A) Subversion B) Pilferage C) Sabotage D) Espionage
A) Level of Education B) Only steals small, easily hidden items C) Intent and premeditation in theft D) Number of times they were caught
A) Risk Avoidance B) Risk Self-Assumption C) Risk Reduction D) Risk Transfer
A) Allow free access B) Identification and Verification of purpose C) Body Frisking D) Issue of weapons
A) Subversion is done by governments only B) Espionage targets morale: Subversion targets information C) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption D) Espionage is legally protected: Subversion is Criminal
A) Risk Transfer B) Risk Spreading C) Risk Self Assumption D) Risk Reduction
A) Ignoring risk completely due to lack of budget B) Spreading the risk by outsourcing critical operations C) Hiring a private contractor to manage physical security D) A company opting not to ensure a low-value asset but setting aside funds in case of loss
A) Pilferage B) Espionage C) Subversion D) Vandalism
A) A security measure in place to protect assets B) An entity with both intent and capability to harm another C) A legal owner of an asset D) An environmental condition causing damage
A) The financial or survival of losing the assets B) The visibility of the asset C) The frequency of threat attempts D) The number of people using the asset
A) Advance Security B) Driver Rule C) Ambush attack D) Mental attitude
A) Ambush attack B) Novice Criminal C) Moving Attack D) Close in Security
A) Political Motivated Kidnapper's B) Moving Attack C) Ambush attack D) Prophylactic Operations
A) Ambush attack B) Close in Security C) Advance Security D) Mental Attitude
A) Modus Operandi B) Ambush attack C) Moving Attack D) Driver Rule
A) Driver Rule B) Mental attitude C) Novice Criminal D) Political Motivated Kidnapper's
A) Mental Attitude B) Novice Criminal C) Module Operandi D) Advance Security
A) Modus Operandi B) Political Motivated Kidnapper's C) Prophylactic Operations D) Novice Criminals
A) Novice Criminals B) Modus Operandi C) Advance Security D) Political Motivated Kidnapper's
A) Moving Attack B) Prophylactic Operations C) Advance Security D) Mental attitude
A) Expressiveness B) Pleasantness C) Alertness D) Slang usage
A) Transmit 3 to 5 words at a time B) Wait for confirmation before speaking C) Use codes for every sentence D) Speak continuously without pause
A) Hunting and gathering B) Establishment if civilization C) Transfer of thoughts and ideas D) Creation of laws
A) Use of phonetic alphabet and numerals B) Avoid using any code's C) Use of long sentences and complete grammar D) Speak as fast as possible
A) People are talking too much B) Communication channels are too expensive C) People still fail to understand one another D) There are not enough languages
A) Slang and unnatural language B) All codes and acronyms C) Long pauses D) High-pitched voices
A) Audio hailer B) Messaging security C) Walkie-talkies D) Telephone
A) Repeat message B) Radio check C) Location D) Receiving poorly
A) Oral language B) Use of Signs C) Symbolic Art D) Written language
A) The tone of a person's voice B) A common language shared by people exchanging ideas C) A device for broadcasting messages D) The tool used to write
A) Review the state of physical security B) Determine employee productivity C) Identify vulnerabilities from natural causes D) Assess criminal activity from outside the organization
A) Training new recruits B) Designing building architecture C) Boosting sales D) Analyzing and improving a facility's security practices
A) Competitor activity B) External cyber attacks C) Supplier delays D) Criminal activity within the organization
A) A list of employee duties B) A financial audit of company assets C) A critical on site examination of a facility's security status D) A routine fire drill
A) Determine how data will be gathered B) Prepare Schedule C) Verify the need D) Develop alternatives
A) It helps save money B) It allows skipping certain steps C) It ensures cooperation and resources D) It guarantees fast results
A) Staff scheduling B) Legal compliance checks only C) Checklists, audits, or inventories of security conditions D) Background checks
A) Emergency drill B) Security survey C) Fire inspection D) Security briefing
A) To monitor employee performance B) To evaluate marketing strategies C) To hire new security staff D) To identify security vulnerabilities and recommend improvements
A) They are unrelated processes B) Inspection complements the survey to maintain security integrity C) Only inspection is required for long term planning D) Survey is done after inspection
A) Repeat message B) Receiving poorly C) Location D) Loud and clear
A) Identify yourself/call sign B) Loud and clear C) Radio check D) Location
A) Copied message B) Radio check C) Loud and clear D) Location
A) Identify yourself/call sign B) Repeat message C) Location D) Copied message
A) Loud and clear B) Radio check C) Repeat message D) Copied message
A) Receiving poorly B) Location C) Radio check D) Loud and clear
A) Preliminary investigation B) Proceed and locates the witnesses C) Interview the complainant and witnesses D) Proceed to the scene promptly and safely
A) Relay message B) Render Assistance for the victim, if any C) Render obedience and proper conduct D) Effect the arrest of the offender
A) Plaster cast B) Effort and loyalty C) Effect the arrest of the offender D) Effectively uses investigation
A) Locates and capture perpetrator B) Interview the company C) Locate and protect D) Locates the identifies the witnesses
A) Interview the complainant and witnesses B) Indirect Approach C) Affect the crime scene D) Interview and locates the offender
A) Maintains the crime scene and protects the evidence B) Maintenance of crime scene and protects the evidence C) Methods of investigation D) Morse code
A) Interrogate everyone B) Interrogate the crime scene C) Interrogate the people D) Interrogate the suspect/offender
A) Note all happen B) Note all C) Note all conditions, events and remarks D) Note the important things
A) Arrange of the people B) Arrange C) Arrange of the following statements D) Arrange for the collection of evidence
A) Report me B) Reports everyone C) Reports the offender D) Reports the incident fully and accurately
A) Yields the following statements B) Yields the responsibility to the follow up investigation C) Yields the following individuals D) Yields the conducting regular inspections |