis management planning
They often fail to account for rapidly evolving risks like cybersecurity threats
Which type of glass is most appropriate to use in high traffic public areas where safety and impact resistance are paramount
Tempered glass
Which factor is most likely to increase the probability of detection (Pd) in a high threat environment
Increased sensor sensitivity and response times
Which type of cable is most suitable for perimeter surveillance systems requiring long distance data transmission without signal loss
Fiber Optic
How might an adversary exploit the vulnerabilities of a monostatic sensor in a high traffic facility
By moving in and out of the sensors detection range in quick succession, overwhelming the system and causing gaps in detection
Which factors is most likely to influence the severity of a vulnerability
The assets criticality and the threats capability to exploit it
Which attack method is the most effective against older combination lock safes
Manipulation
Which of the following is not a method for ensuring data integrity
Encryption
Which of the following sensors would be the most appropriate for detecting intrusions through metal doors
Magnetic sensor
Which of the following is a primary benefit of conducting a security audit
Identifying potential security breaches
Ensuring compliance with regulations
Which type of lock is most vulnerable to shimming
Padlock
Which of the following scenarios would reduce the Probability of Neutralization (Pn)
Enhanced threat deterrence but slow response protocols
What is the legal risk of coercive tactics during an interoggation
Coerced confessions may be deemed inadmissible in court due to constitutional violations
In what situation might end to end encryption (E2EE) be less effective for protecting sensitive data
It endpoints themselves are compromise, encrypted data can still be accessed in it decrypted form at the destination
Which of the following would not be considered a motivation according to Herzberg
Job security
What is the primary function of a security badge system
To control access to secure areas
How might adversaries bypass thermal sensors without triggering an alarm
By using heat resistance materials to block their body heat from being detected by the sensor
Which of the following represents a legal constraint on the use of surveillance in private investigations
Video surveillance may not record audio without consent
Which combination of factors would most likely reduce the Probability of Interruption (Pi) in a high security environment
Increasing personnel presence but reducing detection accuracy
Which of the following is true of Herzberg’s hygiene factors
They prevent job dissatisfaction
What is the primary purpose of a crisis management plan
Ensuring effective response to crisis
Which type of sensor is designed to detect intrusion based on pressure variations in the ground or floor
Pressure sensitive volumetric sensor
Why might an organization review a potential hires travel history as part of a background investigation
To identity associations with high risk countries
Which of the following is a common physical barrier in security
Fences
What is the primary goal of ESRM
Identifying and managing security risks
Which of the following is not a core element of the CARVER risk assessment method
Resilience
Which of the following combinations most increases an organizations risk exposure
High criticality and high vulnerability
Which lamp technology is most sensitive to frequent power cycling, resulting in a shorter lifespan if turned on and off regularly
Metal Halide
What is the primary disadvantage of using an active infrared sensor system in outdoor environments
Susceptibility to interference from direct sunlight
What is the biggest challenge in using RFID technology for access control in sensitive areas
RFID signals can be intercepted and cloned by malicious actors
Which fire resistance rating is appropriate for a wall separating a high security vault from an adjacent room in a commercial building
2 hours
What is the primary benefit of using infrared beam sensors in outdoor perimeter security
Ability to detect in total darkness
Which of the following is not a benefit of a virtual private network (VPN)
Enhancing data availability
Which of the following is least likely to be concern during the recovery phase of a natural disaster crisis
Maintaining the chain of custody for evidence
What is the role of consequence criteria when valuing an asset in security risk management
It determines the potential impact on business operations if the asset is compromised
What is the biggest challenge in using RFID technology for access control in sensitive areas
RFID signals can be intercepted and cloned by malicious actors
What is the main advantage of using digital forensics in investigations
Ability to analyze large volumes of data quickly
When conducting a criticality assessment, which of the following questions should be answered
What are the potential consequences of asset loss
How difficult would it be replace the asset
What is the primary benefit of integrating ESRM with business operations
Enhanced organizational resilience
Improved financial performance
Which of the following factors is least relevant when determining the likelihood of a security incident
The cost of asset recovery
Which of the following best describes the chain of custody
Documenting evidence collection
Ensuring evidence integrity
How might criminals exploit weaknesses in perimeter security if there is not redundancy in the design
By disabling a single security measure such as fence or sensor, without triggering alarms
Which of the following combinations would least likely increase risk in a security framwork
Moderate threat likelihood and frequent security audits
Which of the following is not a responsibility of personnel security
None of the below
(Conducting background checks on employees, Implementing physical security measures, Developing security policies and procedures)
How does the design of line detection fiber optic sensors enhance their ability to detect perimeter intrusions in harsh environments
They use light refraction along a continuous fiber to detect disturbances
Which of the following is least likely to be effective in reducing risk of false confessions during a REID interrogation
Offering the suspect a reduced sentence in exchange for cooperation
What is a potential pitfall of relying solely on criminal background checks when assessing personnel risks
They provide no insight into the individuals current behaviour
Which of the following is most likely to hinder effective decision making during the initial phase of crisis
Conflicting information from different sources
What advantage does chemically strengthened glass offer over tempered glass in high security installations
Higher resistance to thermal stress and mechanical impact
What is the main weakness of older combination locks used on vaults and safes
Susceptibility to manipulations
Which of the following is least likely to be considered conclusive evidence in a drug trafficking case
A character witnesses testimony about the suspects prior behaviour
Which of the following is a common challenge in conducting undercover operations
Maintaining the undercover agents cover
What type of safe would be more appropriate for securing digital media again both fire and burglary
Data safe
How might adversaries bypass electromagnetic locks used in high security facilities
By disabling power supply to the locks, rendering them ineffective
Which of the following factors would most effect the accuracy of a PIR sensor in a warehouse environment
Large temperature fluctuations
Which type of sensor is least likely to detect objects moving at slow speeds
Microwave sensor
Which of the following is least probable to enhance the response of a Physical Protection System (PPS)
Installing additional motion detectors
Which of the following types of evidence is most likely to be considered conclusive in a criminal investigations
DNA evidence from the suspect at the crime scene
Which rating does TL-15 safe receive if it can withstand a torch attack for 15 minutes
TRTL-15
Which feature of LED lighting makes it preferred choice in high security environments
Low maintenance requirements
Which factors would most likely increase the overall threat landscape in a critical infrastructure system
Increasing asset visibility and reducing personnel presence
In an investigation involving digital evidence, which of the following would most likely compromise the evidence
Powering down the computer before imaging the drive
Using the original device for analysis instead of a copy
Which sensor type of least affected by the presence of moving vehicles in the vicinity of a protected area
PIR sensor
Which of the following is the most effective early intervention to prevent workplace violence
Offering mental health resources and collect resolution training
Which of the following is an example of a strategic risk
A change in regulatory requirements
Which lighting system is best suited for security applications in environments with frequent power fluctuations
LED lighting
Why are the fiber optic cables preferred over copper cables for long distance perimeter security installations
Fiber optic cables are immune to electromagnetic interference
Which of the following is not considered in the calculation of Earnings before interest, taxes, depreciation and amortization (EBITA)
Tax obligations
Which of the following is not a standard method used to calculate probability of detection (Pd) in a PPS
Environmental impact analysis
Key for PSIM system
Cost
Scalability
Which of the following is a major risk associated with sting operations
