- Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:
- The security system
- Physical security
- Access control
- Intrusion detection
- Question 23 PointsA security scheme that features several rings of protection that in the abstract look like a bulls eye is called:
- Ring Protection
- Attenuated protection
- Concentric protection
- Bull’s eye protection
- Question 33 PointsThe usual starting point in assessing risk at a facility is the:
- Area in which assets are located
- Front door
- Security guard force
- Perimeter
- Question 43 PointsA river adjacent to a protected facility is called:
- Natural barrier
- An access route
- A vulnerability
- A man-made barrier
- Question 53 PointsThe protective capability of lighting is diminished:
- When cones of light overlap one another
- During winter months
- In the absence of observation by a security officer force
- When the lamp is fluorescent
- Question 63 PointsA well-designed and skillfully managed identification system will not require the involvement of guards.
- True
- False
- Question 73 PointsA system that regulates movement into, within, and from a protected area or facility is called:
- An intrusion detection system
- An access control system
- A security system
- A restricted system
- Question 83 PointsThe justification for inspecting vehicles leaving a nuclear power plant is based on the:
- Safety of the public
- Dollar value of removable items and materials
- Philosophy of management
- Cultural inclinations of the workforce
- Question 93 PointsFences, lights, sensors, and locks are:
- Not to be confused with walls, doors, and safes
- Manufactured by one company when they are to be used for a security purpose
- Security standards
- Physical security safeguards
- Question 103 PointsIt would be a mistake to depend on the technology of an electronic access control system:
- When the system was purchased from a non-U.S. manufacturer
- After the system has been operating more than one year
- And the software that drives it
- And neglect the human side of the system
- Question 113 Points. Business fraud usually takes the form of repetitive, incremental thefts.
- True
- False
- Question 123 PointsOne of the most frequently investigated incidents in the business environment is:
- Embezzlement
- Fraud
- Employee theft
- Bribery
- Question 133 PointsA management that wishes to eliminate employee theft should do all of the following EXCEPT:
- Decide it is unacceptable
- Do something about it
- Involve employees in bringing it to an end
- Grant amnesty once for first-time offenders
- Question 143 PointsWhich of the following is NOT an indicator of employee theft?
- Borrowing
- Living above apparent income level
- Writing bad checks
- Speaking out against the company
- Question 153 PointsAn alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the companys health benefits plan. These circumstances point to a false:
- Workers compensation claim
- Medical services claim
- Finding in a civil law suit
- Invoice
- Question 163 PointsThe main administrative device for capturing employment and personal references is the:
- Employment application form
- Telephone
- Personal computer
- Assortment of public records
- Question 173 PointsPre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:
- Filter out persons with learning problems
- Protect the community at large
- Reduce costs associated with theft, injury, accidents, and medical assistance benefits
- Question 183 PointsOne of the reasons employers conduct pre-employment background checks is because:
- Regular employees expect screening of new employees
- They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d
- Laws and regulations place a duty on them to maintain a safe and secure working environment
- Question 193 PointsCertain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?
- Are you married?
- How many children do you have?
- Where were you born?
- Do you have any disabilities?
- Question 203 Points Checking references by mail or e-mail is not as effective as:
- Checking in person or by phone
- Reading the job description
- Talking to the applicants potential supervisor
- Sending a form to the registrar of the college attended by the applicant
- Question 213 PointsAn organizations program for fire prevention and response often includes:
- A floor warden program
- Written approval of local law enforcement
- A requirement for an access control system
- Provisions for dealing with natural disasters
- Question 223 PointsA Mutual Aid and Assistance Agreement:
- Is an agreement in which separate agencies commit to working with one another to deal with major emergencies
- Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency
- Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)
- Question 233 PointsThe Incident Command System (ICS):
- Is a substitute for the National Incident Management System (NIMS)
- Is a system for managing a major incident at the-scene
- Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)
- Question 243 PointsA fire control team:
- Is committed to fire incidents only
- Answers to the senior fire warden
- Must include security officers
- Includes maintenance personnel
- Question 253 PointsAn Emergency Operating Plan (EOP) does all of the following EXCEPT:
- Assign responsibilities
- Identify likely incidents
- Dedicate particular resources
- Dictate cost-containment
- Question 263 PointsThe Business Continuity Plan (BCP) is:
- Completely separate from the EOP
- Never a part of an EOP
- Integral to the EOP
- Question 273 Points A properly planned and executed BCP:
- Falls into the exclusive realm of the CSO
- Is written by the CSO
- Can be the key in preventing the death of a company
- Question 283 PointsRecovery follows readiness and precedes:
- Mitigation
- Response
- Restoration
- Question 293 Points The acronym RTO stands for:
- Reasonable termination objective
- Response time overall
- Recovery time objective
- Question 303 PointsIT governance is a term related to policies, procedures, and practices.
- True
- False
- Question 313 PointsThe final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:
- The chief operations officer
- The chief executive officer
- The chief security officer
- Question 323 PointsThe risk of information loss is present:
- Except when information is under lock and key
- When productive use of the information ends
- When a threat agent has targeted the information
- Question 333 PointsWhich of the following is NOT a type of sensitive information?
- Proprietary business and technical information
- Personal data concerning applicants, employees, and former employees
- Information developed for presentation in a companys annual report