A) Number of guards available this month B) Contractor reputation, licensing compliance, and personnel training records C) Speed of contract signing D) Lowest bid from contractors
A) Conduct an audit of all personnel files and implement corrective registration and training actions B) Blame outsourced HR C) Ignore it if no incident occurred D) Fire the negligent staff immediately
A) Percentage of personnel with up-to-date certifications, completed training hours, and records of disciplinary actions B) Average daily patrols logged C) Number of arrests made D) Client satisfaction surveys only
A) Keep SOPs informal to allow flexibility B) Use risk assessment results, stakeholder input, and mandatory provisions of RA 11917 to create measurable SOPs and training plans C) Make SOPs only for supervisors D) Copy SOPs from a competitor
A) Delay both until next fiscal year B) Invest in prioritized training for key skills and minimum equipment upgrades ensuring competence and compliance C) Hire more administrative staff D) Upgrade CCTV only
A) Implement but keep it undocumented B) Ignore the request C) Comply to keep the client D) Refuse, explain legal/professional limits, propose compliant alternatives, and document the interaction
A) Wait for enforcement visits B) Immediately integrate rules into SOPs, train staff, and create monitoring KPIs with audit schedules C) Announce them once to staff D) Only update senior management
A) Analyze root causes, update training, adjust schedules, and implement supervisory spot-checks to prevent recurrence B) Ignore since violations are minor C) Terminate the night shift supervisor instantly D) Transfer the guards to day shift
A) Hide gaps from inspectors B) Assume auditors won’t notice C) Do nothing until an inspection occurs D) Prioritize corrective documentation practices, assign owners, and run weekly compliance reviews until stable
A) Terminate immediately without investigation B) Defend the officer publicly without investigation C) Suspend pending a fair investigation, document findings, coordinate with the licensing authority if required, and follow due process D) Ignore the complaint
A) Fire personnel and keep it secret B) Blame the client C) Conduct transparent internal review, communicate corrective measures to stakeholders, and update training/policies D) Deny involvement and stay silent
A) Develop data protection procedures, obtain consent, limit access rights, and train personnel on privacy obligations B) Share biometrics openly with clients C) Install without policies D) Use biometrics only for some staff inconsistently
A) It’s standard practice everywhere B) It reduces costs C) It increases arrests D) It may incentivize improper conduct; instead, design balanced KPIs that reward lawful, professional behavior and client service
A) Hire local guards immediately B) Announce expansion on social media C) Copy existing contracts without change D) Legal/regulatory compliance check, local licensing requirements, market risk assessment, and staffing plan aligned with professional standards
A) Redesign shift rosters, hire additional staff, provide welfare and training, and monitor service quality metrics B) Cut rest breaks to increase coverage C) Require overtime indefinitely D) Ignore morale, focus on outputs
A) Ask trainers if they liked it B) Count attendance only C) Pre/post competency testing, practical assessments, field audits, and follow-up performance metrics tied to SOPs D) Use a single multiple-choice test
A) Hide the incident forever B) Cooperate without question C) Refuse, explain legal obligations, report as required, and propose reputational management strategies that are lawful D) Partially redact and send a false summary
A) Only disciplining frontline staff B) Public acknowledgement of breach, corrective plan, assigned responsibilities, and transparent progress reports to stakeholders and regulators C) Firing CEO immediately without investigation D) Ignoring the breach
A) Willingness to work for low pay B) Age alone C) Physical strength only D) Valid licensing/certification, background check clearance, competency in required skills, and evidence of integrity
A) Perform a risk assessment, quantify impact on safety/service, propose an optimized deployment that balances cost and risk mitigation B) Ignore the commander C) Reduce patrols to save money D) Replace patrols with fewer cameras only
A) Waiting for audit feedback B) Only updating documents on the audit day C) Conducting internal compliance audit using the law’s checklist, fix issues, and prepare evidence of corrective actions D) Hiding records likely to be queried
A) Promote relatives of managers B) Create a competency-based career ladder with mandatory training milestones, certifications, and mentorships tied to promotions C) No career path, only daily tasks D) Promote only by seniority
A) Immediately investigate, validate qualifications, discipline per policy, notify licensing board if needed, and remediate training gaps B) Ignore to keep numbers clean C) Terminate entire staff at once D) Replace documentation without action
A) Only evacuation routes B) A vague description of roles C) Only a list of emergency contacts without procedures D) Clear roles/responsibilities, communication protocols, legal compliance steps, and training/testing schedules
A) Vendor qualification, standard operating procedures, data protection clauses, and periodic verification audits B) Full delegation without oversight C) No contract needed D) Only verbal assurances from vendor
A) Punishments only for low-ranking personnel B) No discipline to avoid conflict C) Clear, consistent disciplinary procedures with due process and appeals, proportionate sanctions, and rehabilitation options D) Arbitrary punishments to deter misconduct
A) Number of client complaints ignored B) Total number of guards hired this year C) Number of social media posts about compliance D) Percentage of staff current with licensing, passing rates on competency tests, and reduction in incident recurrence
