Personal Sec Flashcards

(279 cards)

1
Q

Which of the following is not a best practice for personnel security

A

Limiting the use of background checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not a purpose of personnel security

A

Ensuring physical security measures are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an example of a personnel security control

A

Two factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of background checks in personnel security

A

To verify the identity and qualifications of job applicants
To assess the trustworthiness and reliability of individuals
To identify any potential security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a security clearance

A

To grant access to classified information
To assess a persons trustworthiness and loyalty
To determine if a person is eligible for certain positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the context of physical security, what is the purpose of a background investigation

A

To determine an individuals eligibility for a security clearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a legal hold notice

A

Informing relevant parties to preserve evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a potential threat to personnel security

A

Social Engineering
Insider Threats
Physical Security Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary goal of personnel security

A

To prevent unauthorized access to sensitive information
To maintain confidentiality of information
To prevent theft and sabotage
To ensure the integrity of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a purpose of personnel security

A

Ensuring the physical security of facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of security awareness training program in personnel security

A

To educate employees about potential security threats and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a responsibility of the individual in the personnel security process

A

Reporting security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a key principle of personnel security

A

Need to know principle
Least privilege principle
Separation of duties principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a personnel security policy

A

To establish guidelines for hiring employees
To outline the responsibilities of employees
To define the consequences of security violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During a sting operation, what is the primary goal of the decoy

A

To trick the suspect into committing a crime
To induce a suspect to commit a crime for evidence collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of conducting background checks in personnel security

A

To identify potential risks or threats
To verify employment history
To access criminal records
To evaluate financial stability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a key characteristic of the PEACE model of interviewing

A

Preparation and Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which of the following is an example of personnel security control

A

Security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a characteristic of secure entrance control system

A

Strong access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose a background check in personnel security

A

To verify an individuals identity
To assess an individuals character and trustworthiness
To ensure an individual meets the requirements for the specific job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a personnel security best practice

A

Regularly updating access control lists
Conducting background checks on new employee
Implementing a strong password policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of pre employment training

A

To verify the suitability of potential employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is an example of personnel security control

A

Access Control Measures
Security Awareness Training
Incident response procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the role of employee training in personnel security

A

To ensure employees understand security policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following is an example of security breach
Unauthorized access to restricted area
26
What is the role of a forensic accountant in an investigation
To analyze financial records for signs of fraud
27
What is the primary function of employee exit interviews
To gather information on why employees are leaving
28
Which of the following is not a method for preserving digital evidence
Modifying the original evidence Encrypting the original evidence
29
Which of the following is not a common method used to identify a suspect a in a digital investigation
Data Carving
30
What is the purpose of conducting background checks in personnel security
To verify employment history To assess criminal records To evaluate financial stability
31
What is the main purpose of employee training programs in personnel security
Reducing security incidents
32
What is the primary advantage of using background checks in pre employment screening
Identifying potential red flags Verifying qualifications
33
What is the purpose of personnel security
To protect classified information To ensure the safety of employees To prevent unauthorized access to facilities To maintain a safe work environment
34
What is the role of access control policies in personnel security
To restrict unauthorized access to sensitive areas
35
Which of the following is a key element of a criminal investigation
Determining if a crime has occurred
36
What is the main challenge of using digital forensics in an investigation
Complexity of analysis Cost of tools Legal admissibility
37
Which of the following is not a component of personnel security
Cybersecurity protocols Intrusion detection systems Background checks Physical security measures Security awareness training
38
What is the purpose of physical access controls in personnel security
To restrict access to sensitive areas
39
What is the role of security awareness training in personnel security
To educate employees about security policies and procedures To promote a culture of security awareness To reduce the risk of security incidents caused by human error To ensure compliance with security policies
40
What is the purpose of a termination process in personnel security
To ensure that an individuals access to sensitive information is revoked
41
Which of the following best describes a whistleblower policy
A policy to protect employees who report misconduct
42
Which of the following is not a typical step in the process of securing a crime scene
Collecting evidence immediately
43
What is the purpose of security awareness training for employees
To educate employees about the importance of personnel security To teach employees how to recognize and respond to security threats To promote a culture of security within the organization To document and respond to security incidents To reduce the risk of security incidents caused by human error
44
What is the role of access control in personnel security
To restrict access to sensitive areas
45
What is the purpose of a pre employment screening process in personnel security
To determine an individuals potential for misconduct
46
Which of the following is not a method of personnel security
Incident response
47
Which of the following is not a factor considered during personnel security clearance
All should be considered Criminal history Financial stability Education qualifications
48
What it is necessary to question a witness about sexual deviation all of the following should be avoided except
Allow the witness to frame the testimony in his or her own word
49
What is the primary feature of PEACE model of interviewing
Empathy and rapport building
50
What is the primary goal of personnel security
To ensure the safety of employees
51
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Application form, pencil and paper tests, performance-simulation tests, interviews
52
Which of the following is not a best practice for personnel security
Regularly updating security clearance records Implementing access control measures Conducting background checks on visitors
53
Which of the following is an example of a personnel security control measure
Access Control Systems Security Cameras Encryption Software
54
What is the primary goal of background checks in personnel security
To verify employment history To assess an individuals character To identify potential security risks
55
What is the purpose of security clearances in personnel security
To grant individuals access to classified information To assess an individuals trustworthiness and reliability To restrict access to sensitive areas
56
Which of the following is not a purpose of personnel security
Ensuring physical security measures are in place
57
What is the purpose of Non Disclosure Agreement (NDA) in personnel security
To protect sensitive information from unauthorized disclosure To establish a legal contract between an organization and its employees To ensure the confidentiality of classified information
58
What does the term personnel security refer to in the ASIS CPP domain
Security measures for employees and contractors
59
What is the primary goal of personnel security screening
To identity potential security risks
60
A narcotic addict is sometimes called
A hophead
61
What is the primary advantage of using a multidisciplinary team in investigations
Broader range of expertise
62
Which of the following is not a measure to protect against social engineering attacks
Implementing strong access controls Conducting regular security awareness training Verifying the identity of individuals before granting access
63
In the context of personnel security, what is the purpose of a background investigation
To determine an individuals eligibility for a security clearance
64
