The 200 Flashcards

1
Q

When it is necessary to question a witness about sexual deviation, all the following should be avoided except:

A. Using street language
B. Giving the impression of being avid to develop the facts
C. Leaving the impression of suspecting the subject of being a sex deviate
D. Allowing the witness to frame the testimony in his or her own words

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When designing security for an elementary school, classrooms should have a clear unobstructed view of entry roads. In CPTED, this describes:

A. Traffic calming
B. Mechanical surveillance
C. Natural surveillance
D. Natural access control

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a correct statement, as a general rule, involving the protection of proprietary information?

A. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B. By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C. Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D. Any agreement to be bound must always be in writing and are not implied from acts

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, service, or processes, is the definition for which of the following?

A. Guideline
B. Standard
C. Regulation
D. Code

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The four (4) elements of emergency management are which of the following?

A. Planning, policies, preparedness, and response
B. Mitigation, policies, response, and recovery
C. Mitigation, preparedness, response, and recovery
D. Planning, preparedness, countermeasures, and recovery

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unclassified material should be marked:

A. ‘Unclassified’ at the top of the page
B. ‘Unclassified’ at the bottom of the page
C. ‘Unclassified at the top and bottom of the page
D. With no marking

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which concept can be used to analyze the need for security personnel in a physical protection system - for example for alarm assessment?

A. The ‘four eyes principle’ concept
B. The ‘necessary human being’ concept
C. The ‘linking pin’ concept
D. The ‘human back-up’ concept

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A successful security design recognizes technological developments and integrates which three elements?

A. Architectural aspects; security systems; and operational factors
B. Architectural aspects; personnel; and effective PPS
C. PPS; personnel and procedures
D. PPS; personnel and security awareness programs

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adoption of ESRM propels the security program towards …

A. … lower risk levels
B. … reduced security costs
C. … a higher level of risk awareness
D. … constant improvement

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In most cultures this is closest thing to a universal guideline or Golden Rule: to treat others the way one would want to be treated. This guiding principle works for both individuals and organizations. This best describes which of the following?

A. Business ethics
B. Government regulations
C. Corporate law
D. Civil law

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When designing objectives or goals, they must be SMART. This acronym stands for which of the following:

A. Strategic; Measurable; Attainable; Relevant; Time-bound
B. Strategic; Metric-based; Accountable; Relevant; Time-bound
C. Specific; Measurable; Accountable; Reliable; Time-bound
D. Specific; Measurable; Attainable; Relevant; Time-bound

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifying residual risk is MOST important to which of the following concepts?

A. Risk deterrence
B. Risk acceptance
C. Risk mitigation
D. Risk avoidance

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A protection system’s individual applications and components should be integrated and converged so that they provide an equal level of protection. This concept is known as:

A. Security in depth
B. Balanced protection
C. Convergence
D. Onion approach

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network devices typically communicate using a worldwide internet standard for communication, also called:

A. TCP/IP
B. DNS Servers
C. WIN Servers
D. Web Proxies

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A key element in the information asset protection (IAP) risk assessment process is a thorough study of existing and projected threats. What are the categories?

A. Historical, current and future threats
B. Man-made, natural and intentional
C. Intentional, natural and inadvertent threats
D. Internal, external and government

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which common non-probability sampling method requires recruitment of participants via other participants?

A. Stratified sampling
B. Snowball sampling
C. Cluster sampling
D. Random sampling

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This organization prepares safety standards primarily as a guide to security device manufacturers, and then certifies whether devices submitted to the laboratories for approval meet those standards. This organization is called:

A. Underwriters Laboratories (UL)
B. International Standards Association (ISO)
C. American National Standards Institute (ANSI)
D. American Society for Testing and Materials (ASTM)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An assessment approach that is used to evaluate target attractiveness and includes criticality, accessibility, recuperability, vulnerability, effect and recoverability is BEST described as the:

A. Vulnerability assessment
B. Risk assessment
C. CARVER assessment
D. Security survey

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an integral component to any travel security program, and especially to executive travel?

A. An agreement with a global risk organization
B. A user-friendly mobile travel app
C. An in-house travel agency
D. A risk assessment of the travel destination

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following sensors relies on the Doppler frequency shift between the transmitted and received signal caused by a moving object within the energy field?

A. Capacitance sensors
B. Proximity sensors
C. Microwave sensors
D. Passive infrared sensors

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following statements best describes the “statement of work”?

A. Details what work should be included in the contract
B. Outlines the invitation for bids and the specification list
C. Outlines the list of specific equipment and software along with costs
D. Outlines the performance criteria and specifications

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When in the procurement stage, an invitation for bids (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is best described as:

A. Design estimation
B. Design specification
C. Design planning
D. Design evaluation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the Plan-Do-Check-Act (PDCA) cycle, this is the most critical stage and calls for identifying and analyzing the organization’s problems and events that could disrupt operations and assets. This step is referred to as which part of the cycle?

A. Plan
B. Do
C. Check
D. Act

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An uncertain situation where a number of possible outcomes might occur, one or more of which is undesirable, BEST describes which of the following?

A. Risk
B. Threats
C. Loss
D. Targets

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When should a project team, involved in selecting security countermeasures, consider supplementing the team with outside consultants?

A. When a project has a unique purpose and an explicit goal to be completed on-time
B. When the skills needed are not available within the project team
C. When a project had a primary sponsor or customer who provides funding
D. When a project is temporary

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In order to be legally acceptable, whatever the evidence, it must be competent, relevant, and:

A. Necessary
B. Material
C. Pertinent
D. Useful

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?

A. Information Security Awareness
B. Social Media and BYOD
C. Data Handling and Disposal
D. Acceptable Use of IT Systems

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following best describes the following?
“This equipment is primarily used to:

  • Detect activities that call for a security response
  • Collect images of an incident for later review
  • Assist with incident assessment”

A. CCTV surveillance
B. Video surveillance
C. Intrusion detection
D. Access control

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Most of the information gleaned during the investigative process comes from:

A. Surveillance
B. Undercover
C. Interviews
D. Internet

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following best describes the document that tells how much money an organization generates (revenue), how much it spends (expenses) and the difference between those figures (net income)?

