Logical set of tangible elements

Assignment Help Basic Computer Science
Reference no: EM133059701

Question 1.

The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:

The security system

Physical security

Access control

Intrusion detection

Question 2. A security scheme that features several rings of protection that in the abstract look like a bull's eye is called:

Ring Protection

Attenuated protection

Concentric protection

Bull's eye protection

Question 3. The usual starting point in assessing risk at a facility is the:

Area in which assets are located

Front door

Security guard force

Perimeter

Question 4. A river adjacent to a protected facility is called:

Natural barrier

An access route

A vulnerability

A man-made barrier

Question 5. The protective capability of lighting is diminished:

When cones of light overlap one another

During winter months

In the absence of observation by a security officer force

When the lamp is fluorescent

Question 6. A well-designed and skillfully managed identification system will not require the involvement of guards.

True

False

Question 7. A system that regulates movement into, within, and from a protected area or facility is called:

An intrusion detection system

An access control system

A security system

A restricted system

Question 8. The justification for inspecting vehicles leaving a nuclear power plant is based on the:

Safety of the public

Dollar value of removable items and materials

Philosophy of management

Cultural inclinations of the workforce

Question 9. Fences, lights, sensors, and locks are:

Not to be confused with walls, doors, and safes

Manufactured by one company when they are to be used for a security purpose

Security standards

Physical security safeguards

Question 10. It would be a mistake to depend on the technology of an electronic access control system:

When the system was purchased from a non-U.S. manufacturer

After the system has been operating more than one year

And the software that drives it

And neglect the human side of the system

Question 11. Business fraud usually takes the form of repetitive, incremental thefts.

True

False

Question 12. One of the most frequently investigated incidents in the business environment is:

Embezzlement

Fraud

Employee theft

Bribery

Question 13. A management that wishes to eliminate employee theft should do all of the following EXCEPT:

Decide it is unacceptable

Do something about it

Involve employees in bringing it to an end

Grant amnesty once for first-time offenders

Question 14. Which of the following is NOT an indicator of employee theft?

Borrowing

Living above apparent income level

Writing bad checks

Speaking out against the company

Question 15. An alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company's health benefits plan. These circumstances point to a false:

Workers' compensation claim

Medical services claim

Finding in a civil law suit

Invoice

Question 16. The main administrative device for capturing employment and personal references is the:

Employment application form

Telephone

Personal computer

Assortment of public records

Question 17. Pre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:

Filter out persons with learning problems

Protect the community at large

Reduce costs associated with theft, injury, accidents, and medical assistance benefits

Question 18. One of the reasons employers conduct pre-employment background checks is because:

Regular employees expect screening of new employees

They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d

Laws and regulations place a duty on them to maintain a safe and secure working environment

Question 19. Certain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?

Are you married?

How many children do you have?

Where were you born?

Do you have any disabilities?

Question 20. Checking references by mail or e-mail is not as effective as:

Checking in person or by phone

Reading the job description

Talking to the applicant's potential supervisor

Sending a form to the registrar of the college attended by the applicant

Question 21. An organization's program for fire prevention and response often includes:

A floor warden program

Written approval of local law enforcement

A requirement for an access control system

Provisions for dealing with natural disasters

Question 22. A Mutual Aid and Assistance Agreement:

Is an agreement in which separate agencies commit to working with one another to deal with major emergencies

Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency

Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)

Question 23. The Incident Command System (ICS):

Is a substitute for the National Incident Management System (NIMS)

Is a system for managing a major incident at the-scene

Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)

Question 24. A fire control team:

Is committed to fire incidents only

Answers to the senior fire warden

Must include security officers

Includes maintenance personnel

Question 25. An Emergency Operating Plan (EOP) does all of the following EXCEPT:

Assign responsibilities

Identify likely incidents

Dedicate particular resources

Dictate cost-containment

Question 26. The Business Continuity Plan (BCP) is:

Completely separate from the EOP

Never a part of an EOP

Integral to the EOP

Question 27. A properly planned and executed BCP:

Falls into the exclusive realm of the CSO

Is written by the CSO

Can be the key in preventing the death of a company

Question 28. Recovery follows readiness and precedes:

Mitigation

Response

Restoration

Question 29. The acronym RTO stands for:

Reasonable termination objective

Response time overall

Recovery time objective

Question 30. IT governance is a term related to policies, procedures, and practices.

True

False

Question 31. The final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:

The chief operations officer

The chief executive officer

The chief security officer

Question 32. The risk of information loss is present:

Except when information is under lock and key

When productive use of the information ends

When a threat agent has targeted the information

Question 33. Which of the following is NOT a type of sensitive information?

Proprietary business and technical information

Personal data concerning applicants, employees, and former employees

Information developed for presentation in a company's annual report

Reference no: EM133059701

Questions Cloud

Different tools used to build and generate queries : When looking at database queries and the different tools used to build and generate queries, time is a major consideration.
What is bitcoin : On January 15th, 2018 Bitcoin was trading on the Coinbase exchange located in San Francisco at a price of US$12,979.87 per Bitcoin.
Should Beryl Iced Tea continue to rent : Should Beryl's Iced Tea continue to rent, purchase its current machine, or purchase the advanced machine? To make this decision, calculate the NPV
What is e-commerce and mobile technology : Your company is experiencing a decline in business because of competition. explain what is E-Commerce and Mobile Technology.
Logical set of tangible elements : The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:
What is the correct initial cash flow for your analysis : You have just completed a $18,000 feasibility study for a new coffee shop in some retail space you own. What is the correct initial cash flow for your analysis
How much must Gripp borrow : Gripp Corporation needs $765,000 to pay one of its suppliers. How much must Gripp borrow so that it has $765,000 to pay its suppliers
Calculate the book value of the asset being replaced : Abernathy Enterprises is considering replacing the existing press with a more efficient press. The new press costs $44,368 and requires $1,929 in installation
Minimize the effects of risk : Considering the market risks of interest rate, foreign exchanges, and commodity price risk, assess the risk that you believe may have the most significant impac

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe understanding of big data

Describe your understanding of big data and give an example of how you've seen big data used either personally or professionally.

  Discuss common sources of risk on IT projects

Discuss the common sources of risk on IT projects and suggestions for managing these risks.

  How might denormalization improve performance

Developers denormalize the design,for performance reasons. How might denormalization improve performance? Remember to provide a small sample at least five tables with sample information.

  What is information security governance

What is Information Security Governance? What documentation is associated with Security Governance?

  Statement of comprehensive income

What would be the statement of comprehensive income, beginning with income from continuing operations for this information?

  Cyber breach at target

What is your diagnosis of the breach at Target-was Target particularly vulnerable or simply unlucky?

  Compare and contrast qualitative data vs quantitative data

Discuss Quantitative Methodology. Discuss Qualitative Methodology. Compare and contrast qualitative data vs quantitative data.

  Effectiveness of IDS-IPS tools on actually detecting

What is the effectiveness of IDS/IPS tools on actually detecting/preventing an attacker? Are they worth installing for network defense? Why or why not?

  List the name and type of cable you will use it and location

List the Security devices and software we need it to protect the network5-Submit the network design proposal, whichcontains the proposed solution, network diagram.

  Distinguish between assigned and emergent leaders

Give an example of an instance in which you "emerged" as a leader. Explain how your communication might have facilitated your emergence as leader.

  Which group had the greater interquartile range

If the mean reading level for boys was 4.2 and for girls was 4.6, what is the overall mean for the class?

  How big data analytics can be used with smart cities

How Big Data analytics can be used with Smart Cities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd