A) Subversion B) Sabotage C) Espionage D) Pilferage
A) Level of Education B) Number of times they were caught C) Intent and premeditation in theft D) Only steals small, easily hidden items
A) Risk Reduction B) Risk Transfer C) Risk Avoidance D) Risk Self-Assumption
A) Identification and Verification of purpose B) Issue of weapons C) Allow free access D) Body Frisking
A) Subversion is done by governments only B) Espionage is legally protected: Subversion is Criminal C) Espionage targets morale: Subversion targets information D) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption
A) Risk Transfer B) Risk Reduction C) Risk Spreading D) Risk Self Assumption
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Hiring a private contractor to manage physical security C) Ignoring risk completely due to lack of budget D) Spreading the risk by outsourcing critical operations
A) Espionage B) Vandalism C) Subversion D) Pilferage
A) A security measure in place to protect assets B) A legal owner of an asset C) An entity with both intent and capability to harm another D) An environmental condition causing damage
A) The frequency of threat attempts B) The visibility of the asset C) The financial or survival of losing the assets D) The number of people using the asset
A) Advance Security B) Ambush attack C) Mental attitude D) Driver Rule
A) Moving Attack B) Close in Security C) Ambush attack D) Novice Criminal
A) Prophylactic Operations B) Moving Attack C) Political Motivated Kidnapper's D) Ambush attack
A) Mental Attitude B) Ambush attack C) Close in Security D) Advance Security
A) Modus Operandi B) Moving Attack C) Ambush attack D) Driver Rule
A) Novice Criminal B) Driver Rule C) Mental attitude D) Political Motivated Kidnapper's
A) Module Operandi B) Novice Criminal C) Mental Attitude D) Advance Security
A) Novice Criminals B) Modus Operandi C) Political Motivated Kidnapper's D) Prophylactic Operations
A) Modus Operandi B) Novice Criminals C) Advance Security D) Political Motivated Kidnapper's
A) Advance Security B) Mental attitude C) Prophylactic Operations D) Moving Attack
A) Slang usage B) Expressiveness C) Pleasantness D) Alertness
A) Transmit 3 to 5 words at a time B) Speak continuously without pause C) Use codes for every sentence D) Wait for confirmation before speaking
A) Creation of laws B) Transfer of thoughts and ideas C) Establishment if civilization D) Hunting and gathering
A) Speak as fast as possible B) Use of phonetic alphabet and numerals C) Avoid using any code's D) Use of long sentences and complete grammar
A) People still fail to understand one another B) There are not enough languages C) People are talking too much D) Communication channels are too expensive
A) High-pitched voices B) Slang and unnatural language C) Long pauses D) All codes and acronyms
A) Audio hailer B) Messaging security C) Telephone D) Walkie-talkies
A) Radio check B) Receiving poorly C) Location D) Repeat message
A) Symbolic Art B) Use of Signs C) Oral language D) Written language
A) A device for broadcasting messages B) The tone of a person's voice C) The tool used to write D) A common language shared by people exchanging ideas
A) Identify vulnerabilities from natural causes B) Determine employee productivity C) Assess criminal activity from outside the organization D) Review the state of physical security
A) Training new recruits B) Designing building architecture C) Analyzing and improving a facility's security practices D) Boosting sales
A) Competitor activity B) Supplier delays C) Criminal activity within the organization D) External cyber attacks
A) A critical on site examination of a facility's security status B) A list of employee duties C) A routine fire drill D) A financial audit of company assets
A) Prepare Schedule B) Develop alternatives C) Verify the need D) Determine how data will be gathered
A) It helps save money B) It guarantees fast results C) It ensures cooperation and resources D) It allows skipping certain steps
A) Checklists, audits, or inventories of security conditions B) Background checks C) Staff scheduling D) Legal compliance checks only
A) Security briefing B) Fire inspection C) Emergency drill D) Security survey
A) To monitor employee performance B) To hire new security staff C) To evaluate marketing strategies D) To identify security vulnerabilities and recommend improvements
A) They are unrelated processes B) Survey is done after inspection C) Inspection complements the survey to maintain security integrity D) Only inspection is required for long term planning |