A) Subversion B) Pilferage C) Espionage D) Sabotage
A) Level of Education B) Only steals small, easily hidden items C) Intent and premeditation in theft D) Number of times they were caught
A) Risk Transfer B) Risk Self-Assumption C) Risk Avoidance D) Risk Reduction
A) Allow free access B) Issue of weapons C) Identification and Verification of purpose D) Body Frisking
A) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption B) Espionage targets morale: Subversion targets information C) Espionage is legally protected: Subversion is Criminal D) Subversion is done by governments only
A) Risk Reduction B) Risk Transfer C) Risk Self Assumption D) Risk Spreading
A) Spreading the risk by outsourcing critical operations B) A company opting not to ensure a low-value asset but setting aside funds in case of loss C) Hiring a private contractor to manage physical security D) Ignoring risk completely due to lack of budget
A) Vandalism B) Subversion C) Espionage D) Pilferage
A) A legal owner of an asset B) An entity with both intent and capability to harm another C) A security measure in place to protect assets D) An environmental condition causing damage
A) The financial or survival of losing the assets B) The visibility of the asset C) The frequency of threat attempts D) The number of people using the asset
A) Driver Rule B) Ambush attack C) Advance Security D) Mental attitude
A) Moving Attack B) Close in Security C) Ambush attack D) Novice Criminal
A) Moving Attack B) Political Motivated Kidnapper's C) Prophylactic Operations D) Ambush attack
A) Close in Security B) Advance Security C) Ambush attack D) Mental Attitude
A) Ambush attack B) Driver Rule C) Moving Attack D) Modus Operandi
A) Driver Rule B) Political Motivated Kidnapper's C) Novice Criminal D) Mental attitude
A) Novice Criminal B) Mental Attitude C) Advance Security D) Module Operandi
A) Political Motivated Kidnapper's B) Prophylactic Operations C) Novice Criminals D) Modus Operandi
A) Advance Security B) Political Motivated Kidnapper's C) Novice Criminals D) Modus Operandi
A) Moving Attack B) Prophylactic Operations C) Mental attitude D) Advance Security
A) Expressiveness B) Slang usage C) Pleasantness D) Alertness
A) Transmit 3 to 5 words at a time B) Use codes for every sentence C) Wait for confirmation before speaking D) Speak continuously without pause
A) Hunting and gathering B) Creation of laws C) Establishment if civilization D) Transfer of thoughts and ideas
A) Avoid using any code's B) Use of phonetic alphabet and numerals C) Use of long sentences and complete grammar D) Speak as fast as possible
A) People still fail to understand one another B) There are not enough languages C) Communication channels are too expensive D) People are talking too much
A) Long pauses B) Slang and unnatural language C) All codes and acronyms D) High-pitched voices
A) Walkie-talkies B) Messaging security C) Audio hailer D) Telephone
A) Radio check B) Receiving poorly C) Location D) Repeat message
A) Use of Signs B) Symbolic Art C) Written language D) Oral language
A) The tool used to write B) A common language shared by people exchanging ideas C) The tone of a person's voice D) A device for broadcasting messages
A) Assess criminal activity from outside the organization B) Determine employee productivity C) Identify vulnerabilities from natural causes D) Review the state of physical security
A) Designing building architecture B) Analyzing and improving a facility's security practices C) Boosting sales D) Training new recruits
A) Criminal activity within the organization B) External cyber attacks C) Competitor activity D) Supplier delays
A) A list of employee duties B) A financial audit of company assets C) A routine fire drill D) A critical on site examination of a facility's security status
A) Verify the need B) Determine how data will be gathered C) Prepare Schedule D) Develop alternatives
A) It allows skipping certain steps B) It ensures cooperation and resources C) It helps save money D) It guarantees fast results
A) Legal compliance checks only B) Staff scheduling C) Background checks D) Checklists, audits, or inventories of security conditions
A) Security briefing B) Fire inspection C) Emergency drill D) Security survey
A) To evaluate marketing strategies B) To hire new security staff C) To monitor employee performance D) To identify security vulnerabilities and recommend improvements
A) Only inspection is required for long term planning B) Survey is done after inspection C) Inspection complements the survey to maintain security integrity D) They are unrelated processes
A) Loud and clear B) Repeat message C) Location D) Receiving poorly
A) Loud and clear B) Radio check C) Identify yourself/call sign D) Location
A) Copied message B) Radio check C) Loud and clear D) Location
A) Repeat message B) Copied message C) Location D) Identify yourself/call sign
A) Radio check B) Repeat message C) Copied message D) Loud and clear
A) Location B) Loud and clear C) Radio check D) Receiving poorly
A) Proceed and locates the witnesses B) Preliminary investigation C) Proceed to the scene promptly and safely D) Interview the complainant and witnesses
A) Effect the arrest of the offender B) Relay message C) Render obedience and proper conduct D) Render Assistance for the victim, if any
A) Effect the arrest of the offender B) Plaster cast C) Effort and loyalty D) Effectively uses investigation
A) Locates the identifies the witnesses B) Locate and protect C) Locates and capture perpetrator D) Interview the company
A) Indirect Approach B) Interview the complainant and witnesses C) Affect the crime scene D) Interview and locates the offender
A) Maintains the crime scene and protects the evidence B) Morse code C) Methods of investigation D) Maintenance of crime scene and protects the evidence
A) Interrogate the crime scene B) Interrogate everyone C) Interrogate the suspect/offender D) Interrogate the people
A) Note the important things B) Note all happen C) Note all D) Note all conditions, events and remarks
A) Arrange of the following statements B) Arrange of the people C) Arrange D) Arrange for the collection of evidence
A) Reports everyone B) Reports the offender C) Reports the incident fully and accurately D) Report me
A) Yields the conducting regular inspections B) Yields the responsibility to the follow up investigation C) Yields the following individuals D) Yields the following statements |