Entrapment of the suspect
Compromising the undercover officers identity
Legal challenges to the operations methods
Which of the following is most likely to be considered a precursor to an organizations theft problem
Substance abuse issues
Which of the following is a key difference between a controlled buy and a buy bust operations
A buy bust focuses on immediate arrest, while a controlled buy gathers long term intelligence
Which of the following is a least likely to influence a company’s ROI on a security project
The length of the project implementation phase
Why is the integration of cybersecurity into business continuity plans essential
Cybersecurity incidents can cause business disruptions similar to physical disasters
Which fence type would be most suitable for a high security installation in an urban area with strict aesthetic regulations
Wielded wire mesh fence
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Application from, pencil and paper test, performance simulation test, interviews
Which of the following best explains why asymmetric encryption is typically slower than symmetric encryption
It uses larger key sizes for encryption and decryption
Which of the following is not a characteristic of strong encryption algorithm
Speed of encryption
Which type of glass is most effective in preventing unauthorized access through forced entry
Laminated glass
Which of the following is not typically included in an investigation report
Detailed financial analysis
The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is
Economic
Which of the following is a not a benefit of using video surveillance in investigation
Privacy protection
What is the main purpose of a forensic interview
Gathering detailed information from witnesses or suspects
Which combination of factors is most likely to improve employee motivation according to Maslow’s theory
Satisfying esteem needs and offering responsiblity
According to Maslow which of the following needs must be satisfied before esteem needs can be addressed
Safety needs
Social needs
In terms of security trends, how does Artificial Intelligence (AI) impact modern security operations
By providing advanced threat detection and predictive analytics capabilities
Which combination of factors would increase the Probability of success (PoS) for and adversary targeting critical infrastructure
Weak detection systems and delayed incident recovery protocols
In the context of security lighting, what is luminance
The perceived brightness of a light source
Which of the following is the most critical factor when selecting a security alarm system
The response time of law enforcement or security personnel
Why might organizations face legal liability if they fail to implement effective emergency response plans
If negligence results in harm to employees or customers
Which of the following is least likely to directly affect a company’s Gross Operating Profit (GOP)
Tax obligations for the current year
Which of the following combinations would most likely result in a higher probability of interruption (PoI)
Increasing physical security measures and enhancing detection systems
Which type of vault door is specifically designed to resist attacks with tools like torches and drills
Blast resistant vault door
Which of the following is not a common type of phishing attack
Ransom phishing
Which of the following is not a typical goal of protection of depth
Ensuring that no vulnerabilities exist within the system
How might an adversary exploit weaknesses in door locking mechanisms in high security environments
By tampering with electronic door locks to disable them
How might adversaries bypass the detection sensors in a perimeter security system
By passing under or over the sensors detection range
Which of the the following is the most critical method for ensuring that a security policy is enforced consistently across the organization
Monitoring employee compliance
Which of the following is not a common method for ensuring the integrity of digital evidence
Immediate analysis
Which of the following is least likely to be common element in crisis communication plan
A financial recovery strategy
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
Which of the following is a not a common vulnerability of CCTV systems in physical security
Inability to detect thermal signatures
How does the identification of a threat vector affect the overall risk equation in a security system
It increased overall risk by highlighting potential weaknesses that could be exploited by external threats
Which of the following is least likely to be a role of the crisis management leader during a large scale evacuation
Making decisions about the financial impact of the crisis
Which of the following is least likely to complicate the recovery phase of crisis management
Lack of media involvement in post crisis reporting
What is the primary goal of a background check
Ensuring candidate suitability
What is the primary disadvantage of using physical surveillance in an investigation
High cost
What is the primary risk of falling to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
Which of the following is the best example of a Key Performance Indicator (KPI) for a security program
Employee compliance with security protocols
Which of the following is a significant disadvantage of ultrasonic sensors in outdoor environments
They are sensitive to air turbulence
Which of the following is a key consideration when designing a secure access control system
Reliability and redundancy
User convenience
Which of the following is a most likely to cause an investigator to miss critical evidence during a crime scene search
Lack of proper search training
What is the purpose of personnel security policy
To ensure compliance with legal and regulatory requirements
In the context of risk management, which of the following is the best example of a vulnerability
A lack of sufficient detection systems at the perimeter
Which of the following is most likely to provide justification for actions taken during a crisis response
Detailed records of threat evaluation deliberations
What is the primary function of line detection sensors in perimeter security systems
Detecting vibration along a fence line
Which of the following factors would most likely decrease an assets vilnerability
Frequent security audits and improved detection systems
How might adversaries bypass the protections of a network based intrusion detection system (NDS)
By encrypting malicious traffic, which the NDS cannot impact
Which of the following is not a principle of secure coding
Data encryption
What is the primary goal of encryption in information security
Preventing unauthorized access
Ensuring data integrity
Which of the following is most likely to be the key question in a bomb threat assessment
Could the threatener have done what was claimed
Which component is typically the most susceptible to false alarms in a PIR (Passive Infrared) sensor system
Pyroelectric sensor
What is the primary function of a time delay feature on a safe used in banking environments
To discourage robbery by delaying access
Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach
Reduced focus on regulatory requirements and compliance audits
Which of the following is not a benefit of personnel security programs
Increasing operational costs
Which of the following is not a benefit of conducting security audits
Reducing operational costs
Which of the following is most likely to enhance the deterrent function of a security system
Installing visible barriers and deterrent signage
Which of the following is a critical consideration when implementing a physical security information management (PSIM) system
Scalability and integration with existing security systems
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
Which of the following is not considered a strength of a deductive risk assessment
It focuses on general patterns and trends to predict risks
What is the most common weakness in using character witnesses in criminal investigations
They often lack direct knowledge of the crime
Which UL standard covers the testing and certification of high security safes for commercial applications
UL687
How can a suspect use counter surveillance tactics to avoid being tracked
Constantly remain in high populated areas
Use physical disguises to alter their appearance
Avoid using electronic communication devices altogether
Which of the following is not a method of personnel security
Incident response
How does deployment of bistatic radar enhance the security monitoring capabilities at international borders
Bistatic radar systems are most difficult to detect and jam than monostatic systems, making them ideal for covert operations
Which of the following is a key consideration when calculating risk for an organization
The degree of asset vulnerability to various type of threats
The likelihood that internal policies will prevent their escalation
What is the purpose of a personnel security policy
To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations
Which of the following is least likely to improve a company’s current ratio
Increasing inventory levels
What is the primary purpose of a digital certificate in PKI
Authenticating identity
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
Which vault rating is required for securing extremely high value assets, offer resistance to both tool and explosive attacks
TRTL-30X6
Which of the following is most likely to increase the complexity of a crisis response
Multiple simultaneous incidents in different locations
Which of the following is not typically a feature of an electronic access control system
Surveillance cameras
