Reference no: EM133059701
Question 1.
The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:
The security system
Physical security
Access control
Intrusion detection
Question 2. A security scheme that features several rings of protection that in the abstract look like a bull's eye is called:
Ring Protection
Attenuated protection
Concentric protection
Bull's eye protection
Question 3. The usual starting point in assessing risk at a facility is the:
Area in which assets are located
Front door
Security guard force
Perimeter
Question 4. A river adjacent to a protected facility is called:
Natural barrier
An access route
A vulnerability
A man-made barrier
Question 5. The protective capability of lighting is diminished:
When cones of light overlap one another
During winter months
In the absence of observation by a security officer force
When the lamp is fluorescent
Question 6. A well-designed and skillfully managed identification system will not require the involvement of guards.
True
False
Question 7. A system that regulates movement into, within, and from a protected area or facility is called:
An intrusion detection system
An access control system
A security system
A restricted system
Question 8. The justification for inspecting vehicles leaving a nuclear power plant is based on the:
Safety of the public
Dollar value of removable items and materials
Philosophy of management
Cultural inclinations of the workforce
Question 9. Fences, lights, sensors, and locks are:
Not to be confused with walls, doors, and safes
Manufactured by one company when they are to be used for a security purpose
Security standards
Physical security safeguards
Question 10. It would be a mistake to depend on the technology of an electronic access control system:
When the system was purchased from a non-U.S. manufacturer
After the system has been operating more than one year
And the software that drives it
And neglect the human side of the system
Question 11. Business fraud usually takes the form of repetitive, incremental thefts.
True
False
Question 12. One of the most frequently investigated incidents in the business environment is:
Embezzlement
Fraud
Employee theft
Bribery
Question 13. A management that wishes to eliminate employee theft should do all of the following EXCEPT:
Decide it is unacceptable
Do something about it
Involve employees in bringing it to an end
Grant amnesty once for first-time offenders
Question 14. Which of the following is NOT an indicator of employee theft?
Borrowing
Living above apparent income level
Writing bad checks
Speaking out against the company
Question 15. An alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company's health benefits plan. These circumstances point to a false:
Workers' compensation claim
Medical services claim
Finding in a civil law suit
Invoice
Question 16. The main administrative device for capturing employment and personal references is the:
Employment application form
Telephone
Personal computer
Assortment of public records
Question 17. Pre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:
Filter out persons with learning problems
Protect the community at large
Reduce costs associated with theft, injury, accidents, and medical assistance benefits
Question 18. One of the reasons employers conduct pre-employment background checks is because:
Regular employees expect screening of new employees
They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d
Laws and regulations place a duty on them to maintain a safe and secure working environment
Question 19. Certain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?
Are you married?
How many children do you have?
Where were you born?
Do you have any disabilities?
Question 20. Checking references by mail or e-mail is not as effective as:
Checking in person or by phone
Reading the job description
Talking to the applicant's potential supervisor
Sending a form to the registrar of the college attended by the applicant
Question 21. An organization's program for fire prevention and response often includes:
A floor warden program
Written approval of local law enforcement
A requirement for an access control system
Provisions for dealing with natural disasters
Question 22. A Mutual Aid and Assistance Agreement:
Is an agreement in which separate agencies commit to working with one another to deal with major emergencies
Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency
Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)
Question 23. The Incident Command System (ICS):
Is a substitute for the National Incident Management System (NIMS)
Is a system for managing a major incident at the-scene
Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)
Question 24. A fire control team:
Is committed to fire incidents only
Answers to the senior fire warden
Must include security officers
Includes maintenance personnel
Question 25. An Emergency Operating Plan (EOP) does all of the following EXCEPT:
Assign responsibilities
Identify likely incidents
Dedicate particular resources
Dictate cost-containment
Question 26. The Business Continuity Plan (BCP) is:
Completely separate from the EOP
Never a part of an EOP
Integral to the EOP
Question 27. A properly planned and executed BCP:
Falls into the exclusive realm of the CSO
Is written by the CSO
Can be the key in preventing the death of a company
Question 28. Recovery follows readiness and precedes:
Mitigation
Response
Restoration
Question 29. The acronym RTO stands for:
Reasonable termination objective
Response time overall
Recovery time objective
Question 30. IT governance is a term related to policies, procedures, and practices.
True
False
Question 31. The final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:
The chief operations officer
The chief executive officer
The chief security officer
Question 32. The risk of information loss is present:
Except when information is under lock and key
When productive use of the information ends
When a threat agent has targeted the information
Question 33. Which of the following is NOT a type of sensitive information?
Proprietary business and technical information
Personal data concerning applicants, employees, and former employees
Information developed for presentation in a company's annual report