A. Balance sheet
B. Income statement
C. Expense sheet
D. Cash flow statement

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The main principle of tendering is that:

A. Bidders must be able to offer low prices
B. Bidders must be able to offer the best quality
C. There should be open and fair treatment of suppliers
D. Bidders must be able to offer the best value for money

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Access to internal company information should be restricted. Which of the following best describes who can access sensitive information?

A. Personnel authorized by the original owner or IT Manager.
B. Company personnel who have attended an information security workshop.
C. Company personnel or others who have signed a nondisclosure agreement.
D. Access is granted based on their position or management level.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is the process in which a law enforcement officer or a government agent encourages or induces a person to commit a crime when the potential criminal expresses a desire not to go ahead?

A. Enticement
B. Entrapment
C. Deceit
D. Sting

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The type of glass that is often used for both safety and security purposes because it is three to five times stronger than regular glass and five times as resistant to heat is:

A. Reflective glass
B. Coated glass
C. Wired glass
D. Tempered glass

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following lighting systems have the best color rendition for night lighting?

A. Mercury vapor
B. Metal halide
C. Low pressure sodium
D. High pressure sodium

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When implementing ESRM, security professionals should have a comprehensive understanding of four elements regarding the context in which the organization operates:

Mission and vision (1); Core values (2); Operating environment (3). What is the fourth one?

A. Risk appetite
B. Stakeholders
C. Governance
D. Mitigation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following factors, besides relative value, and criticality, is considered when determining asset value?

A. Net value
B. Loss expectancy
C. Replacement value
D. Location

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Under the defensible space concept, which of the following are areas created as a buffer between public and private zones and have design features for establishing definite and clear transitional boundaries?

A. Semi-private zones
B. Clear zones
C. Buffer zones
D. Controlled zones

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The timing of the removal of the undercover operative is one of the most frequently debated subjects among undercover supervisors. How long should the operative be kept in place?

A. Removed as soon as possible to save costs
B. Should be kept in place as long as possible.
C. Should be removed as soon as possible when evidence is gained
D. Removed upon direction from the senior management.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Information warranting protection must be appropriately identified and marked. Various levels are used to distinguish the degree of sensitivity or the degree of protection warranted: confidential, restricted, limited, non-public, etc. Who is best suited to define the security level?

A. The Security Manager
B. The IT Manager
C. The IT Security Manager
D. The originator of the information

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is not true regarding electronic eavesdropping?

A. A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line
B. An effective countermeasure to detect evidence of electronic eavesdropping in telephone equipment should be conducted by a person who is technically familiar with such equipment.
C. An effective countermeasure would be to conduct a physical search as well as an electronic search.
D. All wiring should be traced and accounted for.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is suggested as part of evaluating an inadvertent threat?

A. Long-term data collected on weather and other natural hazards, terrains, and environments
B. Evaluate information provided by neighboring businesses for natural events which have caused losses
C. Unexpected natural events can occur, so some degree of all-hazard preparedness is evaluated
D. Utility interruptions, closure of access routes, unwanted attention, or traffic, full or partial operation shutdowns and productivity disruptions

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

‘Employment of services, equipment and techniques designed to locate, identify and neutralize the effectiveness of covert technical surveillance devices’ is the definition for which of the following?

A. Technical surveillance countermeasures
B. Contracted investigation services
C. Technical Security Services
D. Contracted counter-surveillance

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which insurance policy covers civil liabilities to third parties, arising from bodily injury, property damage, or other wrongs due to the action or inaction of the insured?

A. Property insurance
B. Indemnity insurance
C. Casualty insurance
D. Liability insurance

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The following theory asserts that managers should avoid quick fixes. Manipulating hygiene factors may alleviate dissatisfaction but will not result in a state of satisfaction. Allowing an individual to reach a state of satisfaction requires changes in the work content itself, such as increased autonomy or responsibility. This is best described as part of which of the following theories?

A. Maslow’s Theory
B. McGregor’s Theory
C. Hertzberg’s Theory
D. Hertzberg’s Theory

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

In which stage of incident response does a team analyze the incident anddetermine steps to prevent a future occurrence?

A. Mitigation
B. Identification
C. Preparation
D. Post-event

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Risk assessments are dependent upon the type of risk, purpose of the analysis, resource limitations, the information available to the assessor, and the availability of metrics. Risk may be assessed by using a suitable approach. Which type of analysis relies on probabilities and statistics using mathematical formulas and calculations to interpret numbers, data, and estimates?

A. Probabilistic analysis
B. Prospective analysis
C. Qualitative analysis
D. Quantitative analysis

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The process designed to systematically identify and evaluate an organization’s assets based on the importance of its mission or function, the group of people at risk, or the significance of a disruption on the continuity of the organization.

A. Qualitative risk assessment
B. Criticality analysis
C. Risk identification
D. Loss event profile

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

As security manager of an industrial site, which methodology would you use in a security assessment conducted in the form of a penetration test?

A. Inside-Outward methodology
B. SWOT analysis methodology
C. Outside-Inward methodology
D. Functional (security discipline) methodology

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A psychopath can often pass a polygraph test with a clean record because of the following characteristic:

A. Uncooperative attitude
B. Unstable personality
C. An inferiority complex
D. An abnormal lack of fear

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Insurance coverage on an asset is considered the most common form of what type of risk management mitigation approach?

A. Risk Spreading
B. Risk Reduction
C. Risk Transfer
D. Risk Acceptance

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following types of investigations is considered the ‘the most common type of investigation’ in many business and organizational settings?

A. Incident
B. Misconduct
C. Compliance
D. Undercover

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

In incident command management, when an incident requires public safety response, who becomes the incident commander?

A. The security manager
B. The senior member of the organization’s leadership
C. The senior member of the responding agency
D. The senior member of the responding security team

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

As the Senior Security Executive of a multinational organization, you are considering outsourcing the security services function. What would be one of the advantages of using contract staff (employed by a security services firm) in comparison to using proprietary or in-house staff for security in your organization?

A. More direct control over security personnel
B. Greater flexibility in staffing levels (up- or downsizing).
C. Lower turnover due to a higher sense of employee loyalty to the organization
D. Guaranteed risk mitigation through the outsourcing structure

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

One of the following is not considered an element of the common law crime of arson:

A. Commercial building
B. Maliciousness
C. Burning
D. Willfulness

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Badges are an important security tool for:

A. Layered defense
B. Identification
C. Defense in-depth
D. Security awareness building

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Active intrusion sensors transmit a signal from a transmitter and, with a receiver, detect changes or reflections of that signal. When the transmitter and the receiver are separated, what type of installation would this be called?

A. Mono-static
B. Bi-static
C. Passive
D. Active

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

It is becoming increasingly more difficult to do a good preemployment background investigation because of:

A. The expense
B. The lack of skilled investigators
C. Various rulings and court decisions that inhibit the use of techniques or instruments available
D. The uncooperative attitudes of persons interviewed

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Confidentiality of information may be protected by different techniques. These include system protections, encryption, and the AAA triad. What does the AAA triad refer to?

A. Access, Availability, Authorization
B. Authentication, Authorization, Auditing
C. Access, Authentication, Auditing
D. Authorization, Approval, Access

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

The tendency to search for, interpret, favor, and recall information in a way that confirms or supports one’s prior beliefs or value, is known as:

A. Confirmation bias
B. Inherent bias
C. Memory bias
D. Cultural bias

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

These are based on the investigative goals but are more specific and may be more short-lived. They are generally measurable and can be used to gauge the progress, success, or achievement of an investigative unit. They are BEST described as:

A. Metrics
B. Objectives
C. Strategies
D. Ethics

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A security team has established a security awareness program. Which of the following would BEST prove the success of the program?

A. Policies
B. Procedures
C. Metrics
D. Standards

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

“The process of establishing a sense of ownership, responsibility and accountability among property owners, managers or occupants to increase vigilance in identifying trespassers.” Which of the following terms BEST meets this CPTED description?

A. Target Attractiveness
B. Natural Territorial Reinforcement
C. Random Activity Theory
D. Neighborhood Watch

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What does the term “noise” refer to in the context of interpersonal communication?

A. Distractions in the external environment
B. Any distortion that interrupts what is received and what is sent
C. Non-verbal communication of the sender and receiver
D. Too many team members talking simultaneously during a meeting

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which of the following is the best description of tailgating?

A. Following someone through a door they just unlocked
B. Figuring out how to unlock a secured area
C. Sitting close to someone in a meeting
D. Stealing information from someone’s desk

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

This defines why the business exists, is essential for developing organization-specific management practices and how it will maintain itself as a profitable, viable entity not only in the moment but also three to five years out. This is called a:

A. Organizational strategy
B. PEST plan
C. STEP strategy
D. SWOT plan

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able to show ‘objective indications of attempts to protect secrecy’.
Which of the following has not been recognized in the past as such an indication?

A. Use of warning signs to alert employees to sensitive data and the places it is stored
B. Separately storing sensitive information in security containers with the appropriate security precautions
C. Employing a system with cyclical redundancy checks
D. Restrictions to nonemployee access to places containing sensitive information

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What type of material would be better for a storefront in terms of resistance to breakage and resistance to overall deterioration?

Laminated glass
Wired glass
Bullet-resistant glass
Acrylic material

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

If the total assets on an organization’s balance sheet equals € 5 million and the equity € 3 million, what will the total value of liabilities be?

€ 5 million
€ 8 million
€ 2 million
€ 3 million

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which statement BEST describes “non-verbal” responses?

Both spoken words and gestures that serve as word substitutes, such as nodding the head to indicate yes.
Voice characteristics such as tone, pitch, speed and clarity.
Body movements, position changes, gestures, facial expressions and eye contact.
Voice characteristics and body movements that indicate deception.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

These diagrams show complete security subsystems, including all the devices and how they are connected in a building or campus. They are called:

Details diagrams
Plan drawings
Elevation drawings
Riser diagrams

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following is not correct regarding benzodiazepine?

This family of depressants is used to relieve anxiety and tension.
This depressant causes muscle spasms and convulsions.
This depressant is safer to use than other depressants.
Excessive use may result in physical and psychological dependence

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A sentry dog normally does not perform as well at:

Radar sites
Warehouses
Gasoline storage areas
Ammunition storage areas

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

When an adversary defeats an access control point (for example the main entrance) to avoid detection, this is best described as:

Attack by deceit
Technical attack
Direct physical attack
Indirect physical attack

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Physical security protection in this layer of security measures includes protective lighting, intrusion detection systems, locks, signs, barriers such as fencing, and the building walls itself. Protection of building exterior openings is important. This best describes the ______ layer of protection.

Outer
Middle
Inner
Perimeter

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Who is best suited to conduct a preliminary search for suspicious packages in the event of a bomb threat?

People who work in that area
The responding fire department
The responding police
Responding security officers

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Information systems countermeasures are divided into three broad classifications. ‘Management policies, standards, procedures, guidelines, personnel screening and awareness training’ fall into which category of controls?

Administrative controls
Technical controls
Physical controls
Infrastructure controls

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

‘This statement includes the specific details that all involved parties can understand what needs to be done, highlighting specific goals the organization wants units to achieve’. This best describes:

Mission Statements
Vision Statements
Strategic Plans
Organizational Objectives

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What refer to any means one uses to control the flow of access to an area and have the objective to deter or delay the intruder?