Which of the following is most critical factor when selecting a security alarm system
The response time of law enforcement or security personnel
What is the main disadvantage of installing a high tension electrified fence without any physical barrier such as chain link or mesh
The lack of physical barrier allows intruders to bypass the fence with insulation tools
Which of the following is most significant risk of using hostile witness in court
The witnesses’ testimony may be dismissed due to bias
Which of the following is a least likely to affect the calculations of a company’s current ratio
Long term assets
In digital forensics which of the following is most likely to cause the loss of critical evidence during the collection process
Failure to image the drive
Which of the following is a strength of using REID in investigative interviews
It builds a narrative to help the suspect justify their actions
Which of the following principles is most essential when conducting a buy bust operation
Proper documentation of the chain of custody
What makes inductance based sensors suitable for integration into electronic article surveillance (EAS) systems in retail environments
These sensors are highly sensitive to changes in magnetic fields, ideal for tagging and tracking merchandise
Which of the following is most likely to affect the current ratio but not the quick ratio
Change in inventory levels
What are the three general methods for valuing assets
Monetary value, consequence criteria, policy
Which lighting type is best suited for use with security cameras that operate in low light conditions
Infrared lighting
Which of the following is not typically included in due diligence investigation
Psychological evaluations
In a sting operations, which of the following is least likely to contribute to entrapment
To suspect initiating the criminal activity
Which of the following is least likely to be a consequence of conducting an illegal search during a workplace investigation
Termination of the employee being investigated
During disaster recovery planning, why is is important to consider the geographic location of backup facilities
To mitigate the risk of same disaster affecting both primary and backup sites
Which of the following is an example of a physical security vulnerability
Inadequate lighting
In a risk management framework which of the following is false
High threat likelihood always leads to higher risk
Which vault door design offers the highest level of protection against explosives
Concrete line vault door
Which of the following is a key principle of defensible space
Territoriality
Security through obscurity
Hiding Measures
What is the primary goal of security policy
Defining acceptable use of resources
Which of the following is least likely to result from poor session management in web applications
Data integrity issues in stored sessions
Which of the following factors is most likely to lead to security policy failure in a large organizations
Lack of leadership engagement
Which of the following is least likely to be considered one of the three types of emergency operation plans
Focused plan for a specific employee group
In the contrast of adversary path diagram (ASD), what is the best description of delay points
Locations where physical barriers slow the adversary’s progress
Which of the following is not a common type of forensic analysis
Surveillance Analysis
Which of the following strategies is most effective in reducing the risk of false confessions in REID interrogations
Minimizing confrontational tactics and focusing on open ended questions
Which of the following is least likely to be considered a form of pressure in the context of Cressey’s Fraud Triangle
Weak security controls that allow unauthorized access to sensitive data
What is the primary function of a volumetric sensor in perimeter security
Detect changes in air volume over large areas
A matrix that describes a particular situation with respect to each of the risks identified by relating the risk to an asset is called
Vulnerability matrix
How can terrain following sensors be used to prevent tunnelling in perimeter security systems
By adjusting their detection range to cover underground areas, detecting movement below the surface
What does a mantrap help prevent
Tailgating
Which of the following is least likely to increase EBITA
Increasing depreciation expenses
Which of the following best describes the deter function in a security system
Reducing the desire or motivation to attempt an intrusion
Which of the following is the best way to ensure the integrity of confidential information in a company
Encrypting all sensitive data
What is the correct formula for determining the Probability of Success (Ps) in an adversary sequence diagram
Ps = Probability of detection x Probability of interruption x Probability of neutralization
Which of the following is not a characteristic of a successful risk mitigation strategy
It eliminates the probability of all risk events
What is the primary purpose of a crime scene investigation
Identifying suspects
Collecting evidence
Which of the following best reflects the finding of General Strain Theory when applied to a fraud case involving
The suspect faces financial pressure due to unexpected personal expenses
Which of the following is not a method for achieving data integrity
Data replication
Which of the following factors is most relevant when determining asset vulnerability in a security assessment
The likelihood of attack
According to Herzberg, which of the following would not increase job satisfaction
Job security
In crisis management, what is the significance of the recovery time objective (RTO)
It defines the maximum acceptable downtime for critical operations
Which of the following is not an advantage of Protection in depth
It eliminates the need for other types of security measures
Which of the following is not a factor in calculating the Probability of detection (Pd)
Threat likelihood
What is the primary goals of a business organization
To maximize shareholder value
Which of the following is not a benefit of using thermal imaging sensors in security applications
High cost of implementation
What is the primary disadvantage of using infrared sensors for outdoor security
Susceptibility to environmental factors like sunlight and temperature changes
Which of the following best describes the role of ESRM in a corporate setting
To align security practices with the organizations risk appetite and business objectives
Which of the following is the most significant disadvantage of incandescent lamps in security lighting applications
Short lifespan
In a vault protection scenario, why is it critical to assess both strike and restrike times
To ensure the vault door can withstand multiple forced entry attempts within a specified timeframe
What is the most significant risk when relying on security guards alone for access control
Guards may be bribed or compromised
In the context of the PEACE model, what does the Preparation and planning stage entail
Developing an interview strategy
How can psychological profiling be used in an executive protection context
To assess potential threats based on patterns of behaviour
How might adversaries exploit gaps in an organizations disaster recovery plan during a global crisis event
By targeting critical infrastructure that is left vulnerable due to diversion of resources towards immediate crisis
Which of the following is least likely to be an advantage of adopting a risk based approach to ESRM over a purely compliance based approach
Reduced focus on regulatory requirement and compliance audits
Which of the following is least likely to be characteristic of an effective budget development process
Arbitrary selection of line item values
The ability of an adversary to physical enter and egress from the target in CARVER is called
Accessibility
How does the probability of detection (Pd) relate to time delays in the adversary sequence diagram
Pd decreases as time delay increased due to slower detection rates
Which of the following is not part of the formula to calculate the current ratio
Fixed assets
The management principle that suggests one supervisor can effectively control a limited number of people is
Span of control
What is the primary limitation of encryption as a method of data protection
It does not prevent access but only ensures that the data is unreadable without the correct decryption key
Which of the following best describes the inductive approach to risk assessment
Generalizing from specific incidents to broader security issues
What is the primary limitation of using encrypted messaging services in covert investigation
It can be difficult to establish the authenticity of decrypted messages
Which of the following techniques is most effective in cross examining an expert witness
Confronting the expert with inconsistencies in their testimony
How might criminal organization use shell companies to evade detection in an investigation
By laundering illegal funds through seemingly legitimate businesses
By creating false employment records for investigators to follow
By masking the true ownership of valuable assets
What is the primary goal of an internal audit
Detecting fraud
Evaluating compliance with policies
Which of the following is most likely to affect the calculation of the quick ratio but not the current ratio
Inventory
Which of the following factors is most critical for ensuring the effectiveness of a security policy
Consistent enforcement of the policy
In Business Continuity Planning (BCP) which of the following is least relevant when determining Recovery Time Objectives (RTO)
The cost of new security measures