What is the purpose of a security awareness training program in personnel security
To educate employee about potential security threats and best practices To ensure the safety of employee To protect sensitive information To prevent unauthorized access to facilities
65
Which of the following is an example of a personnel security violation
Unauthorized use of company resources Unauthorized disclosure of classified information
66
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
67
Which of the following is not a type of personnel security clearance
Public
68
Which of the following is an example of a personnel security vulnerability
Lack of background checks for employees
69
Which of the following is a potential consequence of personnel security breaches
Financial loss Decreased employee morale Damage to company reputation
70
Which of the following is a responsibility of individuals in personnel security
Reporting Security incidents Adhering to security policies Protecting sensitive information
71
What is the purpose of a security badge system
To identify and control access for employees and visitors
72
Which of the following is not a typical step in the investigation process
Closing the investigation without reporting
73
Which of the following is not a potential risk associated with personnel security
Cybersecurity vulnerabilities
74
Which of the following is not a step in personnel security process
Social media monitoring
75
What is the primary goal of internal investigation
Identifying policy violations
76
Which of the following is a common method used in personnel security screening
Background checks
77
What is the role of employee training in personnel security
To ensure employees understand security policies and procedures
78
Which of the following is an example of a personnel security policy
A set of guidelines for managing employee security
79
What is the role of security awareness training in personnel Security
To educate employees about security policies and procedures To promote a culture of security within the organization To reduce the likelihood of security incidents caused by human error
80
What is the purpose of personnel security
To protect the organizations physical assets To ensure the safety of employee To prevent unauthorized access to sensitive information
81
Which of the following is a potential risk to personnel security
Insider Threats Social Engineering attacks Unauthorized access
82
Which of the following is a best practice for managing personnel security risks
Regularly reviewing and updating security policies and procedures Conducting thorough background checks for all employees Implementing a comprehensive security awareness training program
83
Which of the following best describes a security incident log
A records for all security related incidents and actions taken
84
What is the primary function of access control in personnel security
Restricting unauthorized access
85
Which of the following is not a personnel security control meassure
Encryption technology
86
Which of the following is not a factor considered in personnel security
Criminal history Financial stability Educational background
87
Which of the the following is an example of a personnel security control
Security awareness training
88
What is the primary disadvantage of using open source intelligence in investigations
Legal and Ethical considerations
89
Which of the following is not a potential threat to personnel security
Natural disasters
90
What is the purpose of security incident reporting
To document and respond to security incidents
91
What is the purpose of root cause analysis in investigations
Identifying the underlying reasons for an incident
92
Which of the following is not a requirement for obtaining a personnel security clearance
Credit check
93
Which of the following is not a common personnel security control measure
None of the above The below points are the common personnel security control measure Background checks Security clearances Physical access controls
94
The cardinal rule in management of transportation concern is that those assigned to line hauling duties must be
Of the highest integrity
95
Which of the following is the primary purpose of an investigation
To determine the facts of an incident
96
Which of the following best describes the concept of least privilege
Granting employees the minimum access necessary to perform their duties
97
Which of the following is a key benefit of using digital forensics
Ability to recover and analyze electronic evidence
98
Which of the following is an example of a red flag during pre employment screening
A history of employment gaps
99
Which of the following best describes the primary purpose of personnel security
To protect an organizations human resources and ensure their safety
100
Which of the following best describes the concept of dual control
Requiring two or more individuals to complete a sensitive task
101
What is the role of security audits in personnel security
To evaluate and improve security measures
102
Which of the following is not a benefit of personnel security programs
Increasing operational costs
103
Which of the following is a key element of a personnel security investigation
Interviewing involved parties
104
The principle of unity of command is most relevant to which aspect of investigations
Organizational structure
105
What is the purpose of a personnel security policty
To establish guidelines for hiring employees To outline the responsibilities of employees To define the consequences of security violations
106
Which of the following is not a typical step in the evidence collection process
Manipulation
107
What is the purpose of a personnel security program
To ensure compliance with legal and regulatory requirements To protect against unauthorized access to sensitive information To mitigate the risk of insider threats
