Revision Flashcards

1
Q

The four characteristic principles involved in internal thefts scams include

A

diversion,
conversion,
disguise,
divergence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Carlson identifies five specific categories of distinction between public and private policing:

A

Philosophical.
Legal.
Financial.
Operational.
Security/Political.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The foundation for any WPV program is the security risk assessment (or needs assessment) which should asses three elements:

the types of threats,

A

the types of threats,
vulnerabilities
consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A violence risk assessment program employs three characteristics:

A

diversion,
delay
response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The 4 most distinctive and important elements of WPV are:

A

behavioral recognition,
notification,
assessment,
intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Known subject assessment for WPV can be broken down into three levels of assessment:

A

initial,
threshold,
comprehensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat is a combination of 4 elements:

A

adversary capabilities,
equipment,
motivation or intent,
and likelihood of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The security manager should engineer the PPS by using the building blocks of three characteristics

A

people,
procedures,
technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of systems approach for PPS follows three general steps:

Assessmentof vulnerability

A

assessment of vulnerability,
implementation of countermeasures,
evaluation of effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A well-engineered PPS exhibits the following characteristics:

A

protection-in-depth
minimum consequence of component failure
balanced protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CPTED is congruent with the security mission of three elements characteristics:

A

Deter
Detect
Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The three approaches to situational crime prevention Increasing the effort:

A

Increasing the risks
Reducing anticipated rewards
Removing excuses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Second generation CPTED employs four main strategies

A

Cohesion.
Capacity threshold.
Community culture.
Connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Three main characteristics of intrusion sensor performance are

probability of detection (PD)

A

probability of detection (PD),
nuisance alarm rate
vulnerability to defeat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can divide sensors into these clusters :

A

buried line,
fence-associated,
freestanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sensors may be grouped by three application:

A

Boundary-penetration sensors.
Interior motion sensors.
Proximity sensors.

17
Q

Learning can be separated into three domains:

A

Cognitive learning (knowledge-based).
Affective learning (attitudinal)..
Psychomotor learning (physical skills).

18
Q

Four elements of physical design, which are

A

Deterrence
Detection
Delay
response.

19
Q

The three planning and assessment phase for security design:

identifying assets

A

identifying assets
considering vulnerabilities
assessing risk.

20
Q

The complete set of procurement documents, known as contract (or bid) documents, will consist of three sections:

A

contractual details
construction specifications,
construction drawings.

21
Q

If an organization discovers that its copyright has been violated, it is essential to take action immediately. Response tools include

A

hiring legal counsel;
informing the proper authorities;
conducting investigations, raids, and seizures
initiating civil litigation, administrative proceedings, and criminal prosecutions.

22
Q

The following are key steps to take after an information loss:

A

Investigation
Damage Assessment
Recovery and Follow-up

23
Q

When measuring the potential consequences of a loss of information phases should always considered:

A

Timing
time dependencies
project

24
Q

Just as in other security disciplines, three other characteristics control objectives must be met for information security:

A

Detection
Recovery
compliance

25
Q

As in other security disciplines, information systems countermeasures can be divided into three broad classifications:

control

A

administrative controls:
technical controls:
physical controls

26
Q

Crisis Management objectives are three:

minimize the probability of a threat or emergency.

A

minimize.
mitigate .
recover

27
Q

The four elements required for a bombing.

A

motive,
material,
knowledge,
opportunity

28
Q

Threat evaluation is a complex management decision that requires preparation such as:

Procedures

A

Procedures
Planning
Training
rehearsal.

29
Q

The fundamental principles when bombs threat occures are:

3

A

Identification
Investigation
Response