A) Subversion B) Sabotage C) Pilferage D) Espionage
A) Intent and premeditation in theft B) Level of Education C) Only steals small, easily hidden items D) Number of times they were caught
A) Risk Avoidance B) Risk Transfer C) Risk Reduction D) Risk Self-Assumption
A) Identification and Verification of purpose B) Allow free access C) Body Frisking D) Issue of weapons
A) Espionage targets morale: Subversion targets information B) Espionage is legally protected: Subversion is Criminal C) Subversion is done by governments only D) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption
A) Risk Self Assumption B) Risk Reduction C) Risk Spreading D) Risk Transfer
A) Spreading the risk by outsourcing critical operations B) Hiring a private contractor to manage physical security C) Ignoring risk completely due to lack of budget D) A company opting not to ensure a low-value asset but setting aside funds in case of loss
A) Espionage B) Vandalism C) Subversion D) Pilferage
A) A legal owner of an asset B) A security measure in place to protect assets C) An environmental condition causing damage D) An entity with both intent and capability to harm another
A) The frequency of threat attempts B) The financial or survival of losing the assets C) The number of people using the asset D) The visibility of the asset
A) Mental attitude B) Advance Security C) Driver Rule D) Ambush attack
A) Moving Attack B) Close in Security C) Ambush attack D) Novice Criminal
A) Ambush attack B) Moving Attack C) Political Motivated Kidnapper's D) Prophylactic Operations
A) Ambush attack B) Close in Security C) Advance Security D) Mental Attitude
A) Ambush attack B) Modus Operandi C) Driver Rule D) Moving Attack
A) Driver Rule B) Novice Criminal C) Political Motivated Kidnapper's D) Mental attitude
A) Advance Security B) Module Operandi C) Novice Criminal D) Mental Attitude
A) Political Motivated Kidnapper's B) Prophylactic Operations C) Novice Criminals D) Modus Operandi
A) Modus Operandi B) Novice Criminals C) Advance Security D) Political Motivated Kidnapper's
A) Prophylactic Operations B) Advance Security C) Mental attitude D) Moving Attack
A) Alertness B) Slang usage C) Pleasantness D) Expressiveness
A) Transmit 3 to 5 words at a time B) Wait for confirmation before speaking C) Use codes for every sentence D) Speak continuously without pause
A) Hunting and gathering B) Creation of laws C) Establishment if civilization D) Transfer of thoughts and ideas
A) Use of long sentences and complete grammar B) Use of phonetic alphabet and numerals C) Avoid using any code's D) Speak as fast as possible
A) People are talking too much B) Communication channels are too expensive C) There are not enough languages D) People still fail to understand one another
A) Slang and unnatural language B) All codes and acronyms C) Long pauses D) High-pitched voices
A) Walkie-talkies B) Telephone C) Messaging security D) Audio hailer
A) Location B) Radio check C) Repeat message D) Receiving poorly
A) Written language B) Oral language C) Use of Signs D) Symbolic Art
A) A common language shared by people exchanging ideas B) A device for broadcasting messages C) The tool used to write D) The tone of a person's voice
A) Assess criminal activity from outside the organization B) Identify vulnerabilities from natural causes C) Review the state of physical security D) Determine employee productivity
A) Designing building architecture B) Training new recruits C) Analyzing and improving a facility's security practices D) Boosting sales
A) External cyber attacks B) Competitor activity C) Criminal activity within the organization D) Supplier delays
A) A financial audit of company assets B) A list of employee duties C) A routine fire drill D) A critical on site examination of a facility's security status
A) Prepare Schedule B) Develop alternatives C) Determine how data will be gathered D) Verify the need
A) It helps save money B) It allows skipping certain steps C) It ensures cooperation and resources D) It guarantees fast results
A) Background checks B) Checklists, audits, or inventories of security conditions C) Staff scheduling D) Legal compliance checks only
A) Security briefing B) Emergency drill C) Fire inspection D) Security survey
A) To evaluate marketing strategies B) To identify security vulnerabilities and recommend improvements C) To hire new security staff D) To monitor employee performance
A) Survey is done after inspection B) They are unrelated processes C) Inspection complements the survey to maintain security integrity D) Only inspection is required for long term planning |