Access control
Gates
Fences
Barriers

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Consider the following scenario: The asset value of your company’s primary servers is € 2 million, and they are housed in a single office building in Arizona. You have field offices scattered throughout the world, so these servers in the main office account for approximately half the business. Tornados in this part of the world are not uncommon, and it is estimated one will level the building every 60 years.

Only considering asset value, which of the following would be the single loss expectancy (SLE) for this scenario?

€ 2 million
€ 1 million
€ 500.000
€ 33.333

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following terms best meets this description? ‘This process corrects faults and returns the system to operation after a hardware or software component fails’.

Remedial maintenance
Preventive maintenance
Emergency maintenance
Commissioned maintenance

A

A

82
Q

Which of the following best meets this description?
‘The mixture of people, systems and techniques required to carry the project to successful completion’.

Project analysis
Project integration
Project management
Project alignment

A

C

83
Q

The following theory asserts that a person’s behavior is driven by basic needs at different levels and is still widely recommended to analyze individual employee motivation. It is referred to which of the following?

Maslow’s Theory
McGregor’s Theory
Hertzberg’s Theory
Motivation-Hygiene Theory

A

A

84
Q

Which of the following statements is TRUE concerning employee dishonesty?

Most employees who steal from their employers consider themselves dishonest.
Employees involved in theft have usually been involved in other prior misconduct at the company.
Most employees would steal from their employer if given the opportunity.
Employers have no control over factors that contribute toward employee theft and fraud.

A

B

85
Q

A company is interested in purchasing property overseas. They decide to conduct an investigation to evaluate the current property owners, the location, finances and operations of the target property.
Which of the following statements is BEST describes this type of investigation?

Compliance
Financial
Background
Due diligence

A

D

86
Q

Generally speaking, a felony is defined as:

A crime in which there is a clear victim
Any crime that can carry a jail term and a fine
Any crime that can be punishable by a period of imprisonment of greater than 1 year
Any crime involving an injury to persons or theft of something valuable

A

C

87
Q

Which of the following is another name for social engineering?

Social disguise
Social hacking
Wetware
Wetfire

A

C

88
Q

This is a nongovernmental organization bringing together stakeholders from the public, private, and not-for-profit sectors. It serves as a central point where standards bodies from around the world – and the organizations that participate in them – can gather to develop standards jointly. It is called:

ASIS International
American National Standards Institute
International Standards Organization
National Fire Prevention Associatio

A

C

89
Q

In the eyes of the court, an expert is a person skilled by means of:

Skill, experience, and personal knowledge
Training, skill, and experience
Education, training, and skill
Education, training, and experience

A

D

90
Q

What is the purpose of the Red Flags Rule which regulates financial institutions?

Early detection and prevention of identity theft
Early detection and prevention of insider threat
Early detection and prevention of deception
Early detection and prevention of money laundering

A

A

91
Q

The lock that is mostly used for cabinets, lockers, and safe deposit boxes is:

The wafer lock
The disc-tumbler lock
The pin-tumbler lock
The lever lock

A

D

92
Q

What should be the first step in formulating a physical barrier plan?

Establishing the budget
Do an environmental scan
Performing a risk assessment
Identifying the assets to be protected

A

D

93
Q

What are the most cost-effective barriers to be applied in a physical security approach?

Barriers made from recycled materials
Those that already exist as part of the site
Any natural barrier
Barriers with low installation costs

A

B

94
Q

Which of the following statements concerning interviewing and deception is TRUE?

A single word or behavior characteristic automatically means a person is lying or telling the truth.
The assessment of a subject’s truthfulness is based on a single behavior pattern.
Some behavioral characteristics that suggest deception may also be displayed by a truthful subject.
Deceptive persons answer questions in a direct, straightforward, spontaneous, and sincere manner.

A

C

95
Q

Which of the following is a plan that helps maintain the continuity of essential operations/functions during potential emergency scenarios?

ERM
BCP
RFP
COOP

A

D

96
Q

Which of the following is a term named by criminologists to crime prevention strategies that attempt to reduce criminal opportunities, which arise from the routines of daily life?

Routine crime prevention
Environmental crime prevention
Situational crime prevention
Community crime prevention

A

C

97
Q

The act or process of appraising or checking an applicant or information for suitability, accuracy, and/or validity, is known as:

Background vetting
Background screening
Performance appraisal
Background investigation

A

A

98
Q

The primary information security control types that can be implemented are:

Supervisory, subordinate, and peer
Personal, procedural, and legal
Operational, technical, and management
Mandatory, discretionary, and permanent

A

C

99
Q

Undesirable activity thrives in spaces that residents and management fail to claim and therefore mainly remain abandoned. A crime hotspot might be eliminated if police or security establish a presence there or residents, employees or the public occupy the space, providing what is known in CPTED as:

Legitimate activity support
Management and maintenance support
Natural measures
Mechanical measures

A

A

100
Q

Where would a sound detector typically be used?

In an airport building
In a datacenter
In a vault
In a control room

A

C

101
Q

These need not be registered with any outside agency, so the owner can maintain a greater degree of control over the asset. The owner must be able to prove that the information added value or benefit to the owner, was specifically identified, and the owner provided a reasonable level of protection. This is called which of the following:

Patent
Copyright
Trade Secret
Trademark

A

C

102
Q

Which of the following statements concerning security industry standards is not true?

Standards address a product, service or process.
Standards are mandatory and require compliance.
Regulation may require compliance with a standard.
Customers more easily judge product quality if it conforms with standards.

A

A

103
Q

What should the company be prepared to use should its selection of qualified contractors be challenged?

The entire request for proposal (RFP)
Written selection criteria and results documentations
The (draft) agreement and terms & conditions
The references of the selected contractor

A

B

104
Q

Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

0.5 foot-candle
1.0 foot-candle
1.5 foot-candles
2.0 foot-candles

A

B

105
Q

Which regulation contains provisions and requirements related to the processing of personal data of individuals who reside in the EEA?

