Sample Questions Flashcards
This type of ethics is most relevant to business, is active and applies ethical concepts in specific business situations. This form of ethics makes specific judgements about right and wrong and prescribes types of behaviour as ethical in the context of an activity. It makes claims about what should be done and what may not be done. This is best described as:
Applied ethics
This aspect of emergency management encompasses actions taken before an event to plan, organize, equip, train and exercise in order to deal with emergencies that cannot be avoided or entirely mitigated. This is called
Preparedness
This ASIS/ANSI ORM Security and Resilience in Organizations and Their Supply Chains (2017) outlines a risk assessment process. Which of the following describes the process?
Asset identification, risk identification, risk analysis and risk evaluation
When presenting a business case, this should tell the complete story of the case as it may be the only part of the document that some senior managers read, providing general information on the issues surrounding the business problem or project. The part of the business case that BEST describes this is which of the following?
Executive Summary
The plan do act check cycle has a step which looks at the planning analysis, then devises a solution, prioritizes the next steps and develops a detailed action plan. This step is referred to as which part of the cycle?
Do
The integration of traditional security functions and information (systems), IT security functions is known as
Convergence
Which of the following statements is true when interviewing a stuspect for a company internal theft?
The suspect should be made to be uncomfortable as possible in the interview room.
An audio or video recording of the interview is a valuable tool for confirming statements made by all persons present.
An audio or video recording of the interview is obstructive and may be contrary to law.
The interview is conducted in any location, preferably not at the workplace.
An audio or video recording of the interview is a valuable tool for confirming statements made by all persons present.
Scams and phishing schemes are used to infect victims with ransomware, a process of encrypting a user’s files and then demanding payment to decrypt them. This type of cyber attack is also know as
Cryptography
Email compromise scheme
Social engineering attack
Cryptoware
Cryptoware
Which of the following statements concerning interviewing and deception is true?
Deceptive persons answer questions in a direct, straghtforward, spontaneous and sincere manner
Some behavioural characteristics that suggest deception may also be displayed by truthful subject.
The assessment of a subject’s truthfulness is based on a single bahviour pattern
A single word or behaviour characteristics automatically means a person is lying or telling the truth.
Some behavioural characteristics that suggest deception may also be displayed by truthful subject.
There are three main characteristics of intrusion sensor performance. They are probability of detection, vulnerability to defeat and which of the following?
Detection capability
Bypass capability
Detection technology
Nuisance alarm rates
Nuisance alarm rates
The practice of borrowing capital to purchase assets that can increase revenue is called which of the following?
Banking
Leveraging
Loaning
Averaging
Leveraging
This maneragial task involves connecting different people and functions to achieve cooperation to enable a stated goal to be achieved. A good manager must have a broader view and understanding of what is happening and what needs to be done to synchronise different deparments working to bring them together with the right end goal in mind. This statement defines which of the following?
Planning
Organizing
Directing
Coordinating
Coordinating
These specifications make it easier to design systems and sell equipment across borders. Which of the following help establish design requirements for devices, systems and infrastructure to withstand threats?
Analysis
Standards
Specifications
Assessments
Standards
When using a third party investigator to conduct pre employment background investigations, which of the following statements is correct?
The accountability for the final evaluation of the background investigation remains with the employer
Person’s with any form of criminal history should never be recommended for hiring.
The age of any adverse information and the age of the applicant at the time of the adverse incident is not relevant.
The third party’s judgment of the background investigation is considered final.
The accountability for the final evaluation of the background investigation remains with the employer
A company is interested in purchasing property overseas. They decide to conduct an investigation to evaluate the current property owners, the location, the finances, and operations of the target property. Which of the following best describes this type of investigation?
Background
Compliance
Due Diligence
Financial
Due diligence
Which of the following BEST describes the following?
The equipment is primarily used to
Detect activities that call for a security response
Collect images of an incident for later review
Assist with incident assessment
Video surveillance
Access control
Incident detection
CCTV surveillance
Video surveillance
Which statement BEST describes non verbal responses?
Voice characteristics such as tone, pitch, speed and clarity
Body movements and position changes, gestures, facial expressions and eye contact.
Both spoken words and gestures that serve as word substitutes, such as nodding the head to indicate yes.
Voice characteristics and body movements that indicate deception.
Body movements and position changes, gestures, facial expressions and eye contact.
If an executive from the organization is kidnapped and made incapable of running the company, the organization can expect three types of financial losses. One of these is:
The government finding the organization for failing to provide adequate security.
The subsequent lawsuit for the executive’s family for the loss of the executive
The executive’s services will be lost either temporarily or permanently. which can be costly.
The costly loss of corporate revenue
The executive’s services will be lost either temporarily or permanently. which can be costly.
Which describes an investigative interview’s attentiveness, concentration, acceptance, detachment and patience. this best decribes which of the following skills?
Active listening
Objective demeanour
Non verbal attention
Interviewer attentiveness
Active listening
ABC corporagtion has a management style where managers and supervisors guide their employees towards achieving organization’s obectives. The workers enjoy a higher workplace morale and are happy they work with management towards success. This type of management is known as which of the following?
Employee driven
Autocratic
Laissez Faire
Democratic
Democratic
Which of the following BEST describes the document that tells how much money an organization generates (revenue), how much it spends (expenses) and the difference between those figures (net income)?
Income statement
Expense sheet
Cash flow statement
Balance sheet
Income statement
DEF Company is an electronics hardware receiving, storing, and shipping consumer electronics. The company’s security director conducted a vulnerability analysis and reported that a lack of physical security controls exist to control thefts. Additionally, the company has no data on product losses, nor does a fraud or theft prevention program exist. These vulnerabilities are best described as?
A perceived opportunity to commit theft or fraud
Employees with previous criminal convictions will be tempted to steal
Employees with a lifestyle that is beyond their financial obligation.
A perceived need to steal electronics
A perceived opportunity to commit theft or fraud
A security weakness or practice that may faciliate or allow a threat to occur defines which of the following?
Vulnerability
Risk
Loss event
Criticality
Vulnerability
Three financial reports or statements have become accepted as standard and they make it possible to paint a clear picture of a company’s current and prospective financial health. They are:
the balance sheet, portfolio ratio and cash flow statement
The income statement, profit and loss and cash flow statement
The income sheet, profit ratio and cash flow statement
The income statement, balance sheet and cash flow statement
The income statement, balance sheet and cash flow statement