Security Organ & Admin

  1. Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:
    1. The security system
    2. Physical security
    3. Access control
    4. Intrusion detection
  2. Question 23 PointsA security scheme that features several rings of protection that in the abstract look like a bull’s eye is called:
    1. Ring Protection
    2. Attenuated protection
    3. Concentric protection
    4. Bull’s eye protection
  3. Question 33 PointsThe usual starting point in assessing risk at a facility is the:
    1. Area in which assets are located
    2. Front door
    3. Security guard force
    4. Perimeter
  4. Question 43 PointsA river adjacent to a protected facility is called:
    1. Natural barrier
    2. An access route
    3. A vulnerability
    4. A man-made barrier
  5. Question 53 PointsThe protective capability of lighting is diminished:
    1. When cones of light overlap one another
    2. During winter months
    3. In the absence of observation by a security officer force
    4. When the lamp is fluorescent
  6. Question 63 PointsA well-designed and skillfully managed identification system will not require the involvement of guards.
    1. True
    2. False
  7. Question 73 PointsA system that regulates movement into, within, and from a protected area or facility is called:
    1. An intrusion detection system
    2. An access control system
    3. A security system
    4. A restricted system 
  8. Question 83 PointsThe justification for inspecting vehicles leaving a nuclear power plant is based on the:
    1. Safety of the public
    2. Dollar value of removable items and materials
    3. Philosophy of management
    4. Cultural inclinations of the workforce
  9. Question 93 PointsFences, lights, sensors, and locks are:
    1. Not to be confused with walls, doors, and safes
    2. Manufactured by one company when they are to be used for a security purpose
    3. Security standards
    4. Physical security safeguards
  10. Question 103 PointsIt would be a mistake to depend on the technology of an electronic access control system:
    1. When the system was purchased from a non-U.S. manufacturer
    2. After the system has been operating more than one year
    3. And the software that drives it
    4. And neglect the human side of the system
  11. Question 113 Points. Business fraud usually takes the form of repetitive, incremental thefts.
    1. True
    2. False
  12. Question 123 PointsOne of the most frequently investigated incidents in the business environment is:
    1. Embezzlement
    2. Fraud
    3. Employee theft
    4. Bribery 
  13. Question 133 PointsA management that wishes to eliminate employee theft should do all of the following EXCEPT:
    1. Decide it is unacceptable
    2. Do something about it
    3. Involve employees in bringing it to an end
    4. Grant amnesty once for first-time offenders
  14. Question 143 PointsWhich of the following is NOT an indicator of employee theft?
    1. Borrowing
    2. Living above apparent income level
    3. Writing bad checks
    4. Speaking out against the company
  15. Question 153 PointsAn alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company’s health benefits plan. These circumstances point to a false:
    1. Workers’ compensation claim
    2. Medical services claim
    3. Finding in a civil law suit
    4. Invoice
  16. Question 163 PointsThe main administrative device for capturing employment and personal references is the:
    1. Employment application form
    2. Telephone
    3. Personal computer
    4. Assortment of public records
  17. Question 173 PointsPre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:
    1. Filter out persons with learning problems
    2. Protect the community at large
    3. Reduce costs associated with theft, injury, accidents, and medical assistance benefits
  18. Question 183 PointsOne of the reasons employers conduct pre-employment background checks is because:
    1. Regular employees expect screening of new employees
    2. They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d
    3. Laws and regulations place a duty on them to maintain a safe and secure working environment
  19. Question 193 PointsCertain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?
    1. Are you married?
    2. How many children do you have?
    3. Where were you born?
    4. Do you have any disabilities?
  20. Question 203 Points Checking references by mail or e-mail is not as effective as:
    1. Checking in person or by phone
    2. Reading the job description
    3. Talking to the applicant’s potential supervisor
    4. Sending a form to the registrar of the college attended by the applicant
  21. Question 213 PointsAn organization’s program for fire prevention and response often includes:
    1. A floor warden program
    2. Written approval of local law enforcement
    3. A requirement for an access control system
    4. Provisions for dealing with natural disasters 
  22. Question 223 PointsA Mutual Aid and Assistance Agreement:
    1. Is an agreement in which separate agencies commit to working with one another to deal with major emergencies
    2. Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency
    3. Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)
  23. Question 233 PointsThe Incident Command System (ICS):
    1. Is a substitute for the National Incident Management System (NIMS)
    2. Is a system for managing a major incident at the-scene
    3. Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)
  24. Question 243 PointsA fire control team:
    1. Is committed to fire incidents only
    2. Answers to the senior fire warden
    3. Must include security officers
    4. Includes maintenance personnel
  25. Question 253 PointsAn Emergency Operating Plan (EOP) does all of the following EXCEPT:
    1. Assign responsibilities
    2. Identify likely incidents
    3. Dedicate particular resources
    4. Dictate cost-containment 
  26. Question 263 PointsThe Business Continuity Plan (BCP) is:
    1. Completely separate from the EOP
    2. Never a part of an EOP
    3. Integral to the EOP
  27. Question 273 Points A properly planned and executed BCP:
    1. Falls into the exclusive realm of the CSO
    2. Is written by the CSO
    3. Can be the key in preventing the death of a company
  28. Question 283 PointsRecovery follows readiness and precedes:
    1. Mitigation
    2. Response
    3. Restoration
  29. Question 293 Points The acronym RTO stands for:
    1. Reasonable termination objective
    2. Response time overall
    3. Recovery time objective
  30. Question 303 PointsIT governance is a term related to policies, procedures, and practices. 
    1. True
    2. False
  31. Question 313 PointsThe final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:
    1. The chief operations officer
    2. The chief executive officer
    3. The chief security officer
  32. Question 323 PointsThe risk of information loss is present:
    1. Except when information is under lock and key
    2. When productive use of the information ends
    3. When a threat agent has targeted the information 
  33. Question 333 PointsWhich of the following is NOT a type of sensitive information?
    1. Proprietary business and technical information
    2. Personal data concerning applicants, employees, and former employees
    3. Information developed for presentation in a company’s annual report