GDPR
HIPAA
SOX
IFRS

A

A

106
Q

Which of the following definitions BEST describes a hazard?

Possible source of danger or conditions (physical or operational) that have a capacity to produce a particular type of adverse effect.
Possible risk (physical or operational) that can cause a workplace accident.
Possible source of danger (adversary) that can produce an adverse effect.
Confirmed source of danger (adversary) that can produce an adverse effect.

A

A

107
Q

When dealing with an active assailant incident, when is the activation of an incident command center the most effective?

Before the incident happens
Only after the emergency services arrive
Early in an incident
When the media arrives

A

C

108
Q

Which of the following measure best meets this description?
“These are made of reinforced fabrics providing protection from flying glass and materials in an explosion.”

Window film
Window bars
Tempered glass
Blast curtains

A

D

109
Q

Watery eyes, runny, nose, yawning, loss of appetite, irritability, tremors, panic, chills and sweating, cramps, and nausea would indicate withdrawal symptoms of:

Barbiturates
Stimulants
Heroin
Cocaine

A

C

110
Q

There are various ways to organize supervision. One such principle states that workers should report to only one ‘boss’. Which principle is violated in matrix organizations?

Chain of command
Span of control
Unity of command
Incident command

A

C

111
Q

In addition to the five (5) functions of management, managers should be guided by two (2) other principles, which are:

‘Continuous improvement’ and ‘Customer service’
‘Quality’ and ‘Who is the customer’?
‘Continuous improvement’ and ‘Performance metrics’
Quality’ and ‘Performance metrics’

A

B

112
Q

This process requires consideration of the threat type, tactics and mode of operations, capabilities, threat level and likelihood of occurrence. The definition can be modified to include all sites, not only utilities. Threats come from malevolent humans, not accidental (safety-related) events.
This process is BEST defined as which of the following?

A. Design Basis Threats
B. Loss Event Profiles
C. Adversarial Sequence Diagrams
D. Threat Risk Assessment

A

A

113
Q

Explanations of why people steal have historically referred to the theft triangle, which consists of which of the following motivations?

Desire, Need and Opportunity
Desire, Motive and Opportunity
Want, Need and Motive
Want, Need and Lack of Controls

A

B

114
Q

Which theory suggests that an abandoned building or car can remain unmolested indefinitely, but once the first window is broken, the building or car is quickly vandalized?

Broken windows theory
CPTED
Situational crime
Window and car approach

A

A

115
Q

Which of the following statements is true with regard to a felony?

A. A felony is seldom punishable by imprisonment
B. The maximum punishment for a felony is usually not more than 1-year imprisonment
C. A felony is punishable by death or imprisonment
D. The maximum punishment for a felony is usually a monetary fine or incarceration in a local jail

A

C

116
Q

In your company’s new fulfillment center, concrete planters with steel bars will be used as vehicle barriers. Which K-rating would you require to stop a 6.804 kg / 15.000 lb. vehicle travelling at 80 kph / 50mph?

K4
K8
K12
K24

A

C

117
Q

All the following are considered either unethical or dishonest behavior while involved in an investigation, except:

Compromising sensitive investigative information
Lying during judicial or administrative proceedings
Making friends with a witness
Improperly handling evidence

A

C

118
Q

Separation of duties helps prevent an individual from embezzling money from a company.
To successfully embezzle funds, an individual would need to recruit others to commit an act of …… (an agreement between two or more parties established for the purpose of committing deception or fraud).

Misappropriation
Misuse
Collusion
Fraud

A

C

119
Q

Mental disorders may be determined by various symptoms. Which of the following is not such a symptom?

Sudden changes in behavior
Behavior that is not harmonious with a situation
Unduly prolonged depression
Solicitous behavior

A

D

120
Q

Which light sources have assumed the major market share of exterior lighting?

LED
Incandescent
Fluorescent
Metal Halide

A

A

121
Q

The process of assessing security-related risks from internal and external threats to an entity, its assets and personnel, called a:

Vulnerability Assessment
Risk Assessment
Security Survey
Loss Event Profile

A

B

122
Q

Situational ethics can be defined as:

Knowing the difference between what is the right thing to do, and what you have the right to do
What is occurring at any given point determines what actions are effective, appropriate, and ethical
Company policies aimed at specific situations
The ‘Golden Rule’

A

B

123
Q

What type of evidence is considered among the least accurate forms of investigative information?

Direct physical evidence
Documented physical evidence
Eyewitness evidence
Corroborated statements

A

C

124
Q

CPTED measures which employ good space planning to reduce inhabitant conflicts by considering compatible circulation patterns, including a well-defined building entrance and arranging courtyards, patios and porches for unobstructed lines of sight, describe which of the following?

A. Mechanical Measures
B. Organizational Measures
C. Human Measures
D. Natural Measures

A

D

125
Q

Implementing target hardening such as security gates, improving training for security officers, additional video observation CCTV, or barriers would be part of which risk mitigation strategy?

Risk Transfer
Risk Avoidance
Risk Acceptance
Risk Acceptance
Risk Reduction

A

D

126
Q

In an armed workplace violence incident, the program assumes that an effective response by properly trained personnel will occur if the perpetrator is not diverted. This means that one of the best-planned responses should be which of the following?

The quickest responding security force, closest to the incident.
Company security personnel from all posts respond to the scene as soon as possible
Assigned supervisors who are trained to deal with conflict.
Response by correctly trained, armed personnel who will handle the situation.

A

D

127
Q

A joint effort where the local police service’s crime prevention programs bring together local law enforcement and various local security organizations from industry and businesses to focus on specific high-profile crime issues. Such collaboration conserves valuable resources, encourages information sharing, eliminates duplication of effort, and effectively reduces crime.
This type of effort is BEST described as a:

Force multiplier
Crime prevention
Mutual aid
Cooperative policing

A

A

128
Q

ESRM is a strategic approach to security management that ties an organization’s security practice to its overall strategy using globally accepted, established risk management principles.
When following the ESRM strategic approach, who has the responsibility for final security decisions?

