The 200 Flashcards
(200 cards)
When it is necessary to question a witness about sexual deviation, all the following should be avoided except:
A. Using street language
B. Giving the impression of being avid to develop the facts
C. Leaving the impression of suspecting the subject of being a sex deviate
D. Allowing the witness to frame the testimony in his or her own words
D
When designing security for an elementary school, classrooms should have a clear unobstructed view of entry roads. In CPTED, this describes:
A. Traffic calming
B. Mechanical surveillance
C. Natural surveillance
D. Natural access control
C
Which of the following is not a correct statement, as a general rule, involving the protection of proprietary information?
A. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B. By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C. Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D. Any agreement to be bound must always be in writing and are not implied from acts
D
A set of criteria, guidelines, and best practices that can be used to enhance the quality and reliability of products, service, or processes, is the definition for which of the following?
A. Guideline
B. Standard
C. Regulation
D. Code
B
The four (4) elements of emergency management are which of the following?
A. Planning, policies, preparedness, and response
B. Mitigation, policies, response, and recovery
C. Mitigation, preparedness, response, and recovery
D. Planning, preparedness, countermeasures, and recovery
B
Unclassified material should be marked:
A. ‘Unclassified’ at the top of the page
B. ‘Unclassified’ at the bottom of the page
C. ‘Unclassified at the top and bottom of the page
D. With no marking
D
Which concept can be used to analyze the need for security personnel in a physical protection system - for example for alarm assessment?
A. The ‘four eyes principle’ concept
B. The ‘necessary human being’ concept
C. The ‘linking pin’ concept
D. The ‘human back-up’ concept
B
A successful security design recognizes technological developments and integrates which three elements?
A. Architectural aspects; security systems; and operational factors
B. Architectural aspects; personnel; and effective PPS
C. PPS; personnel and procedures
D. PPS; personnel and security awareness programs
A
Adoption of ESRM propels the security program towards …
A. … lower risk levels
B. … reduced security costs
C. … a higher level of risk awareness
D. … constant improvement
D
In most cultures this is closest thing to a universal guideline or Golden Rule: to treat others the way one would want to be treated. This guiding principle works for both individuals and organizations. This best describes which of the following?
A. Business ethics
B. Government regulations
C. Corporate law
D. Civil law
A
When designing objectives or goals, they must be SMART. This acronym stands for which of the following:
A. Strategic; Measurable; Attainable; Relevant; Time-bound
B. Strategic; Metric-based; Accountable; Relevant; Time-bound
C. Specific; Measurable; Accountable; Reliable; Time-bound
D. Specific; Measurable; Attainable; Relevant; Time-bound
D
Identifying residual risk is MOST important to which of the following concepts?
A. Risk deterrence
B. Risk acceptance
C. Risk mitigation
D. Risk avoidance
B
A protection system’s individual applications and components should be integrated and converged so that they provide an equal level of protection. This concept is known as:
A. Security in depth
B. Balanced protection
C. Convergence
D. Onion approach
B
Network devices typically communicate using a worldwide internet standard for communication, also called:
A. TCP/IP
B. DNS Servers
C. WIN Servers
D. Web Proxies
A
A key element in the information asset protection (IAP) risk assessment process is a thorough study of existing and projected threats. What are the categories?
A. Historical, current and future threats
B. Man-made, natural and intentional
C. Intentional, natural and inadvertent threats
D. Internal, external and government
C
Which common non-probability sampling method requires recruitment of participants via other participants?
A. Stratified sampling
B. Snowball sampling
C. Cluster sampling
D. Random sampling
B
This organization prepares safety standards primarily as a guide to security device manufacturers, and then certifies whether devices submitted to the laboratories for approval meet those standards. This organization is called:
A. Underwriters Laboratories (UL)
B. International Standards Association (ISO)
C. American National Standards Institute (ANSI)
D. American Society for Testing and Materials (ASTM)
A
An assessment approach that is used to evaluate target attractiveness and includes criticality, accessibility, recuperability, vulnerability, effect and recoverability is BEST described as the:
A. Vulnerability assessment
B. Risk assessment
C. CARVER assessment
D. Security survey
C
What is an integral component to any travel security program, and especially to executive travel?
A. An agreement with a global risk organization
B. A user-friendly mobile travel app
C. An in-house travel agency
D. A risk assessment of the travel destination
D
Which of the following sensors relies on the Doppler frequency shift between the transmitted and received signal caused by a moving object within the energy field?
A. Capacitance sensors
B. Proximity sensors
C. Microwave sensors
D. Passive infrared sensors
C
Which of the following statements best describes the “statement of work”?
A. Details what work should be included in the contract
B. Outlines the invitation for bids and the specification list
C. Outlines the list of specific equipment and software along with costs
D. Outlines the performance criteria and specifications
A
When in the procurement stage, an invitation for bids (IFB) will list specific equipment and software and request prices from the contractors to supply the specific items and install them. This is best described as:
A. Design estimation
B. Design specification
C. Design planning
D. Design evaluation
B
In the Plan-Do-Check-Act (PDCA) cycle, this is the most critical stage and calls for identifying and analyzing the organization’s problems and events that could disrupt operations and assets. This step is referred to as which part of the cycle?
A. Plan
B. Do
C. Check
D. Act
A
An uncertain situation where a number of possible outcomes might occur, one or more of which is undesirable, BEST describes which of the following?
A. Risk
B. Threats
C. Loss
D. Targets
A