Sample Questions Flashcards
This type of ethics is most relevant to business, is active and applies ethical concepts in specific business situations. This form of ethics makes specific judgements about right and wrong and prescribes types of behaviour as ethical in the context of an activity. It makes claims about what should be done and what may not be done. This is best described as:
Applied ethics
This aspect of emergency management encompasses actions taken before an event to plan, organize, equip, train and exercise in order to deal with emergencies that cannot be avoided or entirely mitigated. This is called
Preparedness
This ASIS/ANSI ORM Security and Resilience in Organizations and Their Supply Chains (2017) outlines a risk assessment process. Which of the following describes the process?
Asset identification, risk identification, risk analysis and risk evaluation
When presenting a business case, this should tell the complete story of the case as it may be the only part of the document that some senior managers read, providing general information on the issues surrounding the business problem or project. The part of the business case that BEST describes this is which of the following?
Executive Summary
The plan do act check cycle has a step which looks at the planning analysis, then devises a solution, prioritizes the next steps and develops a detailed action plan. This step is referred to as which part of the cycle?
Do
The integration of traditional security functions and information (systems), IT security functions is known as
Convergence
Which of the following statements is true when interviewing a stuspect for a company internal theft?
The suspect should be made to be uncomfortable as possible in the interview room.
An audio or video recording of the interview is a valuable tool for confirming statements made by all persons present.
An audio or video recording of the interview is obstructive and may be contrary to law.
The interview is conducted in any location, preferably not at the workplace.
An audio or video recording of the interview is a valuable tool for confirming statements made by all persons present.
Scams and phishing schemes are used to infect victims with ransomware, a process of encrypting a user’s files and then demanding payment to decrypt them. This type of cyber attack is also know as
Cryptography
Email compromise scheme
Social engineering attack
Cryptoware
Cryptoware
Which of the following statements concerning interviewing and deception is true?
Deceptive persons answer questions in a direct, straghtforward, spontaneous and sincere manner
Some behavioural characteristics that suggest deception may also be displayed by truthful subject.
The assessment of a subject’s truthfulness is based on a single bahviour pattern
A single word or behaviour characteristics automatically means a person is lying or telling the truth.
Some behavioural characteristics that suggest deception may also be displayed by truthful subject.
There are three main characteristics of intrusion sensor performance. They are probability of detection, vulnerability to defeat and which of the following?
Detection capability
Bypass capability
Detection technology
Nuisance alarm rates
Nuisance alarm rates
The practice of borrowing capital to purchase assets that can increase revenue is called which of the following?
Banking
Leveraging
Loaning
Averaging
Leveraging
This maneragial task involves connecting different people and functions to achieve cooperation to enable a stated goal to be achieved. A good manager must have a broader view and understanding of what is happening and what needs to be done to synchronise different deparments working to bring them together with the right end goal in mind. This statement defines which of the following?
Planning
Organizing
Directing
Coordinating
Coordinating
These specifications make it easier to design systems and sell equipment across borders. Which of the following help establish design requirements for devices, systems and infrastructure to withstand threats?
Analysis
Standards
Specifications
Assessments
Standards
When using a third party investigator to conduct pre employment background investigations, which of the following statements is correct?
The accountability for the final evaluation of the background investigation remains with the employer
Person’s with any form of criminal history should never be recommended for hiring.
The age of any adverse information and the age of the applicant at the time of the adverse incident is not relevant.
The third party’s judgment of the background investigation is considered final.
The accountability for the final evaluation of the background investigation remains with the employer
A company is interested in purchasing property overseas. They decide to conduct an investigation to evaluate the current property owners, the location, the finances, and operations of the target property. Which of the following best describes this type of investigation?
Background
Compliance
Due Diligence
Financial
Due diligence
Which of the following BEST describes the following?
The equipment is primarily used to
Detect activities that call for a security response
Collect images of an incident for later review
Assist with incident assessment
Video surveillance
Access control
Incident detection
CCTV surveillance
Video surveillance
Which statement BEST describes non verbal responses?