108
Which of the following is an example of physical security measures
Security Cameras and access control systems
109
Which of the following is not a standard step in the investigation process
Marketing
110
Thefts of this nature are held to be impulsive acts committed by persons operating alone who pick up an item or two that is readily available when there is small risk of detection
Theft of opportunity
111
Which of the following is a key element of a personnel security program
Background checks
112
Which of the following is an example of an insider threat
An employee who misuses access to sensitive information
113
What is the role of a security incident management team
To prevent security incidents from occurring To respond to and manage security incidents To investigate and resolve security incidents
114
Which of the following is an example of a personnel security measure
Background checks
115
What is the purpose of personnel security policy
To establish guidelines for screening and vetting personnel To define the roles and responsibilities of personnel To outline the procedures for reporting security incidents
116
What is the purpose of visitor management system
To tract and manage visitors entering a facility
117
Which of the following best describes an access control list (ACL)
A list of individuals who are authorized to access specific areas or information
118
What is the key to effective report writing in investigations
Being clear, concise and objective
119
Which of the following is not a element of criminal liability
Intention
120
In a cognitive interview, what is the purpose of the reverse order technique
Witness recalling the incident in reverse order to avoid chances of false reporting
121
What is the purpose of polygraph test in an investigation
To detect deception
122
What is the primary purpose of conducting a control hire in undercover operations
To monitor the activities of an informant
123
Which of the following best describes the term hearsay
Second information not directly observed by the witness
124
What is the main goal of using the alternative question technique in REID method
To make suspect choose between two versions of events
125
Which of the following is an example of a physical security control
Security Cameras
126
Which of the following is a potential disadvantage of a sting operation
Legal claims of entrapment
127
Which of the following is a key aspect of a personnel security plan
Risk assessment
128
Which of the following is a potential threat to personnel security
Insider threat
129
What is the main purpose of a root cause analysis in investigations
Identifying the cause of an incident Preventing recurrence of incidents
130
What is the main objective of personnel security screening
To ensure the loyalty and trustworthiness of individuals
131
Which of the following is a key component of a successful interview
Building rapport with the interviewee
132
Which of the following is not a potential threat to personnel security
Workplace accidents
133
Which of the following is not a method of employee monitoring
Job performance reviews
134
What is the primary goal of personnel security measures
To minimize the risk of insider threats
135
In the context of personnel security what is the purpose of background investigation
To determine an individuals eligibility for a security clearance
136
Which is not one of the six principles of executive protection (EP)
Rely on technological resources
137
The best prevention of exposure to workplace violence is…
A preemployment background investigation program
138
Methamphetamines belong to which category of abused drugs
Stimulants
139
The practice of a workplace drug dealer retaining a small amount of product for his own use to compensate for "credit" purchases by the buyer is known as:
Pinching
140
Verification of applicant-provided information constitutes…
A background check
141
Physiological craving brought on by chemical changes in the body, both mental and physical, and characterized by withdrawal if not satisfied, is known as…
Chemical dependency
142
Which of the following is not one of the three most common discrepancies in resumes?
Salary history
143
A shortened duration and decreased intensity of a drug's effect, leading to the need to consume larger doses for the same effect, is known as…
Tolerance
144
What are the two most common cases for drug testing?
Random and Preemployment
145
Which of the following is NOT a distinctive and important element of a violence risk assessment program?
Random monitoring
146
Lysergic acid diethylamide (LSD) belongs to which category of abused drugs
Hallucinogens
147
With regard to workplace violence, what are the three levels of assessment for known aggressors?
Initial, threshold, comprehensive
148
The abduction of a hostage in order to coerce someone else into committing a crime is known as a…
Tiger kidnapping
149
An active search for information that uncovers hidden information constitutes…
A background investigation
150
Opium, its derivatives, and synthetic substitutes belong to which category of abused drugs?
Narcotics
151
When establishing internal and external complaint and grievance procedures, which of the following procedures should to be included? *
Identification of the root causes
152
In an armed workplace violence incident, the program assumes that an effective response by properly trained personnel will occur if the perpetrator is not diverted. This means that one of the BEST planned responses should be which of the following? *
Response by correctly trained, armed personnel who will handle the situation.
153
Like a typical security program, a violence risk assessment program employs which of the following tactics as a countermeasure to a workplace violence incident? *
Diversion, delay and response
154