The Chief Security Officer
The Chief Executive Officer
The asset owner
The departmental head

A

C

129
Q

Which of the following is an advantage of trade secrets as compared to other legal protections for intellectual property?

They do not have to be classified since they are already secret
They do not have to be “registered” or shared with any outside agency
They do not have to be renewed after the expiry date
They do not have to be included on the balance sheet

A

B

130
Q

Which of the following policy statements should address who is responsible for ensuring that it is enforced?

Scope
Accountability
Overview
Exception

A

B

131
Q

Which of the following characteristics relate to the psychological stress analyzer?

A physical connection with the body is required
The subject is required to answer in a terse “yes” or “no” format
It can be used covertly
It has no value as a “truth tester”

A

C

132
Q

Threats can be characterized by the formula:

Threat = Capability x Intent
Threat = Frequency x Probability
Threat = Impact x Criticality
Threat = Risk x Impact

A

A

133
Q

A device used to detect deception through stress recorded by voice modulations is also known as a:

Polygraph
Lie detector
Psychological stress analyzer
Truth serum

A

C

134
Q

A magnetically operated switch using a balanced magnetic field, designed to detect the opening of a secured door, window, or other point of entry. In addition, it detects attempts to defeat the switch by substituting a magnetic field and may have provisions for internal adjustments and detection of switch tampering attempts.

This best describes which of the following?

Microwave detection devices
Passive Infrared detection devices
Position detection devices
Vibration detection devices

A

C

135
Q

What type of post-implementation test is used to test a complex system that is broken down in separately tested segments?

Partial system test
Preliminary test
Subsystem test
Limited scope test

A

D

136
Q

Which of the following BEST describes “Unity of Command”?

Dictates that an individual is accountable for more than one (1) employee.
Dictates that an individual report to only one (1) supervisor.
States how many persons a supervisor may effectively supervise.
States the number of security personnel required to function when guided by incident management situations.

A

B

137
Q

The person under a duty to safeguard a proprietary secret is known as a(n):

Agent
Proprietary security employee
Fiduciary
Business associate

A

C

138
Q

What is ‘interoperability’?

The ability of private security and the public sector to work together.
The ability for the emergency responders to work seamlessly with proprietary security forces.
The ability for security forces to communicate with internal departments in an emergency.
The ability for different jurisdictions and responding agencies to communicate with each other wirelessly.

A

D

139
Q

Which of the following statements is correct?

Risk assessment of the organization’s information systems need only to be performed once.
Organizations are recommended to only perform quantitative risk assessments.
Risk assessments should identify risks, quantify them, and prioritize them according to the organization’s criteria for risk acceptance.
Organizations are recommended to only perform qualitative risk assessments.

A

C

140
Q

What is the purpose of a business impact analysis (BIA)?

A. To assess and prioritize events that interrupt planned business activities, operations, or functions
B. To assess and evaluate the effects of uncertainty on achieving an organization’s business objectives
C. To assess and prioritize the impact on the core-business and the financial consequences of a disruption
D. To assess and prioritize organizational activities and the resources required to deliver products and services

A

D

141
Q

Emergency management consists of four elements. One of these encompasses activities providing a critical foundation in the effort to reduce loss of life and property from natural and man-made disasters by avoiding or lessening the impact of a disaster and providing value to the public by creating safer communities. It seeks to fix the cycle of disaster damage, reconstruction, and repeated damage. Which element is this?

A. Preparedness
B. Response
C. Mitigation
D. Recovery

A

C

142
Q

Which of the following is being tested when a company’s payroll server is powered off for eight hours?

Succession plan
Business impact document
Continuity of operations plan
Risk assessment plan

A

C

143
Q

SWOT is often used as an assessment tool for developing an organizational strategy.

What does the acronym SWOT stand for?

Strategy, Weaknesses, Opportunities, Threats
Strategy, Weaknesses, Operations, Threats
Strengths, Weaknesses, Opportunities, Threats
Strengths, Weaknesses, Operations, Threats

A

C

144
Q

A flaw or weakness in an information system’s design, implementation, or operations and management, including policies, procedures, processes, and internal controls that could be exploited to violate the system’s security policy, is known as an:

A. Information systems vulnerability
B. Information systems threat
C. Information systems risk
D. Information systems failure

A

A

145
Q

According to the Routine Activity Theory, crime is often the result of a triangle composing of three components. The likelihood of a target becoming a victim depends upon a combination of factors. Which of the following is not an element of this theory?

Rationalization
Offender
The lack of a capable guardian
Victim

A

A

146
Q

Which of the following is not a sub-category of civil law?

A. Tort law
B. Property law
C. Domestic law
D. Contract law

A

C

147
Q

The investigative report should enable the reader to understand what the investigator did, why it was done, and what resulted. As such, an investigative report should be clear and:

Comparative and concise
Concise and compassionate
Concise and complete
Cogent and complete

A

C

148
Q

What does a barrier’s effectiveness dependent on?

A. Effectiveness of response force
B. The type of material
C. The environmental conditions
D. How much time the barrier can delay an adversary

A

D

149
Q

Which of the following terms refers to the process of establishing a standard for security?

A. Baselining
B. Security evaluation
C. Target hardening
D. Security by design

A

A

150
Q

An approach to reducing crime or security incidents through the strategic design of the built environment typically employing organizational, mechanical, and natural crime prevention methods to control access.

A. Security by design
B. Balanced security
C. CPTED
D. Security in depth

A

C

151
Q

A collaborative approach to decision-making and a single incident command post, with the agencies involved in the incident participating in the process through direct representation or through the ICS liaison officer, as appropriate, is referred to as:

A. Incident command
B. Unified command
C. Command structure
D. Emergency coordination

A

B

152
Q

Electronic data and material can begin to deteriorate at:

A. 100°F
B. 150°F
C. 200°F
D. 300°F

A

B

153
Q

A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password, and a four-digit security pin that was mailed to him during account registration.

