Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compr
- Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:
- The security system
- Physical security
- Access control
- Intrusion detection
- Question 23 PointsA security scheme that features several rings of protection that in the abstract look like a bull’s eye is called:
- Ring Protection
- Attenuated protection
- Concentric protection
- Bull's eye protection
- Question 33 PointsThe usual starting point in assessing risk at a facility is the:
- Area in which assets are located
- Front door
- Security guard force
- Perimeter
- Question 43 PointsA river adjacent to a protected facility is called:
- Natural barrier
- An access route
- A vulnerability
- A man-made barrier
- Question 53 PointsThe protective capability of lighting is diminished:
- When cones of light overlap one another
- During winter months
- In the absence of observation by a security officer force
- When the lamp is fluorescent
- Question 63 PointsA well-designed and skillfully managed identification system will not require the involvement of guards.
- True
- False
- Question 73 PointsA system that regulates movement into, within, and from a protected area or facility is called:
- An intrusion detection system
- An access control system
- A security system
- A restricted system
- Question 83 PointsThe justification for inspecting vehicles leaving a nuclear power plant is based on the:
- Safety of the public
- Dollar value of removable items and materials
- Philosophy of management
- Cultural inclinations of the workforce
- Question 93 PointsFences, lights, sensors, and locks are:
- Not to be confused with walls, doors, and safes
- Manufactured by one company when they are to be used for a security purpose
- Security standards
- Physical security safeguards
- Question 103 PointsIt would be a mistake to depend on the technology of an electronic access control system:
- When the system was purchased from a non-U.S. manufacturer
- After the system has been operating more than one year
- And the software that drives it
- And neglect the human side of the system
- Question 113 Points. Business fraud usually takes the form of repetitive, incremental thefts.
- True
- False
- Question 123 PointsOne of the most frequently investigated incidents in the business environment is:
- Embezzlement
- Fraud
- Employee theft
- Bribery
- Question 133 PointsA management that wishes to eliminate employee theft should do all of the following EXCEPT:
- Decide it is unacceptable
- Do something about it
- Involve employees in bringing it to an end
- Grant amnesty once for first-time offenders
- Question 143 PointsWhich of the following is NOT an indicator of employee theft?
- Borrowing
- Living above apparent income level
- Writing bad checks
- Speaking out against the company
- Question 153 PointsAn alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company’s health benefits plan. These circumstances point to a false:
- Workers’ compensation claim
- Medical services claim
- Finding in a civil law suit
- Invoice
- Question 163 PointsThe main administrative device for capturing employment and personal references is the:
- Employment application form
- Telephone
- Personal computer
- Assortment of public records
- Question 173 PointsPre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:
- Filter out persons with learning problems
- Protect the community at large
- Reduce costs associated with theft, injury, accidents, and medical assistance benefits
- Question 183 PointsOne of the reasons employers conduct pre-employment background checks is because:
- Regular employees expect screening of new employees
- They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d
- Laws and regulations place a duty on them to maintain a safe and secure working environment
- Question 193 PointsCertain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?
- Are you married?
- How many children do you have?
- Where were you born?
- Do you have any disabilities?
- Question 203 Points Checking references by mail or e-mail is not as effective as:
- Checking in person or by phone
- Reading the job description
- Talking to the applicant’s potential supervisor
- Sending a form to the registrar of the college attended by the applicant
- Question 213 PointsAn organization’s program for fire prevention and response often includes:
- A floor warden program
- Written approval of local law enforcement
- A requirement for an access control system
- Provisions for dealing with natural disasters
- Question 223 PointsA Mutual Aid and Assistance Agreement:
- Is an agreement in which separate agencies commit to working with one another to deal with major emergencies
- Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency
- Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)
- Question 233 PointsThe Incident Command System (ICS):
- Is a substitute for the National Incident Management System (NIMS)
- Is a system for managing a major incident at the-scene
- Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)
- Question 243 PointsA fire control team:
- Is committed to fire incidents only
- Answers to the senior fire warden
- Must include security officers
- Includes maintenance personnel
- Question 253 PointsAn Emergency Operating Plan (EOP) does all of the following EXCEPT:
- Assign responsibilities
- Identify likely incidents
- Dedicate particular resources
- Dictate cost-containment
- Question 263 PointsThe Business Continuity Plan (BCP) is:
- Completely separate from the EOP
- Never a part of an EOP
- Integral to the EOP
- Question 273 Points A properly planned and executed BCP:
- Falls into the exclusive realm of the CSO
- Is written by the CSO
- Can be the key in preventing the death of a company
- Question 283 PointsRecovery follows readiness and precedes:
- Mitigation
- Response
- Restoration
- Question 293 Points The acronym RTO stands for:
- Reasonable termination objective
- Response time overall
- Recovery time objective
- Question 303 PointsIT governance is a term related to policies, procedures, and practices.
- True
- False
- Question 313 PointsThe final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:
- The chief operations officer
- The chief executive officer
- The chief security officer
- Question 323 PointsThe risk of information loss is present:
- Except when information is under lock and key
- When productive use of the information ends
- When a threat agent has targeted the information
- Question 333 PointsWhich of the following is NOT a type of sensitive information?
- Proprietary business and technical information
- Personal data concerning applicants, employees, and former employees
- Information developed for presentation in a company’s annual report
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