When it is necessary to question a witness about sexual deviation all of the following should be avoided except
Allowing the witness to frame the testimony in his or her own word
Which of the following is not included in the calculation of the quick ratio
Inventory
Which type of leadership style is characterized by a focus on building strong relationships with team members
Transformational Leadership
What is the primary objective of a forensic interview with a child witness
To gather accurate and reliable information
Which of the following is not a method of ensuring data integrity
Encryption
What is the primary goal of incident planning
Minimizing damage from incidents
What is the main benefit of diversification in a business portfolio
To spread risk across different investments
Which of the following is not a factor to consider when conducting a personal security investigation
Social media activity
Which Security Principle involves using multiple layers of security measures
Defense in depth
What is the primary goal of encryption in information security
Preventing unauthorized access
Ensuring data integrity
What is the purpose of a business continuity policy
To provide guidelines and procedures for maintaining business operations during disruptions
Which of the following is a key benefit of effective risk management
Enhances organizational resilience
What is the goal of emergency preparedness
To ensure a quick and effective response to emergencies
What is the purpose of a risk management strategy
To outline the approach for managing risks
What does CPTED stand for
Crime Prevention Through Environmental Design
Which of the following is an example of a physical security control
Security cameras
Which concept involves identifying potential threats and vulnerabilities
Risk assessment
What is the importance of conducting background checks
To verify the credentials and history of individuals
What is the primary objective of business continuity testing
To ensure the effectiveness of business continuity plans
What is the main purpose of access control
To restrict unauthorized entry
Which of the following is a key principle of defensible space
Territoriality
Which of the following best describes defense in depth
Multiple, overlapping security measures
What is the most critical consideration when designing a layered defense strategy in physical security
Depth and redundancy of security measures
Which of the following best describes chain of custody in evidence handling
Documenting every person who handled the evidence
Ensuring evidence is kept secure
Preventing evidence tampering
What is the common goal of both physical and information security
To protect assets from unauthorized access
What is the of a break even analysis
To determining the point which revenue equals costs
What is the primary function of a security officer
To monitor and protect property and people
Which of the following is not a common type of phishing attack
Ransom phishing
Which of the following is not typically included in the ESRM framework
Marketing strategies
Which of the following is not a method for ensuring the security of investigative files
Allowing unrestricted access
What is a fundamental principle of physical security
Denying access to unauthorized individuals
What is the purpose of a crisis management plan
To outline procedures for handling crisis
What is the main objective of conducting a root cause analysis in an investigation
To identify the underlying reason for an issue
What is the primary purpose of a security policy in ESRM
Defining security roles and responsibilities
Enhancing operational efficiency
Which of the following is not a core component of Business Continuity Management Systems (BCMS)
Marketing Strategy Development
Which of the following best describes the term least privilege
Granting employees with minimum access necessary to perform their duties
What is the role of a project manager
To oversee and manage all aspects of a project to ensure it meets its goals
In the context of access control, what is the time based access control system
A system that allows access based on the time of day
Which of the following best describes security culture
The behavior and attitudes of employees towards security
What is the primary goal of a litigation hold
Preventing evidence destruction
Which of the following is a physical security measure for protecting information
Locked filing cabinets
Which of the following is not a typical component of a comprehensive investigative plan
Making Assumptions
What is the purpose of a security barrier
To obstruct or control movement for security purposes
What is the importance of maintaining confidentiality during investigation
To protect the integrity of the investigation and the privacy of involved parties
Which financial statement summarizes a company’s revenues and expenses over a period of time
Income Statement
Which of the following is not a typically responsibility of a Chief Security Officer
Developing marketing strategies
Which of the following is a potential consequence of a personnel security breach
Financial Loss
Reputation Damage
Legal penalties
Which of the following best describes a brute force attack
Guessing passwords through exhaustive key search
One whose sexual desires are directed to both men and women is know as
Bi sexual
Which of the following is not a common method for testing a business continuity plan
Financial Audits
What is the purpose of a security policy
To outline security goals and procedures
In the context of security, what is the primary purpose a security matrix
In the context of security, what is the primary purpose a security matrix
What is the primary goal of security management?
Loss prevention
Which security model focuses on protecting information based on its sensitivity and the need to know principle?
CIA Triad
Confidentiality
Integrity
Availability
What is the primary objective of an organization’s business continuity plan (BCP)?
Ensuring critical business functions continue during disruptions
What is a key component of a company’s code of conduct?
Compliance with legal requirements
In terms of security management, what does “Due Diligence” refer to?
Exercising care and caution in decision making
What is the primary purpose of a security audit?
Identifying weaknesses in the organization’s security practices
What is the main goal of a workplace investigation?
Fact finding and problem solving
What is the primary purpose of computer forensics in an investigation?
Collecting and analyzing digital evidence
In the context of personnel security, what does “Insider Threat” refer to?
Disgruntled employees or contractors
What does the term “Social Engineering” refer to in personnel security?
Manipulating people to disclose confidential information
Which of the following BEST describes the document that tells how much money an organization generates (revenue), how much it spends (expenses), and the difference between those figures (net income)?
Income statement
Which of the following types of investigations is considered the “most common type of investigation in many business and organizational settings”?
Incident
When dealing with suspected chemical or biological agents that are released from a suspicious package, what should be your FIRST goal?
Limit distribution of the material
“The ability of an organization to resist being affected by an event or the ability to return to an acceptable level of performance in an acceptable period of time after being affected by an event”, is called:
Organizational resilience
“Non-deliberate adverse actions and events, such as hazardous material spills and telecommunications and computer outages, are considered which of the following?
Accidental threats
Relative to organizational objectives, what is “SMART
Specific, measurable, attainable, relevant, time bound
What are the five avenues to address risk?
Acceptance, Spreading, Reduction, Transfer, and Avoidance
Employees who are involved in breaking the law in one way will often find it easy to join the operative in trying to break the law in other ways. This behavior is referred to as
Cognitive consistency
An entry control subsystem is part of the…
Detection system
The abduction of a hostage in order to coerce someone else into committing a crime is known as a…
Tiger kidnapping
What is the primary objective of access control in physical security?
Restricting physical access to authorized personnel only
Which physical security measure is designed to protect a facility from vehicle borne threats?
Bollards
What is the primary purpose of a security risk assessment for a physical facility?
Identifying vulnerabilities and threats
In security planning, what does the term “Vulnerability” refer to
The weakness or exposure that could be exploited
What is the primary goal of a code of ethics in an organization?
Promoting ethical behavior and decision making
What is the concept of “Due Care” in business principles
Taking appropriate steps to protect information/people
What does a financial audit primarily aim to achieve?
Verifying the accuracy of financial statements
What is the primary goal of an interview in the context of investigations?
Collecting relevant information and evidence
What is the role of a private investigator in a corporate investigation?
Gathering information and evidence
Which document typically provides an overview of an employee’s job responsibilities, expectations, and performance standards
Job description
The best prevention of exposure to workplace violence is…
A preemployment background investigation program
What are the three general types of assets
People, property, and information
Which of the following is one of the most cost effective assets protection tools?