A) Choose randomly B) Use in-house unstructured training only C) Accredited vendor to ensure compliance and quality of professional competency D) Cheaper vendor to save funds
A) Never share any data B) Share raw staff notes C) Only verbal summaries without records D) Standardized incident reports with factual details, timelines, and corrective actions while protecting privacy and legal rights
A) Ignore licensing and assume no consequences B) Deploy selectively without oversight C) Deploy immediately to gain advantage D) Halt deployment until legal compliance review, risk assessment, and policy updates are completed
A) Escort the customer off premises immediately without documentation B) Apply verbal de-escalation, preserve evidence, capture witness statements, and file an objective incident report for investigative follow-up C) Use force to end argument D) Call supervisor only after incident
A) Analyze training records, situational transcripts, supervisor oversight, and cultural-competency gaps to redesign training modules B) Mark complaint as resolved without investigation C) Blame the complainant D) Fire the guard immediately without assessment
A) Only practice radio communication B) Simulate a complex theft, require teams to collect evidence lawfully, interview witnesses, chain evidence, analyze motive, and prepare prosecutable documentation C) Watch a video about investigations D) Memorize the steps of filing a report
A) Secure the area, discreetly observe, collect non-intrusive intelligence, escalate to authorized investigators, and preserve chain of custody for any evidence B) Ignore unless theft occurs C) Publicly accuse individuals D) Confront aggressively and interrogate
A) Replace missing item immediately B) Cross-check access logs, interview guards and staff, analyze patterns, seek physical evidence, and map possible timelines to reconstruct events C) Blame CCTV system D) Accept client’s claim without verification
A) True/false quiz B) Multiple-choice Only C) Timed obstacle course D) A practical exercise presenting ambiguous threat levels where trainee articulates proportional response, legal justification, and post-incident reporting steps
A) Grant all VIP requests regardless of policy B) Refuse all VIP requests automatically C) Evaluate request, seek management approval, document exceptions, and ensure legal and safety approvals are met before altering protocols D) Handle privately without documentation
A) Initiate discreet intelligence collection, limit disclosure to need-to-know, correlate access histories, and coordinate with HR and legal before a covert operation or disciplinary action B) Send a company-wide email accusing staff C) Accuse the suspected employee publicly D) Ignore the possibility
A) Lock doors and continue operations B) Evacuate without informing customers of exits C) Evacuate only employees and leave customers D) Provide clear, calm instructions, designate staff to assist vulnerable customers, communicate updates, and ensure post-evacuation accountability and client communications
A) Discard all statements as unreliable B) Choose the statement that fits a manager’s preconception C) Cross-validate statements with physical evidence, timelines, and CCTV; assess witness credibility and corroborate with independent sources D) Ignore contradictions and accept the first statement
A) Watching sample report videos B) Copying a template report C) Reading sample reports D) Trainees must draft a full investigative report from a simulated incident, including chain-of-custody forms, legal considerations, and executive summary for stakeholders
A) Evaluate probable cause, safety, legal authority, risk to the public, and document justification for detention consistent with law and organizational policy B) Never detain to avoid trouble C) Always detain suspects regardless of evidence D) Detain only if manager is present
A) Share raw intelligence files externally B) Withhold all incident information C) Implement a confidential incident feedback loop, transparent service-level reporting, and regular stakeholder briefings while protecting sensitive intelligence D) Market and publicize internal investigations widely
A) Immediately secure scene, interview witnesses, note pursuit details (times, directions), coordinate with police, and ensure bodycam/CCTV capture preserved B) Continue searching without reporting C) Ignore documenting the chase D) Post chase details on social media
A) Response time, resolution effectiveness, lawful conduct incidents, follow-up documentation quality, and client satisfaction surveys analyzed for training gaps B) Number of calls to security center C) Number of guard selfies with clients D) Number of compliments only
A) Integrate physical forensics, digital forensics, personnel access records, vendor contract review, and external threat intelligence to determine motive and actors B) Blame external competitors without proof C) Focus only on physical security D) Fire a random employee to deter sabotage
A) Immediately terminate the trainee B) Facilitate scenario-based bias-awareness training, role-play customer-relations simulations, and evaluate behavior changes through supervision and feedback C) Give a written warning only D) Ignore since performance is otherwise good
A) Use raw messages with no analysis B) Executive summary, threat assessment with evidence, impact analysis, recommended mitigations, and prioritized action plan with resource estimates C) Bullet list of rumors D) Long narrative without conclusions
A) Isolate device (airplane mode), document chain-of-custody, avoid powering on/off unnecessarily, and coordinate with digital forensics specialists for imaging B) Post images from the phone on social media C) Let anyone access phone to look for info D) Hand phone to client for safekeeping
A) Ignore clients to avoid panic B) Provide transparent incident report, outline corrective actions, offer remediation where appropriate, and solicit client feedback for continuous improvement C) Blame clients for causing incident D) Provide a generic press release only
