A) Sabotage B) Pilferage C) Subversion D) Espionage
A) Number of times they were caught B) Level of Education C) Only steals small, easily hidden items D) Intent and premeditation in theft
A) Risk Self-Assumption B) Risk Reduction C) Risk Avoidance D) Risk Transfer
A) Identification and Verification of purpose B) Issue of weapons C) Allow free access D) Body Frisking
A) Espionage targets morale: Subversion targets information B) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption C) Subversion is done by governments only D) Espionage is legally protected: Subversion is Criminal
A) Risk Reduction B) Risk Transfer C) Risk Self Assumption D) Risk Spreading
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Spreading the risk by outsourcing critical operations C) Hiring a private contractor to manage physical security D) Ignoring risk completely due to lack of budget
A) Pilferage B) Vandalism C) Espionage D) Subversion
A) An environmental condition causing damage B) A legal owner of an asset C) An entity with both intent and capability to harm another D) A security measure in place to protect assets
A) The visibility of the asset B) The financial or survival of losing the assets C) The frequency of threat attempts D) The number of people using the asset
A) Ambush attack B) Advance Security C) Driver Rule D) Mental attitude
A) Novice Criminal B) Moving Attack C) Close in Security D) Ambush attack
A) Moving Attack B) Prophylactic Operations C) Ambush attack D) Political Motivated Kidnapper's
A) Advance Security B) Ambush attack C) Close in Security D) Mental Attitude
A) Modus Operandi B) Driver Rule C) Moving Attack D) Ambush attack
A) Political Motivated Kidnapper's B) Mental attitude C) Driver Rule D) Novice Criminal
A) Module Operandi B) Advance Security C) Novice Criminal D) Mental Attitude
A) Novice Criminals B) Political Motivated Kidnapper's C) Prophylactic Operations D) Modus Operandi
A) Political Motivated Kidnapper's B) Modus Operandi C) Advance Security D) Novice Criminals
A) Mental attitude B) Moving Attack C) Advance Security D) Prophylactic Operations
A) Slang usage B) Alertness C) Pleasantness D) Expressiveness
A) Use codes for every sentence B) Transmit 3 to 5 words at a time C) Wait for confirmation before speaking D) Speak continuously without pause
A) Creation of laws B) Establishment if civilization C) Hunting and gathering D) Transfer of thoughts and ideas
A) Use of phonetic alphabet and numerals B) Avoid using any code's C) Speak as fast as possible D) Use of long sentences and complete grammar
A) There are not enough languages B) People still fail to understand one another C) People are talking too much D) Communication channels are too expensive
A) High-pitched voices B) Slang and unnatural language C) All codes and acronyms D) Long pauses
A) Telephone B) Walkie-talkies C) Audio hailer D) Messaging security
A) Location B) Radio check C) Repeat message D) Receiving poorly
A) Written language B) Oral language C) Symbolic Art D) Use of Signs
A) A device for broadcasting messages B) The tone of a person's voice C) The tool used to write D) A common language shared by people exchanging ideas
A) Identify vulnerabilities from natural causes B) Assess criminal activity from outside the organization C) Review the state of physical security D) Determine employee productivity
A) Designing building architecture B) Training new recruits C) Boosting sales D) Analyzing and improving a facility's security practices
A) External cyber attacks B) Supplier delays C) Criminal activity within the organization D) Competitor activity
A) A routine fire drill B) A list of employee duties C) A critical on site examination of a facility's security status D) A financial audit of company assets
A) Prepare Schedule B) Develop alternatives C) Verify the need D) Determine how data will be gathered
A) It helps save money B) It guarantees fast results C) It ensures cooperation and resources D) It allows skipping certain steps
A) Checklists, audits, or inventories of security conditions B) Background checks C) Legal compliance checks only D) Staff scheduling
A) Fire inspection B) Security briefing C) Emergency drill D) Security survey
A) To identify security vulnerabilities and recommend improvements B) To evaluate marketing strategies C) To hire new security staff D) To monitor employee performance
A) Inspection complements the survey to maintain security integrity B) Only inspection is required for long term planning C) Survey is done after inspection D) They are unrelated processes
A) Loud and clear B) Location C) Repeat message D) Receiving poorly
A) Location B) Loud and clear C) Radio check D) Identify yourself/call sign
A) Radio check B) Copied message C) Location D) Loud and clear
A) Copied message B) Repeat message C) Identify yourself/call sign D) Location
A) Loud and clear B) Copied message C) Radio check D) Repeat message
A) Receiving poorly B) Radio check C) Loud and clear D) Location
A) Proceed and locates the witnesses B) Proceed to the scene promptly and safely C) Interview the complainant and witnesses D) Preliminary investigation
A) Relay message B) Effect the arrest of the offender C) Render obedience and proper conduct D) Render Assistance for the victim, if any
A) Effort and loyalty B) Effectively uses investigation C) Plaster cast D) Effect the arrest of the offender
A) Interview the company B) Locate and protect C) Locates and capture perpetrator D) Locates the identifies the witnesses
A) Interview and locates the offender B) Indirect Approach C) Affect the crime scene D) Interview the complainant and witnesses
A) Maintains the crime scene and protects the evidence B) Maintenance of crime scene and protects the evidence C) Methods of investigation D) Morse code
A) Interrogate the people B) Interrogate the suspect/offender C) Interrogate everyone D) Interrogate the crime scene
A) Note all happen B) Note all conditions, events and remarks C) Note all D) Note the important things
A) Arrange for the collection of evidence B) Arrange of the people C) Arrange of the following statements D) Arrange
A) Reports the offender B) Reports everyone C) Report me D) Reports the incident fully and accurately
A) Yields the responsibility to the follow up investigation B) Yields the conducting regular inspections C) Yields the following statements D) Yields the following individuals |