Training and awareness
The four elements of emergency management are which of the following?
Mitigation, preparedness, response, and recovery
These need not be registered with any outside agency, so the owner can maintain a greater degree of control over the asset. The owner must be able to prove that the information added value or benefit to the owner, was specifically identified, and the owner provided a reasonable level of protection. This is called which of the following:
Trade Secret
“Employment of services, equipment and techniques designed to locate, identify and neutralize the effectiveness of covert technical surveillance devices.”, is the definition for which of the following?
Technical surveillance countermeasures
What is the primary purpose of an alarm system in physical security?
Detecting and alerting to security breaches or emergencies
What is the primary goal of a firewall in information security?
Manages the secure in flow and out flow of data in a device
In crisis management, what does “Incident Command System (ICS)” refer to?
A system for managing incidents and coordinating emergency response efforts
In information security, what is the primary purpose of a penetration test?
Identifying vulnerabilities in a system through controlled testing
What does the acronym “CPTED” stand for in the context of security principles?
Crime Prevention Through Environmental Design
In business continuity planning (BCP), what is the primary purpose of a business impact analysis (BIA)?
To identify and prioritize critical business functions and the effect of various threats on the business
What is “Reasonable Suspicion” in the context of an investigation
A legally defined standard that justifies further investigation
What is the primary goal of electronic surveillance in an investigation?
Monitoring and recording electronic communications for investigative purposes
What is the purpose of a background check in personnel security?
Verifying the trustworthiness of an individual
In personnel security, what is the main goal of a “Non Disclosure Agreement” (NDA)?
Protecting sensitive information and trade secrets
What does the term “Whistleblower” refer to in personnel security?
An individual who reports unethical or illegal activities within an organization
What is the primary purpose of perimeter security in physical security?
Protecting assets and personnel by controlling access to a defined area
Which type of security measure is designed to prevent tailgating or piggybacking?
Biometric authentication
In information security, what does “Encryption” involve?
Protecting data by converting it into a secure format
What is the main drawback of using mechanical combination locks in high security applications
Susceptibility to brute force attacks
The three basic types of glass are
Sheet, Plate and Float
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
What is the primary characteristic of a high pressure sodium light in security lighting
Poor color rendition
Which of the following is not a biometric benefit
Low cost
In the context of security lighting, what is meant by color rendition
The ability of a light resource to accurately reproduce colors
Which of the following best describes the principle of operation for a glass break sensor using shock detection
Monitors vibration patterns
Which of the following is not a benefit of using access control systems
Reducing security costs
Which of the following is not an advantage of using IP based surveillance cameras
Lower implementation costs
Which of the following is not typically included in a threat assessment
Historical weather data
What is the primary goal of network segmentation
Limiting the spread of security breaches
Which type of illumination is characterized by a rapid strike time and excellent color rendition
Metal Halide
Which of the following is not a common security protocol for secure communications
HTTP
In the context of sensors, what is the primary function of a bistatic radar sensor
Uses separate location for the transmitter and receiver
What is the primary advantage of using electromagnetic locks in secure facilities
Easy integration with access control systems
In the context of locks, what is the purpose of a relocking device in a high security safe
To automatically relock the safe if an attack is detected
Containers that are rated for both fire and burglary protection offer either one or two hour fire protection and have TL rating of
60
What is the primary characteristic of a mercury vapor light in security lighting
Long strike and restrike times
What is the primary goal of penetration testing
Identifying and exploiting vulnerabilities
Which of the following best describes an active infrared sensor
Emits infrared radiation and defects its reflection from objects
Which of the following is not a benefit of encryption
Enhancing Data availability
In the context of physical security what is the most critical consideration when selecting a security integrator
Experience and expertise in integration complex security systems
What is a key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage
Implementing full cutoff fixtures to direct the light onward
which type of sensor uses changes in capacitance to detect intrusions
Capacitance based sensor
What is a primary advantage of using microwave sensors in perimeter security
Less affected by weather conditions
What makes active sensors particularly effective for border security applications
Active sensors emit signals that can detect changes in the environment providing earl warnings of potential breaches
In what way does the use active infrared sensors benefit a complex security system in a prison environment
These sensors trigger alarms if inmates pass certain thresholds even in total darkness, enhancing night time security
what is the primary objective of crisis mitigation
To reduce the impact of a crisis
How often should physical security assessments be conducted
Annually
Which type of lock is designed to be resistant to picking and bumping by using a complex key design
Pin tumbler lock
In the context of access control, what is the time based access control system
A system that allows access based on the time of day
What is the critical consideration when deploying microwave sensors in a corporate campus environment
Ensuring that the frequency of the microwave sensors does not interfere with the campus Wi-Fi and other communication systems
In what scenario is it particularly important to use security lighting with high durability and resistance to environmental factors
In coastal areas where salt spray, wind and moisture can degrade lighting fixtures quickly, affecting their functionality and the overall security of the area
Which of the following is not a benefit of using thermal imaging sensors in security applications
High cost of implementation
what is the key factor to consider when selecting outdoor security lighting to minimize light pollution while maintaining effective surveillance coverage
Implementing full cutoff fixtures to direct the light onward
What is the primary purpose of man trap
To control entry
To provide a barrier”
Which type of locking mechanism is often integrated into time lock systems for vault security
Combination Locking
Which of the following is a typical application for seismic sensor in physical security
Monitoring ground vibrations near sensitive facilities
Which type of lock is least suspectable to lock bumping
Disc detainer lock
Critical in PIDS
Accuracy
Response Time
How does a volumetric sensor provide an advantage over traditional beam sensors in protecting the interior of a warehouse
By creating a three dimensional protection zone that detects movement within the entire covered space
Primary benefit of using intrusion detection systems (IDS) in security operations
Real time threat detection
What is the most effective method for preventing tailgating in high security areas
“Installing additional CCTV cameras
Implementing mantraps or turnstiles
Which of the following is not a typical step in risk management process
Risk enhancement
In the event of security breach which of the following is the most important initial response action
Containing the breach to prevent further damage
What are the operational benefits of using bistatic radar sensors for coastline surveillance
Bistatic readers are particularly effective at low altitude and small object detection which his crucial for spotting small watercraft
What is the primary goal of risk treatment in the ISO 31000 risk management framework
To implement measures that reduce the likelihood and impact or risks to an acceptable level
Which of the following sensors is commonly used for perimeter protection by forming an invisible barrier between two points
Infrared Beam sensor
Which sensor type is commonly used in retail stores to detect when doors are open or closed
Magnetic Contact Sensor
What advantage does a volumetric sensor have over a perimeter sensor in securing a large ware house
Its provides coverage within the entire volume of the space, not just at the entry points
What makes an active sensor preferable for underwater intrusion detection systems compared to passive sensors
Active sensors, such as sonar, emit pulses and measure their echoes, which is effective under water where other signals may not propagate well.