This is an example of which of the following?

A. Dual-factor authentication
B. Multifactor authentication
C. Single factor authentication
D. Biometric authentication

A

C

154
Q

In a bomb threat assessment, the threat evaluation team (TET) is an important asset. Which of the following statements is correct?

A. A large team is better than a smaller team.
B. The TET can manage several different sites.
C. The team’s final decisions are made by several members.
D. A record keeper is an important part of the team.

A

D

155
Q

Which of the following is not one of the six steps in performance-based analysis?

A. Create an adversary sequence diagram
B. Conduct a path analysis
C. Perform a cost benefit analysis
D. Perform a scenario analysis

A

C

156
Q

Which type of bond provides protection against failure to live up to the contractual obligations?

A. Fidelity bond
B. Surety bond
C. Contract bond
D. Promissory bond

A

B

157
Q

The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives for behavior is known as:

A. Maslow’s hierarchy of prepotency
B. McGregor’s theory X
C. McGregor’s theory Y
D. Herzberg’s two factor theory

A

A

158
Q

Three financial reports or statements have become accepted as a standard to make it possible painting a clear picture of a company’s current and prospective financial health. They are:

A. The income statement, profit and loss and cash flow statements
B. The income statement, balance sheet and cash flow statements
C. The balance sheet, profit ratio and cash flow statements
D. The income sheet, profit ratio and cash flow statements

A

B

159
Q

The most common lie used by deceptive individuals is:

A. The lie of omission
B. The exaggeration
C. The fabrication
D. The minimization

A

A

160
Q

Which risk ratio best expresses the organization’s ability to cover short-term obligations?

A. Return on investment
B. Current ratio
C. Gross margin
D. Cashflow

A

B

161
Q

The type of sensor that is not influenced by exterior noise, reacts only to movement within a protected area, and can also be adjusted to the movement of air caused by a fire to activate the alarm is known as a(n):

A. Proximity sensor
B. Radar sensor
C. Vibration sensor
D. Ultrasonic sensor

A

D

162
Q

For access control purposes, it is helpful to divide a high-rise structure into three classes or types of interior spaces. Which of the following best describes these?

A. Public spaces, semi-private spaces, private spaces
B. Common areas, assigned occupancies, maintenance spaces
C. Internal spaces, rented spaces, external spaces
D. High security, low security, medium security

A

B

163
Q

Which of the following is a contractual obligation imposed by law for preventing unjust enrichment?

A. Act of God
B. Aleatory contract
C. Quasi contract
D. Express contract

A

C

164
Q

An employer may not question an applicant about:

A. An unsatisfactory interview
B. Unexplained gaps in employment history
C. An arrest for a crime against property
D. A conviction for a crime against property

A

C

165
Q

The Equal Pay Act disallows paying wages based on:

A. Age
B. Race
C. Gender
D. All of the above

A

C

166
Q

Some managers believe they have the knowledge, skill, ability, and time to write every lesson plan and deliver every class.
According to Hertig, this belief can evolve into the ….

A. Overtraining syndrome
B. Teacher syndrome
C. Frog syndrome
D. Floating theory

A

C

167
Q

Agryris theorized that traditional organizational principles, structures and procedures are incompatible with the mental health of employees. According to his Theory of Adult Personality, there are several things a manager could do to correct this mismatch.

Which of the following is NOT one of those?

A. Simplifying procedures
B. Increasing task variety
C. Increasing task responsibility
D. Using participative decision-making

A

A

168
Q

What are the two major components in most mechanical locks?

A. The bolt & the key
B. The cylinder & the tumbler array
C. The coded mechanism & the fastening device
D. The deadbolt & the latch

A

C

169
Q

Which of the following applies to the laser as a means of communication?

A. The benefit is that no line-of-sight transmission is necessary
B. Poor weather conditions will not interfere with the beam
C. It is practically impossible to intercept the beam without detection
D. It works well in mountain areas where other signals are weak

A

C

170
Q

Which of the following statements best describes the way an untruthful person acts during an interview or interrogation?

A. They are typically relaxed and confident, no stress.
B. They are typically showing anxiety through verbal and nonverbal behaviors.
C. They are typically very skilled at deceit and disguising clues through verbal and nonverbal behaviors.
D. They are typically stressed and will not reveal anxiety through verbal and nonverbal behaviors.

A

B

171
Q

To conserve valuable resources, encourage information sharing, eliminate duplication of effort, and effectively reduce crime, it is customary for the local police service’s crime prevention programs to bring together local law enforcement and various local security organizations from industry and businesses to focus on specific high-profile crime issues. This type of joint effort is best described as:

A. A force multiplier
B. Crime prevention
C. Mutual aid
D. Cooperative policing

A

A

172
Q

Which of the following does not apply to synthetic narcotics?

A. Two of the most widely available synthetic narcotics are meperidine and methadone
B. Synthetic narcotics are natural substances that are enhanced within a laboratory
C. Meperidine can be administered by injection or taken orally
D. Large doses can result in convulsions

A

B

173
Q

Which of the following processes places emphasis on evaluating vulnerabilities?

A. Risk Assessment
B. Security Survey
C. Loss Event Likelihood Profile
D. Loss Event Impact Profile

A

B

174
Q

A process where algorithms are used to scramble the information on a computer so that it is unusable, unless the changes are reversed, is called:

A. Firewall
B. Virus protection
C. VPN protection
D. Encryption

A

D

175
Q

The responsibility of a person or organization to take all reasonable measures necessary to prevent activities that could result in harm to other individuals and/or their company, is known as:

A. Due diligence
B. Security by design
C. Due care
D. CPTED

A

C

176
Q

Which of the following may be used to list all the potential threats?

