A) Sabotage B) Subversion C) Pilferage D) Espionage
A) Number of times they were caught B) Intent and premeditation in theft C) Only steals small, easily hidden items D) Level of Education
A) Risk Transfer B) Risk Self-Assumption C) Risk Avoidance D) Risk Reduction
A) Issue of weapons B) Body Frisking C) Allow free access D) Identification and Verification of purpose
A) Espionage is legally protected: Subversion is Criminal B) Subversion is done by governments only C) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption D) Espionage targets morale: Subversion targets information
A) Risk Spreading B) Risk Self Assumption C) Risk Transfer D) Risk Reduction
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Ignoring risk completely due to lack of budget C) Spreading the risk by outsourcing critical operations D) Hiring a private contractor to manage physical security
A) Subversion B) Pilferage C) Espionage D) Vandalism
A) An entity with both intent and capability to harm another B) A security measure in place to protect assets C) A legal owner of an asset D) An environmental condition causing damage
A) The frequency of threat attempts B) The number of people using the asset C) The financial or survival of losing the assets D) The visibility of the asset
A) Ambush attack B) Advance Security C) Mental attitude D) Driver Rule
A) Ambush attack B) Moving Attack C) Novice Criminal D) Close in Security
A) Prophylactic Operations B) Moving Attack C) Ambush attack D) Political Motivated Kidnapper's
A) Advance Security B) Mental Attitude C) Close in Security D) Ambush attack
A) Modus Operandi B) Moving Attack C) Driver Rule D) Ambush attack
A) Political Motivated Kidnapper's B) Mental attitude C) Novice Criminal D) Driver Rule
A) Novice Criminal B) Advance Security C) Mental Attitude D) Module Operandi
A) Modus Operandi B) Political Motivated Kidnapper's C) Prophylactic Operations D) Novice Criminals
A) Novice Criminals B) Political Motivated Kidnapper's C) Advance Security D) Modus Operandi
A) Advance Security B) Prophylactic Operations C) Moving Attack D) Mental attitude
A) Expressiveness B) Slang usage C) Alertness D) Pleasantness
A) Speak continuously without pause B) Use codes for every sentence C) Wait for confirmation before speaking D) Transmit 3 to 5 words at a time
A) Creation of laws B) Hunting and gathering C) Transfer of thoughts and ideas D) Establishment if civilization
A) Speak as fast as possible B) Avoid using any code's C) Use of long sentences and complete grammar D) Use of phonetic alphabet and numerals
A) People still fail to understand one another B) Communication channels are too expensive C) There are not enough languages D) People are talking too much
A) High-pitched voices B) Long pauses C) Slang and unnatural language D) All codes and acronyms
A) Audio hailer B) Messaging security C) Walkie-talkies D) Telephone
A) Receiving poorly B) Repeat message C) Location D) Radio check
A) Use of Signs B) Written language C) Oral language D) Symbolic Art
A) The tone of a person's voice B) The tool used to write C) A device for broadcasting messages D) A common language shared by people exchanging ideas
A) Identify vulnerabilities from natural causes B) Determine employee productivity C) Assess criminal activity from outside the organization D) Review the state of physical security
A) Training new recruits B) Analyzing and improving a facility's security practices C) Designing building architecture D) Boosting sales
A) Criminal activity within the organization B) Competitor activity C) External cyber attacks D) Supplier delays
A) A critical on site examination of a facility's security status B) A routine fire drill C) A financial audit of company assets D) A list of employee duties
A) Prepare Schedule B) Determine how data will be gathered C) Verify the need D) Develop alternatives
A) It helps save money B) It allows skipping certain steps C) It ensures cooperation and resources D) It guarantees fast results
A) Legal compliance checks only B) Checklists, audits, or inventories of security conditions C) Staff scheduling D) Background checks
A) Security briefing B) Security survey C) Emergency drill D) Fire inspection
A) To hire new security staff B) To identify security vulnerabilities and recommend improvements C) To monitor employee performance D) To evaluate marketing strategies
A) Inspection complements the survey to maintain security integrity B) They are unrelated processes C) Survey is done after inspection D) Only inspection is required for long term planning |