In what situation would an acoustic sensor be more advantageous than a PIR sensor
Detecting glass breakage in secure rooms
Why are LEDs considered most advantageous for use in motion activated security lighting systems
LEDs offer instant on/off capabilities, which is ideal for motion detection scenarios
Which of the following sensor types can detect metallic objects moving in proximity
Magnetic sensor
What is the role of a data loss prevention (DLP) system
To detect and prevent unauthorized transmission of data
Which of the following is the most critical factor in the effectiveness of biometric security systems
False Acceptance Rate (FAR)
Which of the following is not a benefit of using proximity cards in access control systems
Higher level of security compared to biometric systems
Which of the following best describes the principle of operation for a passive infrared (PIR) sensor
Detects changes in thermal radiation
During an emergency, the actual shutdown of equipment should be assigned to
People familiar with the process
Which type of illumination is known for quick strike and restrike times
LED
Which of the following best describes the concept of convergence in physical security
Integration of physical and cyber security measures
Record safes for computer media require better protection than paper records because damage to computer media can occur at
125 Degrees Fahrenheit
In the context of physical security, what is the most significant advantage of using IP based surveillance cameras
Ability to integrate with other network based security systems
Which of the following best describes security through obscurity
High Security Measures
Hiding Measures
Vulnerability assessment purpose
Identify weakness
Which of the following is not a component of a business continuity plan
Marketing strategy
What is the primary objective of access control systems in physical security
To restrict unauthorized access to sensitive areas
Which of the following is not a benefit of using surveillance cameras
Enhancing data confidentiality
What is the main purpose of using a security entry vestibule in a high security building
To act as a security buffer zone that restricts access
Which type of illumination is known for quick strike and restrike times and excellent color rendition
Metal Halide
Which of the following is a significant consideration for a security data center
Transportation routes
Redundant power
Which of the following best describes a brute force attack
Guessing passwords through exhaustive key search
Which of the following is an example of a physical security measure
Security guards
What is the most effective method for preventing tailgating in high security areas
Installing additional CCTV cameras
Implementing mantraps or turnstiles
How does a line detection sensor work in conjunction witch CCTV systems to enhance security at subway station entrance
By triggering the CCTV system to record when someone crosses a specific threshold
What is the primary purpose of security token
Authenticating user identity
What is the primary function of a vibration sensor in a security system
Monitoring structural vibrations
which of the following technologies is commonly used to protect valuable items in museums by detecting touch or proximity
Capacitive sensor
What is the primary advantage of using light emitting diode (LED) in security applications
Greater energy efficiency and longer lifespan
What is a major advantage of using fluorescent lighting in interior security settings
High energy efficiency
What is the primary advantage of using a biometric lock over a traditional mechanical lock
Enhance security through unique user identification
Which of the following sensors is least effective for outdoor perimeter protection in high wind environment
Ultrasonic sensor
What is the most effective method for securing a facility’s perimeter
Using a combination of physical barriers, surveillance and access control
What is a primary function of a hard plate in a vault lock system
To prevent unauthorized access through physical attacks
In terms of security lighting, why is it important to consider both strike time and restrike time when planning the installation of new lighting fixtures
These times impact how quickly areas can be secured and monitored after initial activation or power interruption’s
What are the benefits of integrating adaptive lighting technology in security systems at dynamic environments like airports
It allows the lighting intensity to adjust based on natural light levels, enhancing visibility and reducing energy consumption
Which of the following is not a principle of defense in depth
Single point of failure
How does the implementation of an automated lighting control system, which adjusts based on activity levels enhance a facility’s security during off hours
Automated systems ensure that lighting is optimal only when activity is detected, saving energy and reducing wear while maintaining security
What is the primary function of a capacitance based sensor
To detect variations in capacitance caused by conductive objects
In security what is crash rated barrier
A barrier designed to withstand vehicle impacts
Which type of illumination is known for its high energy efficiency and good color rendition
LED
What considerations should be taken into account when deploying microwave sensors along a border fence in a desert environment
The sensors must be calibrated to ignore small, fast moving sand particles to reduce false alarms
Which of the following is not a principle of information security
Accountability
In the context of security lighting, what is luminance
The perceived brightness of a light source
What is key advantage of a combination lock in high security vaults
It does not require electricity to function
What is the primary function of a security barrier
To obstruct or control the movement of vehicles and people
Which of the following is a physical security measure for protecting information
Encryption software
Firewalls
Locking filling cabinets
Which of the following is the primary purpose of physical security
To prevent unauthorized access
Which of the following best describes the purpose of access control systems
To prevent unauthorized access
Which type of door is typically used for high security areas
Solid core door
Which of the following best describes the term least privilege
Granting employees the minimum access necessary to perform their duties
What is the main advantage of using microwave sensors in security applications
Can detect movement through non metallic barriers
What is the primary function of video analytics in surveillance systems
To automatically analyze and interpret video data for security purposes
Which of the following best describes a crisis communication strategy
A plan to manage communication during a crisis
Which of the following best describes the use of security screening at access points
Checking for prohibited items and verifying identities
What is a primary limitation of using ultrasonic sensors in security applications
Interference from environmental noise
What is the key advantage of using biometric authentication in access control systems
High level of security through unique identification
What is the primary benefit of using thermal imaging sensors in security
Ability to detect intruders in complete darkness
What is a common characteristic of high security fences
Anti climb features
Duress alarm function
Alert emergency
What does a security patrol primarily aim to achieve
To deter and detect security breaches
What is the primary advantage of using multi factor authentication (MFA) in physical security
Increased security by combining multiple authentication methods
What is the role of a security control room
To monitor and manage security systems
Which of the following best describes natural access control
Using natural barriers to control access
What is the primary function of a volumetric sensor in security systems
To detect changes in volume with a defined area
In physical security what is the purpose of a dead zone in surveillance
To prevent unauthorized access by limiting surveillance coverage
Which sensor technology is most effective for detecting motion through walls
Microwave sensors
In physical security what is a mantrap
A vestibule with two sets of interlocking doors to control entry and exit
What is the primary goal of confidentiality in information security
To protect data from unauthorized access
What is the primary purpose of a mantrap in physical security
To control access by trapping intruders
To provide a physical barrier against forced entry
To ensure single person entry
In the context of emergency response planning, which of the following is the most crucial aspect
Detailed evacuation procedures
Comprehensive employee training program
Regular emergency drills and exercises
What is a zero day vulnerability
A vulnerability that is exploited before the developer is aware of it
Record safes for computer media require better protection than paper records because damage to computer media can occur at
125 degrees Fahrenheit
Which of the following is not a primary goal of a security program
Profit Maximization
What is the main advantage of using smart locks in residential security systems
Enhanced key control and monitoring
Which of the following is not a method of risk mitigation
Amplification
In the context of security sensors, what is a false alarm
An alarm triggered without any actual threat or intrusion
What is the importance of adjustable beam angles in security lighting fixtures for a large warehouses
Adjustable angles allow the lighting to be customized to specific areas of interest, enhancing surveillance and detection capabilities
How does the restrike time of HID lamps affect security coverage during temporary power disruptions
Long restrike times may leave areas temporarily dark