Voice characteristics such as tone, pitch, speed and clarity
Body movements and position changes, gestures, facial expressions and eye contact.
Both spoken words and gestures that serve as word substitutes, such as nodding the head to indicate yes.
Voice characteristics and body movements that indicate deception.
Body movements and position changes, gestures, facial expressions and eye contact.
If an executive from the organization is kidnapped and made incapable of running the company, the organization can expect three types of financial losses. One of these is:
The government finding the organization for failing to provide adequate security.
The subsequent lawsuit for the executive’s family for the loss of the executive
The executive’s services will be lost either temporarily or permanently. which can be costly.
The costly loss of corporate revenue
The executive’s services will be lost either temporarily or permanently. which can be costly.
Which describes an investigative interview’s attentiveness, concentration, acceptance, detachment and patience. this best decribes which of the following skills?
Active listening
Objective demeanour
Non verbal attention
Interviewer attentiveness
Active listening
ABC corporagtion has a management style where managers and supervisors guide their employees towards achieving organization’s obectives. The workers enjoy a higher workplace morale and are happy they work with management towards success. This type of management is known as which of the following?
Employee driven
Autocratic
Laissez Faire
Democratic
Democratic
Which of the following BEST describes the document that tells how much money an organization generates (revenue), how much it spends (expenses) and the difference between those figures (net income)?
Income statement
Expense sheet
Cash flow statement
Balance sheet
Income statement
DEF Company is an electronics hardware receiving, storing, and shipping consumer electronics. The company’s security director conducted a vulnerability analysis and reported that a lack of physical security controls exist to control thefts. Additionally, the company has no data on product losses, nor does a fraud or theft prevention program exist. These vulnerabilities are best described as?
A perceived opportunity to commit theft or fraud
Employees with previous criminal convictions will be tempted to steal
Employees with a lifestyle that is beyond their financial obligation.
A perceived need to steal electronics
A perceived opportunity to commit theft or fraud
A security weakness or practice that may faciliate or allow a threat to occur defines which of the following?
Vulnerability
Risk
Loss event
Criticality
Vulnerability
Three financial reports or statements have become accepted as standard and they make it possible to paint a clear picture of a company’s current and prospective financial health. They are:
the balance sheet, portfolio ratio and cash flow statement
The income statement, profit and loss and cash flow statement
The income sheet, profit ratio and cash flow statement
The income statement, balance sheet and cash flow statement
The income statement, balance sheet and cash flow statement
Which of the following statements best describes ISO industry standards?
ISO standards address training, employee competencies, products, rpocesses and quality control
ISO standards often become recognized as industry best practices and becomes market requirements
ISO regulates, legislates and enforces compliances to standards.
ISO is governmental organization
ISO standards often become recognized as industry best practices and becomes market requirements
Information warrenting protection must be appropriately identified and marked using various levels to distinguish the degree of sensitivity, confidentiality, restricted, limited, non public etc. Who in the organization is best suited to define the security level?
The originator of the information
The IT security manager
The security manager
The IT manager
The originator of the information
Documented security instructions or standard operating procedures useed as an essnetial reference for security personnel to know what is expected of them is also called
Security training manual
Security department policy and procedures
Corporate policy and procedures
Security post orders
Security Post Orders
This detector can use buried cable or transmitting and receiving signals relying on consistent reception of transmitted or reflected energy. When energy levels change due to a reflection or deflection, an alarm is transmitted. This is called ________ detection.
Vibration
Infrared
Microware
Capacitance
Microwave
When an investigator is questioning an employee who is suspected of stealing funds from the organization, this is best described as an:
Informational interview
Interview
Non accusatory interview
Confrontational interview
Confrontational interview
ABC inc decided to reduce the risk of theft by spreading valuable assets to various locations, while applying target hardening strategies and countermeasures. However, a risk of the theft remains. This is referred to as
Residual threat
Residual risk
Risk spreading
Residual impact
Residual risk
Which of the following statement BEST describes a CCTV camera’s field of view?