A. Event probability matrix
B. Event sheets
C. Event profiles
D. Tabletop exercise

A

C

177
Q

Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first.

This is MOST likely to increase the risk of loss from which of the following attacks?

A. Shoulder surfing
B. Dumpster diving
C. Tailgating
D. Spoofing

A

B

178
Q

Which type of camera has a static position and is always aimed at the desired field of view?

A. PTZ (Pan Tilt Zoom)
B. Fixed
C. Infrared
D. IP (Internet Protocol)

A

B

179
Q

Security professionals can most effectively convince management of the need for security by quantifying and prioritizing the loss potential with presenting which of the following?

A. A strategic plan that applies to the entire organization
B. A strategic plan that applies to the security organization
C. A cost-benefit analysis and return-on-investment assessment
D. A cost-benefit analysis with business unit endorsement

A

A

180
Q

A financial strategy is management’s financial approach to determining the expected returns of its investments (including its departments and operations) and estimating and managing the relevant risks.

What is the first step in establishing a financial strategy?

A. Identifying expected margins or profit
B. Setting cost savings targets
C. Identifying possible investors
D. Opening a bank account

A

A

181
Q

What should be considered/assessed as one of the first steps before developing the security plan for an organization?

A. Staffing
B. Budget
C. Culture of the organization
D. History

A

C

182
Q

A company is interested in purchasing property overseas. They decide to investigate to evaluate the current property owners, the location, finances, and operations of the target property. Which of the following statements is best describes this type of investigation?

A. Compliance
B. Financial
C. Background
D. Due diligence

A

D

183
Q

The three (3) primary functions of a Physical Protection System (PPS) are:

A. Detect, delay and response
B. Deter, detect and response
C. Deter, delay and response
D. Detect, deter and response

A

A

184
Q

According to most international legal requirements, these are not required to be registered to be protected. Nevertheless, a person can formalize ownership through government registration, which may help in any later enforcement actions.
This applies to which of the following?

A. Patents
B. Copyrights
C. Trade Secrets
D. Trademark

A

B

185
Q

________ is a statistical technique often using machine learning or data mining to predict and forecast likely future outcomes with the aid of historical and existing data. It works by analyzing current and historical data and projecting what it learns on a model generated to forecast likely outcomes.

A. Predictive modeling
B. Artificial Intelligence
C. Qualitative analysis
D. Standard deviation

A

A

186
Q

Which of the following is not true in regard to establishing and identifying personnel to control movement?

A. The identification card should be designed as simply as possible
B. Detailed instructions should be disseminated as to where, when, and how badges should be worn
C. The identification card or badge should be designed in a relatively complicated manner to avoid duplication
D. Procedures should be designed to show employees what to do when an identification card or badge is lost

A

C

187
Q

Which light sources can be categorized in the high-intensity discharge (HID) family of lamps?

A. Incandescent, Fluorescent, and Induction
B. Metal halide, Mercury vapor, and High-pressure sodium
C. LED, Low-pressure sodium, and Halogen
D. Quartz halogen, Mercury vapor, and Low-pressure sodium

A

B

188
Q

‘A specific description of where the business will be in the long-term, that conveys a general understanding of the business, its culture and its future goals’. This concept is best referred to as:

A. A Mission Statement
B. A Vision Statement
C. A Strategic Plan
D. An Organizational Strategy

A

B

189
Q

The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:

A. The rule of 10
B. The rule of 9
C. The 1-10 rule
D. Sullivan’s rule

A

A

190
Q

Which three zones are most commonly distinguished for PA (public address system) purposes in high rise buildings?

A. Covered parking areas, maintenance areas, and rented areas
B. Public access areas, secured zones areas, and rented areas
C. Parking areas, hospitality areas, and rented areas
D. Public access areas, maintenance areas, and rented areas

A

B

191
Q

Snowball sampling is an example of _____?

A. Probability sampling
B. Non-probability sampling
C. Random sampling
D. Systematic sampling

A

B

192
Q

‘A thorough physical examination of a facility and its systems and procedures, conducted to assess the current level of security, locate deficiencies, and gauge the level of protection needed’ is the definition for which of the following?

A. Risk Analysis
B. Vulnerability Analysis
C. Security Survey
D. Loss Event Survey

A

C

193
Q

Which term best describes the financial commitments of a company?

A. Equity
B. Assets
C. Losses
D. Liabilities

A

D

194
Q

This margin gives insight in the in efficiency of manufacturing a product / rendering service:

A. Net profit
B. Operating profit
C. Current ratio
D. Gross profit

A

D

195
Q

‘This means that no matter how an adversary attempts to accomplish the goal, effective elements of the PPS will be encountered’. This is best referred to as which of the following?

A. Conceptual design criteria
B. Performance based design
C. Balanced protection
D. Design criteria

A

C

196
Q

What does PE represent in the following formula: PE = PI x PN?

A. PPS effectiveness
B. Probability of interruption
C. Probability of neutralization
D. Probability of event

A

A

197
Q

The “integration” of traditional physical security functions and information systems & IT security functions is known as:

A. Security Organization Integration
B. Security Management Systems
C. IT and Security Merger
D. IT and Security Convergence

A

D

198
Q

Business ______ refers to the absorptive and adaptive capacity of an organization in a complex and changing environment.

A. contingency
B. continuity
C. resilience
D. convergence

A

C

199
Q

‘Non-deliberate adverse actions and events, such as hazardous material spills and telecommunications and computer outages’ are considered which of the following?

A. Natural threats
B. Human threats
C. Accidental threats
D. Organizational threats

A

C

200
Q

Threat assessment within the Executive Protection community often takes on two definitions. The first is threat assessment associated with proximity to criminal elements such as terrorists, random crimes, etc. The second is applied to persons or groups of concern that have been identified by the protective intelligence function.

What is the form of this second type of threat assessment?

A. Behavior-based
B. Qualitative
C. Interview
D. Digital

A

A