Why would an art museum use a capacitance based sensors for individual high value exhibits
To detect any unauthorized contact or proximity to the artwork, which could signal an attempt to tamper with or steal the piece
Which type of illumination has poor color rendition but is highly energy efficient
Low Pressure Sodium
Which of the following is not a common type of sensor used in intrusion detection systems
Biometric sensors
Which type of sensor is most suitable for detecting movement within a confine, indoor space such as a storage room
PIR sensor
How do active infrared sensors improve the security of outdoor concerts or events
They can be used to create a perimeter where anyone breaking the infrared beam can trigger an immediate security response
Which type of lock is most resistant to picking and bumping
Disk detainer Lock
Which of the following best describes a security incident report
A record of security breaches and responses
Which of the following is a key challenge in implementing a security operations center (SOC)
High Initial cost
Difficulty in integrating with existing systems
Limited skilled personnel availability
What is the primary advantage of using thermal imaging sensors in security applications
Ability to detect intruders in complete darkness
In Security lighting, what is color rendition
The ability of a light source to accurately reproduce colors
Which of the following describes the principle that an employee should be under the direct control of one and only one immediate supervisor
Unity of command
Which of the following best describes the role of a security audit
To evaluate the effectiveness of security measures
To identify potential security vulnerabilities
To ensure compliance with security policies
What is the role security training for employees
To ensure employees understand and follow security protocols
Which of the following is not typically included in a security policy
Marketing strategies
Which of the following is not a common feature of high security fence
Wooden posts
Which of the following is a fundamental principle of GDPR (General Date Protection Regulation)
Data minimization
What is the primary advantage of using LED lights in security lighting
Greater energy efficiency and longer lifespan
Which of the following best describes the concept of resilience in crisis management
The ability to recover quickly from crisis
Which of the following best describes an inductance based sensor
Measures changes in inductance caused by metallic objects
What is the primary function of a bollard in perimeter security
To provide barrier against vehicular threats
What is the primary function of a security checkpoint
To detect and prevent unauthorized items from entering
What is the primary advantage of using a multi layered security approach
Increased redundancy and depth
Which of the following best describes a crisis management drill
A practice scenario to test crisis response
What is the primary characteristic of a metal halide light in security building
Excellent color rendition
What is the role of a crisis management team
To manage and respond to crisis
In the context of physical security, what is the primary purpose of implementing security layers
To provide multiple levels of protection to deter, detect and respond to threats
What is the primary goal of incident response planning
Minimizing damage from incidents
Which of the following is not a characteristic of a class III high security safe
Lightweight construction
What is the main purpose of a security incident response plan
To manage and mitigate the impact of security incidents
Which of the following is not a benefit of conducting regular security audits
Reducing operational costs
What is the main purpose of implementing security metrics
To measure security effectiveness
Which type of sensor is most effective for detecting motion in large open spaces
Microwave sensors
Which of the following is not a characteristic of a strong security policy
Profitability
What is the primary benefit of using combination locks in secure facilities
No need for keys
Which of the following is not a benefit of using thermal imaging cameras for perimeter security
Lower cost compared to visible light cameras
Which of the following describes the principle of a operation for a capacitance based sensor
Measure changes to capacitance when a conductive object enters the field
What is the principal function of a double cylinder deadbolt lock
Requiring a key for operation from both sides of the door
What type of sensor is most effective for detecting unauthorized entry through walls
Microwave sensors
Which of the following is not a common type of network security threat
Data encryption
What is the role of security lighting in physical security
To deter criminal activity by increasing visibility
What is the primary purpose of a security breach detection system
To prevent unauthorized access to secure areas
What is the most effective method for preventing tailgating in secure facilities
Implementing mantraps or turnstiles
Which of the following best describes the operation of a mono static radar sensor
Transmitter and receiver are co located
Which type of sensor is not affected by changes in temperature
Capacitance based sensor
What is the purpose of security perimeter
To delay and detect intruders
Which of the following is an example of physical security threat
Unauthorized entry
Which of the following best describes the purpose of a security checkpoint
To control and monitor access to a restricted area
Which of the following is a key consideration for physical security information management system (PSIM)
Cost
Scalability
Which of the following is not a principle of risk management
Risk elimination
What is the primary function of video analytics in security systems
To automatically analyze video data for security purposes
What is the primary purpose of a duress alarm system in a secure facility
To alert security personnel of an emergency situation
What is the most critical factor in the effectiveness of an intrusion detection system (IDS
Detection accuracy
in the context of physical security what is bollard spacing
The distance between bollards to prevent vehicle passage
In physical security what is the purpose of a intrusion detection system
To direct unauthorized entry into a secured areas
Which of the following is a characteristic of a secure password
It contains a mix of letters, numbers, and symbols
Which of the following best describes the primary function of a terrain following radar
To follow the contours of the terrain for low altitude flight
Which of the following best describes the concept of security by design
Integrating security measures into design of facilities from the outset
Which of the following best describes the principle of defense in depth
Using multiple layers of security controls to protect assets
What is the primary advantage of using biometric access control systems in high security environments
Non intrusive and high accuracy identification
What is the primary function of a mortise lock
Providing a secondary locking mechanism
Which of the following best describes the concept of defense in depth
Using multiple layers of security controls
What is the primary objective of crisis prepareness
To ensure readiness to handle crisis effectively
Prevent Loading dock access
Lighting
Controlled access
What is the primary purpose of a vulnerability assessment
To identify weakness in security measures
What is the main disadvantage of a using physical barriers for security
High cost
Complexity of implementation
Reduced flexibility
Which of the following best describes the principle of a mono static radar sensor
Transmitter and receiver are co located
What is the purpose of crisis debriefing
To review and analyse the response to crisis
Which of the following best describes the purpose of a security survey
To assess the effectiveness of existing security measures and identify improvements
Which of the following best describes the concept of layered security
An approach to security that uses multiple levels of protection
Which of the following is an example of multi factor authentication
Password and fingerprint
What is the primary function of a strike plate in a door lock assembly
Providing a surface for the bolt to engage
Which of the following is not a component of a security risk assessment
Market positioning
What is the primary benefit of using security glazing on windows
Enhanced protection against forced entry and breakage
What is the primary objective of a business impact analysis (BIA)
To evaluate the potential effects of disruptions on business operations
What is the purpose of a security risk assessment
To identify and evaluate potential security threats
Which of the following is a primary feature of biometric access control systems
Use of unique biological traits for identification
What is the role of a security barrier in physical security
To obstruct or control the movement of vehicles and people
Which of the following is an example of a physical security measure
Surveillance cameras
Which of the following best describes convergence in security
Physical and cyber integration
Which of the following is not a common objective of a security policy
Maximizing employee productivity
Which of the following is a key component of an effective security strategy
Proactive Measures
Reactive Measures
What is the role of leadership in crisis management
To provide direction and support during a crisis
Which of the following best describes the operation of an inductive proximity sensor
Measures changes in inductance when a metal object approaches
Which of the following is a common physical barrier in security
Fences
Which of the following is key for secure access control
Reliability
Convenience
In Security lighting, what is meant by the term strike time