The area visible through the camera lens
The location or area intended to be observed
The function of a CCTV camera which best controls colour rendition
The view from the camera that is recorded
The area visible through the camera lens
No matter how an adversary attempts to accomplish their goal, effective elemetns of the physical protection systems will be encoutered. This is BESt described to as which of the following?
Design criteria
Performance based design
Balanced protection
Conceptual design criteria
Balanced protection
ABC Inc’s information system human resources files have been compromised and an unknown cyber criminal is demanding a payment of USD 1 million or they will release the confidential information onto public internet. This type of threat is known as which of the following?
Phishing
Malware
Virus ware
Ransomware
Ransomware
When designing the physical security protection for the facility, this layer of security measures included protective lighting, intrusion detection systems, locks, signs, barriers such as fencing, and building exterior walls and openings. this BEST describes which layer or protection?
Outer
Perimeter
Middle
Inner
Middle
Cyber criminals were disguising themselves as members from ABC Inc human resource group and contacted employees of ABC Inc asking recipients for their username and passwords. This type of threat is known as
Ransomware
Phishing
Malware
Virusware
Ransomware
The following theory asserts that a person’s behaviour is driven by basic needs at different levels and is still widely recommended to analyse individual employee motivation. This is referred to which of the following?
Motivation Hygiene Theory
McGregor’s Theory
Maslow’s Theory
Hertzberg’s Theory
Maslow’s Theory
To monitor and measure an organization’s risk management performance, a set of performance indicators should be developed to measure both the management systems and its outcomes. Measurements should meet which of the following metrics?
Quantitative or qualitative
Qualitative
Quantitative
Quantitative and SMART
Qualitative or quantitative
ABC Inc installed perimeter fence at the local warehouse. Which of the following best describes the application of this measure?
Deterrence and response
Delay and response
Access control and delay
Access control and deterrence
Access control and deterrence
According to most international legal requirements, these do not have to be registered to be protected. Nevertheless, a person can formalize ownership through government registration, which may help any later enforcement actions. This applies to which of the following?
Patents
Trademark
Trade secrets
Copyrights
Copyrights
A security officer deployment configuration where a proprietary supervisor oversee contract front line officers is know as
Contract Principle-Agent
Proprietary Principal-Agent
Hybrid Principal-Agent
Contract-Agent
Hybrid Principal-Agent
Which of the following best describes ESRM
ESRM assigns determined risks to specific programs
ESRM is an element of an existing security program within the organzation
ESRM is management program or process using a strategic approach.
ESRM is built around existing security programs in the organization including sub programs.
ESRM is management program or process using a strategic approach.
In a bomb threat assessment, the threat evaluation team is an important asset. Which of the following statements is correct?
The TET can manage several different sites
The team’s final decisions are made by several members
A record keeper is an important part of the team
A large team is better than a smaller team
A record keeper is an important part of the team
An organiztion is planning highly sensitive meetings, involving information which would be considered highly confidential and proprietary and not intended for disclosure. The organization wants employement services, equipment and techniques designed to locate, identify and neutralize covert technical surveillance devices, which may be in or near the meeting areas. Which type of services BEST describes what the organization needs?
Contracted counter surveillance
Technical surveillance countermeasures
Contracted investigation services
Technical security services
Technical surveillance countermeasures
When conducting a security survey which of the following should be the focus of the assessment?
Threats
Consequences
Assets
Vulnerabilities
Vulnerabilities
Private and personal information pertaining to an organization’s employees, management, business relationships, and customers is also often referred to as
Employee Personnel Records
Organization’s Personnel Records
Trade Secrets
Personally Identifiable information
Personally Identifiable information
In ESRM, who owns the risk decisions for identifable assets?