If an executive from the organization is kidnapped and made incapable of running the company, the organization can expect three types of financial losses, one of these is:
The executive’s services will be lost either temporarily or permanently, which can be costly.
155
Which of the following types of investigations is considered the “most common type of investigation in many business and organizational settings”? *
Incident
156
What is the function of risk management in relation to asset protection
Manage risk, by balancing the costs and benefits of protection measures
157
The change in asset protection is increasingly based on what
The principle of risk management
158
A company investment in executive protection pays dividends by protecting a key corporate asset this is
The executive’s life and his well being
159
Over reliance on security technology tends to put the executive in what
Vault
160
As an EPS, what is the most troubling event
Events that have been known to happen but are unexpected
161
In asset protection the paradigm shift is in the area of technological development and what
Conceptual shift
162
When a senior management directs a security manager to perform certain functions, what is the relationship called
Functional authority
163
Which are the areas in asset protection where there are pattern of changes
Scope of security professional duties Regulatory environment Integrated security systems
164
In the security VS convenience continuum the principal and who decides what tradeoffs to make
The agent
165
According to the pattern of change in asset protection, what has evolved in the last 20years in workplace violence risk assessment in relation to multi-disciplines
An interdisciplinary workplace violence risk assessment and management process that allows for identification and assessment of individuals, so they can be diverted from violence before they act
166
A violence risk assessment will assist in differentiating what in the workplace
Between individuals who pose a threat and those who solely make threats
167
What is the only answer for an employee who have surrendered to a substance abuse
Progressive discipline
168
For a creation of a drug-free workplace, an absolute necessity is
A written policy, which is practical functional and enforceable
169
What are the essential difference between alcoholics and social drinkers
Loss of control over the time, place and amount of drinking
170
Modern management has come to the realisation that their best option to manage employee theft and fraud is what
Preventing losses
171
Which are the stages in the comprehensive model for handling theft and fraud in an organization
Prevention Investigation Program testing
172
The most frequent and costly form of dishonesty the security professional will encounter in the workplace is
Theft and fraud
173
An intentional deception for the purpose of unlawfully taking another’s property is referred to as
Fraud
174
Security professionals should focus on identifying what percentage of employees that are responsible for 95% of workplace theft
5%
175
Who determines workplace violence management monitoring or closeout of the incident
The company
176
Excluding people from an investigative pool of subjects so as to conserve investigative resource defines what technique
Profiling
177
What is the job of the first responder in a workplace violence incident
Divert
178
Violence risk assessment can be broken down into levels of assessment, List them
Initial Threshold Comprehensive
179
An EPS discovered that there is a crisis near the venue of a meeting and decided to take the principal through an alternative route, The EPS is doing what by this
Getting the principal out of trouble
180
The most distinctive and important elements of a violence policy and program are processes to deal with
Behavioural recognition: Notification: assessment and Intervention
181
A violence risk assessment program must address a variety of workplace behaviours, which are early warning sign that can lead to violence these are
Harassments Intimidation Discrimination
182
Business related concerns to be addressed by violence risk assessment are
Liability Workplace moral Productivity
183
What is considered as the greatest economic cost to an organisation for acts of violence on the workplace
Loss of morale and productivity
184
Which are the members of an incident management team (IMT) in the comprehensive approach to workplace violence
A senior management representative A senior security professional A senior human resource manager A legal representative who is familiar with labour and employment law
185
Which are the last elements of violence risk assessment program, which is like a typical security program
Diversion Delay Response
186
What is a major problem attributed to alarm response by the police
High rate of false alarm
187
In executive protection when the adversary strikes salvation lies where
EPS conditioned response
188
The long-term solution to each situation of potential workplace violence lies in
Understanding the emotional and mental state of the aggressor and diverting him from violence
189
Valid violence risk assessment require a depth of information available only for which
Known subject
190
Rings of protection by EPS are
Outer ring One or two inner ring A safe room
191
In considering the level of outside support that an organization can tap into its violence risk assessment and management program, which of the following is not a problem that the organization should be ready to contend with
Limited law enforcement resources to respond to potential violence in workplace Limited but growing legal experience in workplace violence management Limited numbers security service providers that understand their limits or role and capability for providing the board spectrum of resources necessary Limited number of defensible experts in the psychopathologies and behaviours with violence