The time taken for a light to reach full brightness after being switched on
What is the primary function of surveillance cameras
To monitor and record activities for security purpose
Which of the following is a primary goal of physical security
Protecting physical assets and people
Which of the following is typical characteristic of a high security lock
Resistance to pricking and drilling
Which of the following is considered the most effective method for securing a high value storage areas with a facility
Implementing biometric access control and CCTC surveillance
What is the main purpose of security awareness programs
To educate employees about security risks
What is the function of a security barrier
To obstruct or control movement for security purposes
Which of the following is not a primary objective of physical security
To monitor employee productivity
What is the primary purpose of a vulnerability assessment in physical security
To identify weakness in security measures
Which of the following best describes a safe room
A secure room to protect individuals during emergencies
What is the role of an escort policy in physical security
A guideline for accompanying visitors within secure areas
In the context of emergency response planning, which of the following is the most crucial aspect to ensure the safety of personnel
Detailed evacuation procedures
Comprehensive employee training programs
Regular emergency drills and exercises
Which type of lock is considered the most secure
Deadbolt lock
Which of the following best describes the role of a security officer during an emergency
To ensure orderly and safe evacuation of personnel
In the context of security sensors, what is a nuisance alarm
An alarm caused by environmental factors or harmless stimuli
The most common types of sensors used with protect vaults are vibration and
Contact
In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance
Increased lighting in open areas
Which of the following is not a feature typically found in high security padlocks
Wifi Connectivity
What is the purpose of security signage
To provide warnings and instruction to enhance security
In terms of Crime Prevention Through Environmental Design (CPTED) which of the following strategies is most effective for natural surveillance
Increased lighting in open areas
Which of the following is not a primary goal of security risk assessment
Developing new products
What is the primary function of a security information and event management (SIEM) system
To monitor and analyze security events
Which of the following is the most critical factor in selecting a security fence for a high risk facility
Height of the fence
Material of the fence
What is the role of lighting in physical security
To deter criminal activity by increasing visibility
In the context of physical security, what is the most effective method for preventing unauthorized access through a loading dock
Increased lighting
Controlled access points and surveillance
Which of the following is an example of a security measure for protecting physical assets
Security patrols
Which of the following is not a component of a comprehensive security policy
Marketing strategies
In the context of security sensors. What is the probability of neutralization (pn)
The probability of an adversary being neutralized
Which of the following best describes least privilege
Minimum access
What is the primary function of a duress alarm in a security facility
To alert security personnel of an emergency situation
What is the primary function of a duress alarm system
To alert security personnel of an emergency
What is the primary advantage of using thermal imaging cameras for perimeter security
Ability to detect intruders in low visibility conditions
Which of the following is not a primary consideration when selecting a security integrator
Proximity to the facility
Which of the following is an example of a physical security control for protecting assets
Surveillance cameras
What is a common indicator of a phishing attack
An unexpected email asking for personal information
In the context of sensors, what is the primary function of a passive infrared (PIR) sensor
To detect infrared radiation emitted by objects
Which of the following is not a component of the Crime Prevention Through Environmental Design (CPTED) strategy
Data encryption
Which of the following best describes the role of a security officer during an emergency
To ensure orderly and safe evacuation of personnel
In physical security. What is a restricted area
An area where access is limited to authorized personnel only
Which of the following best describes an intrusion detection system (IDS)
A system designed to detect unauthorized access or breaches
What is the purpose of security badges
To identity and control access for employees and visitors
Which of the following best describes the role of a security operations center (SOC) in physical security
To coordinate security efforts and provide real time monitoring and response
What is the primary function of a turnstile in an access control system
To provide a physical barrier that allows only one person to pass at a time
Which of the following best describes a crisis
An unexpected event that threatens the organization
In physical security, what is the purpose of a restricted area
To limit access to authorized personnel only
Which of the following is a key component of a crisis management plan
Response procedures
What is the primary purpose of using a volumetric sensor in security systems
To detect changes in volume within a define area
What is data encryption
To ensure data is only accessible to authorized users
Which of the following best describes anti tailgating devices in access control systems
Devices that prevent unauthorized following into secure areas
What is the primary purpose of a crisis management plan
Ensuring effective response to crisis
What is the primary function of an anti pass back feature in an access control system
To ensure that an individual cannot re enter an without first exiting
What is the main disadvantage of using biometrics for authentication
High Cost
Complexity of implementation
Which of the following is a critical consideration when designing a secure data center
Redundant power and cooling systems
High value storage method
Biometric control
What is the primary role of a Chief Information Security Officer (CISO)
Overseeing the organization information security program
Purpose of mantrap
Control entry
Provide barrier
What is the main disadvantage of using keypad locks in high security environments
Susceptibility to wear patterns revealing the code
In physical security, what is target hardening
Making a facility more resistant to attacks through physical measures
Which of the following is not an effective preventive measure in physical security
Conducting financial audits
What is the primary role a chief security officer (CSO)
Managing the organizations security strategy
What does the term personnel security refer to in the ASIS CPP Doman
Security Measures for employees and contractors
Which of the following is not a feature typically found in high security padlocks
Wi-Fi Connectivity
In access control systems, which of the following is considered a dual factor authentication method
Card reader and finger print scan
Why are strike and restrike times critical factors in the design of high security locks
Strike and restrike times determine how quickly a lock can reset after breach attempt, ensuring that repeated forced entry attempts are less likely to succeed
Which of the following is a primary risk of using narco analysis in legal cases
Inconsistent results under controlled substances
Violations of human rights laws
The potential of coerced or fabricated memories
Which of the following is not an assumption of McGregor’s Theory X
Employees are motivated by financial rewards
What is the main legal consideration when implementing a workplace violence prevention program
Ensuring the program does not violate privacy or discrimination laws
Which of the following is not a key component of risk management
Risk Elimination
What is the main disadvantage of relying solely on physical evidence
Susceptibility to environmental conditions
Which of the following is a physical security measure for protecting information
Locked filing cabinets
what type of sensor would be most effective in detecting an intruder in noisy industrial environment
Seismic Sensor
Which of the following is a critical consideration when choosing a cold site for disaster recovery
To availability of IT resources to rebuild operations
Which of the following is an example of a natural access control
Shrubs
When considering span of control which factors increases complexity
Broader span of control
More sophisticated interactions
Which of the following is not a benefit of encryption
Enhancing data availability
In a biometric vault lock systems, what is the main advantage over mechanical locks
Elimination of physical keys
Why might a security system designer opt for passive sensors in a highly secure data center
They do not emit energy that could potentially interfere with sensitive data equipment
What is the primary goal of financial management within security operations
Ensuring Operational efficiency
What is the primary risk of failing to evaluate contractors during a personnel risk assessment
Contractors may have conflicting loyalties that put the company at risk
In what scenario might a multi tiered incident command structure actually slow down crisis response
When decision making processes become bureaucratic due to excessive layers
What is the fundamental difference between threat assessment and vulnerability assessment in a security context
Threat assessment focuses on the external environment, while vulnerability assessment focuses on internal weakness