The security manager
The supervisors and managers
The asset owner
The employees and non employees
The asset owner
To ensure sustained longevity and success, there are four critical concepts tht comprisethe foundation of ESRM. They are holistic risk management, partnership with stakeholders, transparency and which of the following?
Resilience
Preparedness
Governance
Convergence
Governance
The primary goal of an interview is which of the following?
Admission of guilt
Truthful information
Recollection of facts
Confession to a crime
Truthful information
This is measured in terms of frequency or probability, where frequency is the number of times an undesired event happens in a defined time period. this is called
Observability
Impact
Criticality
Likelihood
Likelihood
Programs developed and implemented prior to an incident used to support mitigation of, response to, and recovery from emergencies is referred to as which of the following?
Mitigation
Recovery
Preparedness
Response
Preparedness
Tom, the CSO at DEF Inc, has a leadership style where he perceives subordinates need direct supervision and instructions to their complete work. This describes which of the following leadership styles?
Laissez-faire
Behavioural
Authoritarian
Democratic
Authoritarian
CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedufral means. CPTED is a crime prevention theory grounded in environmental criminology. CPTED primarily focuses on which of the following physical protection system principles?
Delay
Deterrence
Detection
Response
Deterrence
The Plan-Do-Check-Act (PDCA) cycle has a step where one examines the solutions devised to address the problem. The point is to check whether the solutions are producing outcomes that are consistent with the plan. This step is referred to as which part of the cycle?
Plan
Do
Check
Act
Check
A suspicious letter was received in the mailroom delivered through the local postal delivery system. The letter is suspicious because it is directed to the CEO and the return address is a person known to have made threats. the large, brown envelop feels like it has granular sand-like material contained inside. Which of the following is a correct reaction?
Move the package outside immediately.
Open the items enough to examine the contents, while awaiting emergency services
Submerge the item in water, placing a heavy object on top to ensure it remains submerged
Consider moving the item to an isolated place and wait for emergency services.
Consider moving the item to an isolated place and wait for emergency services.
Which of the following statements would be considered an interviewing clue to an investigator, indicating a deceitful subject?
No I didn’t steal the money
I couldn’t take that money. I wouldn’t do that type of thing.
I did not steal that USD12000 or whatever it is. I didn’t steal a penny of it.
Absolutely not; I had nothing to so with it.
I couldn’t take that money. I wouldn’t do that type of thing.
The enterprise security risk management (ESRM) cycle involves a process of identifying and prioritizing organizational assets and the process involves three key roles. Which of the following identifies the key roles?
All employees, the risk manager, legal counsel
The asset owner, top management, the security professional
All employees, the risk manager, the security professional
The asset owner, top management, the risk manager
The asset owner, top management, the security professional
Which of the following statements is correct when reviewing an incident reporting and management database?
Management needs to avoid flexibility in establishing and maintaining the database system
Regardless of the size of the other category, making changes to the database is not recommended because reporting will change.
To be cost effective, an asset protection program must consider only the major incidents and events
If 80 percent of each month’s reports fall into the “other” category, new categories should be developed.
If 80 percent of each month’s reports fall into the “other” category, new categories should be developed.
Which of the following statements BEST describes risk assessments as they relate to information systems?
Organizations are recommended to only perform qualitative risk assessments
Organizations are recommended to only perform quantitative risk assessments
Risk assessment of the organization’s information systems should be performed once.
Risk assessments should identify risks, quantify them, and prioritize them according to the organization’s criteria for risk acceptance.
Risk assessments should identify risks, quantify them, and prioritize them according to the organization’s criteria for risk acceptance.
The property owner in a 20-unit townhouse complex decided to reinforce the privacy of the children’s playground by adding a security patrol to the area to deter illicit drug use by trespassers, along with overt CCTV surveillance, with perimeter fencing and an access controlled gate. This is BEST known in CPTED as which of the following?
Management and maintenance support
Legitimate activity support
Mechanical measures
Natural measures
Legitimate activity support