192
What is the responsibility of the background investigator
Validate the truthfulness of applicant’s statements
193
What is a recommended recruitment method for non-entry technical/managerial positions
Blind-ad
194
An employer dealing in spare parts is concerned about looses by robbery, burglary and theft of his parts by employees what type of insurance would you recommend
Crime cover
195
The most important function of the executive protection specialist is
Prevent and avoid danger or dangerous places
196
The most visible component of executive protection is
Physical acumen
197
When an executive is travelling abroad what key function should the EPS perform
Learn local social customs
198
In the U.S the age discrimination in employment act of 1967, protects which age bracket of individuals from employment based on their age
40 years
199
Which is a major reason why an employer should approach the use of internet information for hiring decision with caution
An employer can potentially face allegations of unlawful discrimination if the online research reveals information that may not be used directly or indirectly or indirectly to limit a person’s employment opportunities
200
If in front of a venue where the principal was to deliver a paper becomes rowdy and the EPS has to turn back and take an alternative route, this
Avoiding dangerous persons and conditions
201
The primary source of concern for business in terms of workplace violence incident is
Cost of be proven liable for negligence
202
Where is the executive most vulnerable
At home
203
In the future improvement what will lead to a greater understanding of the behavioural cues that signal impending violence behaviour
Assessment Intervention Monitoring
204
For security practitioners which is the most effective means of preventing workplace violence
Early detection
205
‘‘The best predictor of future behaviour is past behaviour’’ is in which context
Workplace violence
206
What cover would you recommend for a facility with high incidents of break-ins resulting in theft and loss of equipment's
Crime policy
207
In an organization were series of missing items are being reported, where do you advice key records of item movement controls can be adequately sourced from
Well developed database
208
What level of employees would be more concerned with implementation of organizational policies
First line managers
209
Typically director of security in an organization should report to whom
Senior or executive management (VP)
210
As a corporate security manager your knowledge that an asset protection program considers not only the major incident cost avoidance, but also assets, or value recoveries that occur in the asset protection operations, will enable you achieve what
Cost-effectiveness
211
How would an asset protection manager justify request for additional funds for his programs from senior management
Demonstrate that the real cost to the enterprise would be greater if the level of support for the activity were reduced
212
What would be the key components of alternative service providers
Order maintenance operations
213
When planning for security what should the professional always consider
Culture of the organization
214
The primary goal of intervention and resolution in a workplace violence incident is
The short-term and ideally long term safety of the identified target or targets
215
Whose responsibility is it for helping to protect organizational assets
All employees
216
One major obstacle in the implementation of an effective security awareness program is
Creating employee & management buy-in
217
A standard of measurement using quantitative, statistical and mathematical analysis is
Metrics
218
A first line manager is
Supervisor
219
At what level of violence risk assessment is it determined whether there is an immediate risk of harm for emergency procedures to be activated
Initial assessment
220
Which level of violence risk assessment provides the basis for the design and implementation of a non-immediate emergency resolution plan
Comprehensive
221
The security of an organization rest squarely on the practices of who
Employees
222
One of the most important mission of a security awareness program is
Familiarise employees with the organization policies and procedures
223
In executive protection program the person who walks, rides and files with the principal providing personal protection is usually referred to as
EP specialist
224
In the corporate sphere, the best approach to adopt during the pre-planning stage of the executive program
Establish a crisis management team
225
The choreograph used by the EP specialist to physically move about with the subject is called
Working the principal
226
An efficient supervisor that is having problem supervising his staff is faced with what problem
Delegation/span of control
227
The primary purpose of a security awareness program is
Educate employees on how to help protect the company’s assets and reduce losses
228
The first action of the IMT if a violent behaviour of an employee was reported
Initiate an initial assessment
229
What is best described as the implementation of standards and principles that when constantly applied control loss
Security
230
Modern management have come to realise that the most cost-effective way to deal with fraud in the workplace is
Preventing it
231
The opportunity for fraud is generally created by
Absence or weakness of internal controls
232
A coverage intended to guarantee the performance of some obligation by an individual
Surety bond
233
The management practice that separates the ultimate and operating responsibility for accomplishing task is called
Delegation
234
The recommended evacuation strategy for an aggressor with firearms in a workplace violence situation is
