A) Espionage B) Pilferage C) Subversion D) Sabotage
A) Only steals small, easily hidden items B) Intent and premeditation in theft C) Number of times they were caught D) Level of Education
A) Risk Avoidance B) Risk Self-Assumption C) Risk Transfer D) Risk Reduction
A) Identification and Verification of purpose B) Body Frisking C) Allow free access D) Issue of weapons
A) Espionage is legally protected: Subversion is Criminal B) Subversion is done by governments only C) Espionage targets morale: Subversion targets information D) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption
A) Risk Transfer B) Risk Self Assumption C) Risk Reduction D) Risk Spreading
A) Ignoring risk completely due to lack of budget B) A company opting not to ensure a low-value asset but setting aside funds in case of loss C) Spreading the risk by outsourcing critical operations D) Hiring a private contractor to manage physical security
A) Vandalism B) Subversion C) Pilferage D) Espionage
A) A security measure in place to protect assets B) An entity with both intent and capability to harm another C) An environmental condition causing damage D) A legal owner of an asset
A) The number of people using the asset B) The frequency of threat attempts C) The visibility of the asset D) The financial or survival of losing the assets
A) Ambush attack B) Driver Rule C) Mental attitude D) Advance Security
A) Moving Attack B) Ambush attack C) Close in Security D) Novice Criminal
A) Political Motivated Kidnapper's B) Moving Attack C) Ambush attack D) Prophylactic Operations
A) Ambush attack B) Mental Attitude C) Close in Security D) Advance Security
A) Modus Operandi B) Ambush attack C) Moving Attack D) Driver Rule
A) Novice Criminal B) Political Motivated Kidnapper's C) Driver Rule D) Mental attitude
A) Mental Attitude B) Module Operandi C) Advance Security D) Novice Criminal
A) Political Motivated Kidnapper's B) Novice Criminals C) Modus Operandi D) Prophylactic Operations
A) Advance Security B) Modus Operandi C) Novice Criminals D) Political Motivated Kidnapper's
A) Advance Security B) Mental attitude C) Moving Attack D) Prophylactic Operations
A) Slang usage B) Alertness C) Pleasantness D) Expressiveness
A) Transmit 3 to 5 words at a time B) Speak continuously without pause C) Use codes for every sentence D) Wait for confirmation before speaking
A) Hunting and gathering B) Establishment if civilization C) Creation of laws D) Transfer of thoughts and ideas
A) Use of phonetic alphabet and numerals B) Use of long sentences and complete grammar C) Avoid using any code's D) Speak as fast as possible
A) People still fail to understand one another B) Communication channels are too expensive C) People are talking too much D) There are not enough languages
A) Long pauses B) Slang and unnatural language C) High-pitched voices D) All codes and acronyms
A) Walkie-talkies B) Messaging security C) Telephone D) Audio hailer
A) Receiving poorly B) Repeat message C) Location D) Radio check
A) Oral language B) Symbolic Art C) Written language D) Use of Signs
A) The tone of a person's voice B) A common language shared by people exchanging ideas C) The tool used to write D) A device for broadcasting messages
A) Review the state of physical security B) Determine employee productivity C) Identify vulnerabilities from natural causes D) Assess criminal activity from outside the organization
A) Designing building architecture B) Training new recruits C) Boosting sales D) Analyzing and improving a facility's security practices
A) External cyber attacks B) Criminal activity within the organization C) Competitor activity D) Supplier delays
A) A list of employee duties B) A routine fire drill C) A critical on site examination of a facility's security status D) A financial audit of company assets
A) Develop alternatives B) Verify the need C) Prepare Schedule D) Determine how data will be gathered
A) It helps save money B) It guarantees fast results C) It ensures cooperation and resources D) It allows skipping certain steps
A) Staff scheduling B) Legal compliance checks only C) Checklists, audits, or inventories of security conditions D) Background checks
A) Security survey B) Security briefing C) Fire inspection D) Emergency drill
A) To evaluate marketing strategies B) To hire new security staff C) To monitor employee performance D) To identify security vulnerabilities and recommend improvements
A) Survey is done after inspection B) Inspection complements the survey to maintain security integrity C) Only inspection is required for long term planning D) They are unrelated processes
A) Loud and clear B) Repeat message C) Receiving poorly D) Location
A) Radio check B) Loud and clear C) Location D) Identify yourself/call sign
A) Copied message B) Radio check C) Loud and clear D) Location
A) Repeat message B) Copied message C) Location D) Identify yourself/call sign
A) Radio check B) Copied message C) Loud and clear D) Repeat message
A) Radio check B) Receiving poorly C) Location D) Loud and clear
A) Proceed and locates the witnesses B) Interview the complainant and witnesses C) Proceed to the scene promptly and safely D) Preliminary investigation
A) Relay message B) Render Assistance for the victim, if any C) Render obedience and proper conduct D) Effect the arrest of the offender
A) Plaster cast B) Effectively uses investigation C) Effort and loyalty D) Effect the arrest of the offender
A) Interview the company B) Locates and capture perpetrator C) Locates the identifies the witnesses D) Locate and protect
A) Affect the crime scene B) Interview and locates the offender C) Interview the complainant and witnesses D) Indirect Approach
A) Maintenance of crime scene and protects the evidence B) Maintains the crime scene and protects the evidence C) Morse code D) Methods of investigation
A) Interrogate everyone B) Interrogate the suspect/offender C) Interrogate the crime scene D) Interrogate the people
A) Note the important things B) Note all conditions, events and remarks C) Note all happen D) Note all
A) Arrange of the following statements B) Arrange C) Arrange of the people D) Arrange for the collection of evidence
A) Reports everyone B) Report me C) Reports the incident fully and accurately D) Reports the offender
A) Yields the following individuals B) Yields the conducting regular inspections C) Yields the responsibility to the follow up investigation D) Yields the following statements |