Q&As Flashcards
When conducting a thorough vulnerability analysis, which of the following is a step in identifying preventive measures?
a) Determine and evaluate significant threats, hazards and exposure to determine the likelihood of occurrence.
b) Identify the assets of the organization and determine the asset value as determined by management.
c) Identify the threats to the organization and determine the impact of a loss to the organization.
d) Interview employees to understand their experiences with loss events.
Determine and evaluate significant threats, hazards and exposure to determine the likelihood of occurrence.
The process of assessing security-related risks from internal and external threats to an entity, its assets and personnel, is called a ________________.
a) Vulnerability Assessment
b) Risk Assessment
c) Security Survey
d) Loss Event Profile
Risk Assessment
This is considered the most common reliable tool for determining adequacy and foreseeability and focuses on:
The risks to the physical assets and property
The protection measures (against any risk) that comprise the realm of physical security
Measuring three basic factors: quality, reliability and cost
This process is called a ________________.
a) Risk Analysis
b) Vulnerability Analysis
c) Security Survey
d) Loss Event Survey
Security Survey
These are described as the most important written instructions for the security force which express the policies of the protected enterprise, summarize required officer duties and provide a basis for site-specific training. They are called:
a) Corporate Policy & Procedures
b) Security Department Policy & Procedures
c) Security Post Orders
d) Security Training Manual
Security Post Orders
In the following formula, what does K equal? K = Cp + Ct + Cr + Ci − I Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total related costs (remove old asset, install new, etc.) Ci = lost income cost I = available insurance or indemnity a) Return on Investment (ROI) b) Cost of Loss (COL) c) Avoided Cost of Loss (ACOL) d) Incident Frequency Factor (IFF)
Cost of Loss (COL)
Which of the following processes places more focus on evaluating vulnerabilities?
a) Risk Assessment
b) Security Survey
c) Loss Event Likelihood Profile
d) Loss Event Impact Profile
Security Survey
Which of the following is suggested as part of evaluating an Inadvertent Threat?
a) Long-term data collected on weather and other natural hazards, terrains, and environments.
b) Evaluate information provided by neighboring businesses for natural events which have caused losses.
c) Unexpected natural events can occur so some degree of all-hazard preparedness is evaluated.
d) Utility interruptions, closure of access routes, unwanted attention or traffic, full or partial operation shutdowns and productivity disruptions.
Utility interruptions, closure of access routes, unwanted attention or traffic, full or partial operation shutdowns and productivity disruptions.
A measure which is based on a reference that involves at least two points, quantity over time, is called a ___________.
a) Qualitative process
b) Measurement indicator.
c) Quantity over time process.
d) Metric indicator.
Metric indicator.
A list of the kinds of threats or hazards affecting the assets to be protected in an organization is called a _____ _______ Profile.
a) Asset Identification
b) Loss Event
c) Loss Impact
d) Security Survey
Loss Event Profile
Collecting site historical loss data, neighborhood makeup/historical loss data, overall geographical location, political and social conditions is involved in the process of determining a loss event’s ________.
a) Impact
b) Criticality
c) Likelihood
d) Observability
Likelihood
When evaluating PPS solutions, including engineering, design, hardware and software costs is part of ______________.
a) Threat assessments
b) Life cycle cost estimates
c) Cost of loss estimations
d) Loss event likelihood estimates
Life cycle cost estimates
“A weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss event”, is a definition of which of the following?
a) Loss event
b) Vulnerability
c) Risk
d) Criticality
Vulnerability
(SAMPLE RISK MATRIX) High-Medium-Low/Low-Moderate-High
The above matrix is an example of a _________ evaluation.
a) Quantitative
b) Qualitative
c) Substantive
d) Objective
Qualitative
Which of the following is a TRUE statement regarding threats and vulnerabilities?
a) Vulnerability is a characteristic of the organization and controllable to some degree.
b) Threats are a characteristic of the organization and controllable to some degree.
c) Vulnerabilities are usually outside the control of the organization.
d) Threats are all predictable using a properly applied threat assessment process.
Vulnerability is a characteristic of the organization and controllable to some degree.
Which of the following is considered part of developing an effective PPS using security-in-depth principles of the 4-D’s?
a) Deter, detect, delay, and deny
b) Deter, detect, delay, and dispatch
c) Detect, delay, dispatch and detain
d) Detect, delay, deny and dispatch
Deter, detect, delay, and deny