Security Management-Q's Flashcards
From an organizational standpoint the head of security should report to
a Superintendent of buildings
b Manager of buildings and grounds
c Head housekeeper
d A vice president or higher
D A vice president or higher
The most conspicuous role of the security department in any organization is that of
a Educational services
b Management services
c Special services
d Protective services
D Protective Services
Training sessions consisting of a security awareness program for new employees should be conducted by
a Special training officers
b Security personnel
c Consultants skilled in training
d Member of management
B Security Personnel
There are necessary and legitimate exceptions to the principle of unity of command One condition which sometimes allows for shifting in supervision is
a When order is given by the rank of captain or above
b When order is given by the head of a department
c When the order is given by the head of internal affairs
d During emergencies
D During Emergencies
Perhaps the most common shortcoming in the security industry is
a Lack of support by top management
b Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities supervisory training
c Lack of planning
d Lack of monetary resources
B Failure to properly prepare and equip new supervisiors with the tools to discharge their important responsibilities
Which of the following is not recommended policy with regard to security manuals
a It must be updated on regular basis
b Employee should not be allowed to have possession of it
c The manual should be put in the hands of all regular security personnel
d It should include procedural instructions for specific incidents
B Employee should not be allowed to have possession of it
Which of the following is not an advantage of using in house career personnel
a Career personnel develop a loyalty to the department
b Career personnel tend to be more ambitious
c There is more stability among career personnel
d Career personnel constitute a fixed limited cadre or pool of manpower resources
D Career personnel consitute a fixed limited cadre or pool of manpwer resources
Which of the following is known to be one of the disadvantages of contract security services
a Turnover
b Cost
c Manpower resource
d Skills
A Turnover
Ideally the person who should conduct the inspection of a security department is
a An outside consultant
b The second ranking person
c The security director or security manager
d The ranking sergeant
C The security Director or Security Manager
The process of determining the probability and cost of potential loss is known as
a Probability analysis
b Risk assessment
c Potential loss analysis
d Physical survey
B Risk Assessment
The ultimate responsibility for the internal security in a department should rest with
a The president
b Chairman of the board
c Security director
d The line supervisor
D The line supervisor
The issuance of weapons to guards is usually not justified
a In a situation where deterrence is needed in handling control of large amounts of cash
b In situations in which terrorism is a real threat
c In a situation where there would be greater danger to life safety without weapons than with them
d In a situation where there is no danger to life safety
D In a situation where there is no danger to life saftey
In issuing policy statements regarding the handling of disturbed persons the primary consideration is
a Legal liability to the disturbed
b Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger
c Legal liability to employees and third persons if restraint not achieved
d Employee community public relations
B Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger
Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability This process is called
a Loss event probability
b Threat assessment process
c Loss event profile
d Actual threat analysis
C Loss event profile
The likelihood or probability of risks affecting the assets becoming actual loss events is known as
a Loss event probability
b Loss event profile
c Treat analysis control
d Threat target control
A Loss event probability
The impact or effect on the enterprise if the loss occurs is known as
a Loss event profile
b Loss event probability
c Loss event criticality
d Security survey analysis
C Loss event criticality
Which of the following is considered to be one of the three basic functions of risk management
a Lock control
b Barrier control
c Disaster management
d Loss control
D Loss Control
18 Oscar Newman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets What is the name of this book
a Crime Prevention
b Crime Reduction
c Defensible Space
d Crime in Architectural Planning
C Defensible Space
From a security perspective what is the first factor to be considered in facility construction
a The identity of experienced consultants
b An effective security plan
c An architect with knowledge of physical security
d The building site itself
D The building itself
A critical on site examination and analysis of an industrial plant business home or public or private institution to ascertain the present security status to identify deficiencies or excesses to determine the protection needed and to make recommendations to improve the overall security is the definition of
a Security survey
b Risk analysis
c Full field inspection
d Crime prevention assessment
A Security Survey
There are two generally accepted definitions of risk These are most commonly known to risk managers and security officers as
a Potential risk and dynamic risk
b Profit risk and dynamic risk
c Potential risk and pure risk
d Pure risk and dynamic risk
D Pure risk and dynamic risk
The most effective deterrent to shoplifting is
a Highly competent and educated security officers
b Widespread use of sensor devices
c Well positioned CCTVs
d Well trained personnel
D Well trained personnel
A simplified answer to the question of why employees steal is
a Sickness in family
b To feed drug habit
c To live on a higher level
d The theft triangle
D The theft triangle
Many experts agree that the most important deterrent to internal theft is
a Threat of dismissal
b Fear of discovery
c Threat of prosecution
d Conscience pangs
B Fear of Discovery
Crime analysis is a key element in focusing the use of police and security resources to address crime problems Data collection and analysis are two specific steps The other two are
a Inspection and discovery of facts
b Response and feedback
c Feedback and corrective action
d Dissemination and feedback
D Dissemination and feedback
It is generally accepted that insurance rates are dependent upon two primary variables These are
a Cost of claims and competitors rates
b Competition among insurance companies and frequency of claims
c Cost of claims and frequency of claims
d Cost of claims and government regulations
C Cost of claims and frequency of claims
The basic types of protection which security personnel realize as best can be described by the following
a Fidelity Bonds
b Surety Bonds
c Burglary Robbery Theft Insurance
d All of the above
D All of the above
Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty and if that trust is violated the insurance company must indemnify the employer are called
a Surety Bonds
b Fidelity Bonds
c Insurance Bonds
d Blanket Bonds
B Fidelity Bonds
Protection for a corporation if there is a failure to perform specified acts within a certain period of time is known as a
a Contract Bond
b Blanket Bond
c Surety Bond
d Fiduciary Bond
C Surety Bond
The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as
a Urban Development Planning
b Conceptual Modeling in Architecture
c Environmental Design
d Environmental Security E S
D Environmental Security E S
The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as
a Natural Surveillance Techniques
b Image and Milieu
c Soft Area Protection
d Territoriality Cleansing
B Image and Milieu
The greatest ongoing threat to any business is
a Shoplifting
b Shrinkage
c Internal Theft
d Pilferage
C Internal Theft
Pilferage is defined as stealing in small quantities over a long period of time The taking of property entrusted to someones care is called
a Mistake of fact
b Misprison of a felony
c Uttering
d Embezzlement
D Embezzlement
The theft triangle consists of the following components
a Desire skill and training
b Motivation skill and opportunity
c Opportunity desire and skill
d Motivation opportunity and rationalization
D Motivation opportunity and rationalization
A key element in focusing the use of police and security resources to address crime problems is commonly called
a Data collection and analysis
b Systematic evaluation of data available
c Crime analysis
d Analysis and feedback
C Crime analysis
The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed
a Tempest
b Veiling
c Bugging
d Hardening
A Tempest