360 Degrees
235
What percentage of illicit drug users in the U.S are employed according to a 2006 survey
8.8%
236
A staff was recognised by his executive of an end of year dinner party, whose theory is being expressed
Herzberg
237
A strategy in intervention that involves an interview of an aggressor on his own property is
‘‘Knock and talk’’
238
A pre-emptive strike against confusion and exposure in executive protection is called
Advance
239
After ascertaining that there is no immediate danger/harm in a workplace violence risk assessment, what is the next stage
Threshold
240
What are secondary elements of a workplace violence risk assessment
Diversion Delay Response
241
The most consistent predictor of theft in all industries is what
Employees perceived chance of being detected
242
Before the paradigm shift early security training and awareness programs were based upon what
Top-down management directive Passive compliance An attitude of ‘‘we do it this way because the book says so’’
243
What would be necessary to create a job position for a proprietary security officer
Job description
244
A security director giving direct instruction and receiving same is called
Functional authority
245
The specific opportunity security awareness program brings to employees in an orientation program is
Explain security obligation for all employees
246
How can an employer protect against dishonesty of his employee who will handle cash transactions
Fidelity bond
247
Which are the ample means developed by security professionals to deal with criminal acts in the workplace
Timed safes Bandits barriers Lightings
248
The most distinctive and important elements in a violence risk assessment are
Behavioural recognition Notification Assessment
249
In asset protection the period between major paradigm shifts has been
Decreasing
250
Management options to handle employees substance abuse problems includes what
Intervention Progressive discipline Referral to EAP
251
A formal social device for reducing risk by transferring the risk of several entities to a single entity is
Insurance
252
To increase or decrease the coverage of the standard policy is the major purpose of what
Endorsement
253
What are the elements of most economic crimes
Motive Ability Opportunity
254
The portfolio theory in insurance involves a comprehensive analysis of
Business risk and pure risk
255
Modern workforce differs from old workforce in the paradigm shift in what ways
Sophisticated Highly educated Independent
256
An employee trust in relation to insurance is referred to as
Fidelity bond
257
One way to aid a security professional to gain support to start and continue a security awareness effort in the organization is
Use of metrics
258
Which risk management tool is either proactive or reactive
Insurance
259
An organizations primary resources is what
People
260
The best way to recruit a good candidate is
Internal recommendation
261
Staffing decisions should be made against
Detailed job requirement analysis
262
In developing a security approach to the asset protection program, what should be the first objective
Deter
263
Most insurance policies cover only
Direct loss
264
Insurance is divided in two categories namely
Personal and property
265
A security system element that will significantly increase the chances of detecting the vulnerabilities and gaps that leads to employee theft and fraud is
Clear organizational policies procedures and practices
266
Most fraud perpetrators are influenced by what
An opportunity to profit
267
An EPS by selecting hotels with proven safety reports and plotting for fire escape routes and packing smoke mask wants to achieve what
Preventing and avoiding danger
268
One way to get support for a security awareness programme is through the use of a standard of measurement using quantitative and mathematical analysis which are examples of potential measurements
Company losses before and after the security awareness program was implemented Number of recoveries and restitution before and after awareness program was implemented Numbers of persons briefed and the number of briefings per period Cost of briefings per employee
269
What is a correct statement about drug users and employment
Most drug users are employed
270
What is a correct statement about aggressors behaviour in a workplace violence
Unless psychopaths, aggressors typically go through a process of emotional escalation selecting targets that gives them sense of control
271
The long term solution to each situation of potential workplace violence lies in’’
Understanding the emotional and mental state of the aggressor and diverting him or her from violence
272
What is essential that the IMT be empowered to do
Commit company assets and personnel to resolve violence incidents
273
In a workplace violence risk assessment, a restraining or protective order is an example of what
Intervention
274
The best known form of risk transfer is
Insurance
275
The theory that premised on the belief that the opposite of satisfaction is not dissatisfaction but simply no satisfaction is promulgated by who
Herzberg
276
Which are the elements that must occur be present before a fraud or similar crime can occur in the workplace
Perception of a non-shareable problem Opportunity for a trust violation A series of rationalization that allows the individual to justify his behaviour as appropriate for the situation
277
The pocketing of small amounts of incoming invoice payments and the missing cash from previous invoice is
Lapping
278
Where is the greatest problem and pitfall for private policing (security) industry
Public/supplement
279
In a conceptual perspective of the security industry, which area focuses on supplementary and enhancing the public safety already provided by public policing agencies
Private/supplement Public/supplement