A) Confront vendor employees immediately B) Review vendor access logs, reconcile deliveries, interview staff, and recommend vendor audits and strengthened access controls C) Ignore since thefts are petty D) Remove vendor without cause
A) Quiz on definitions B) Observing attendance only C) Practical casework assessment requiring chain-of-custody, witness interview, analytical timeline, and prosecutable report reviewed by external expert D) Asking trainees if they feel confident
A) Destroy the keycard to prevent misuse B) Assess card ownership via access logs, interview the person, secure evidence, and detain only if probable cause exists and legal authority is clear C) Immediately arrest the person without cause D) Ignore the keycard since it’s not a weapon
A) Replace training with memos B) Prioritize scenario-based, high-impact modules (e.g., evidence handling, interview skills), cross-train supervisors, and use blended learning to save costs C) Outsource all training abroad D) Cancel all investigative training
A) Ignore due to seniority B) Discreetly document the breach, report via appropriate channels, and follow up with a compliance investigation regardless of rank C) Confront publicly and humiliate the staff member D) Copy the senior staff’s behavior
A) Comparative incident trend analysis with heat maps, root-cause insights, and prioritized remediation recommendations across sites B) A single site’s incident report only C) One-line email saying “everything’s fine” D) Raw incident logs with no analysis
A) Developing a controlled, multi-step response integrating de-escalation, team coordination, evidence preservation, and post-incident documentation plan B) Hiding from the drill C) Leaving the area immediately D) Shouting to scare suspect away
A) Use structured interview protocols, record sessions (where legal), document non-leading questioning, and protect witness confidentiality to maintain credibility B) Allow informal interviews with no record C) Encourage leading questions to speed up results D) Offer witnesses money to change statements
A) Only pursue tasks that are easy B) Prioritize by risk (likelihood × impact), feasibility, legal constraints, and potential to prevent harm, then assign resources accordingly C) Act on the first tip received D) Randomly choose tasks
A) Produce objective, chronological facts, corroborate with evidence, avoid opinion, and include evidence logs and witness details for legal scrutiny B) Omit inconvenient facts C) Include hearsay as fact D) Write emotional descriptions to sway court
A) Conduct a site survey mapping vulnerabilities, crime patterns, access points, lighting, CCTV blind spots, and then match controls to quantified risk priorities B) Replace lock hardware only C) Hand the problem to the client D) Immediately hire more guards
A) Choose the cheaper option B) Flip a coin C) Perform cost-benefit analysis, consider residual risk, deterrence effects, and long-term total cost of ownership before selecting a layered solution D) Pick both regardless of budget
A) Ignore the oversight B) Wait for an incident to act C) Fire all unvetted personnel immediately D) Implement urgent background checks for critical roles, temporary restrictions on sensitive access, and a schedule to complete checks for all relevant staff
A) Store all records outside the facility only B) Ban all internal copying C) Introduce classification levels, need-to-know access, logging of sensitive document handling, and secure disposal procedures balanced with business needs D) Allow anyone access if they request it
A) Payroll processing B) The coffee vending machine C) Marketing campaign systems D) Evacuation communications, emergency medical response coordination, and secured access to critical safety systems
A) Testimonials without data B) Pilot implementation with metrics: incident rates pre/post, penetration test results, and quantitative risk reduction modeling C) Photo of new equipment only D) Verbal assurance only
A) Build the thickest, most aggressive fence possible regardless of impact B) Recommend a layered approach: discreet intrusion detection, natural surveillance improvements (lighting/landscaping), and targeted fencing where risk justifies it C) Ignore both risk and appearance D) Opt for an ornamental fence for appearance only
A) Implement access controls, encryption, audit logging, role-based permissions, and a documented retention/destruction policy before digitization B) Only password-protect with a generic password C) Save on local desktops only D) Post files on a public drive for convenience
A) Close operations until supplier returns B) Activate contingency suppliers, prioritize critical processes for recovery, implement manual fallback procedures, and communicate with stakeholders per the BCP C) Hope the supplier resumes quickly D) Blame the supplier publicly
A) Increase gate height alone B) Allow tailgating during busy hours C) Combine physical barriers, access credential upgrades, anti-tailgate technology, staff training, and monitoring with enforcement policies and sanctions D) Replace guards with a single camera only
A) Delete the breached files to hide the issue B) Ignore if not publicized C) Fire a random staff member D) Map the leak pathway (who had access), review controls, interview staff, assess extent of compromise, and implement technical/administrative remediations and monitoring
A) Ignore such threats entirely B) Spend maximum budget to eliminate them entirely C) Accept where cost of mitigation exceeds impact, but monitor and periodically reassess; implement low-cost controls where feasible D) Wait until something happens before deciding
A) Implement least-privilege access, session monitoring, privileged access management, and documented emergency override procedures with audit trails B) Give administrators full access with no oversight C) Use a single master password for ease D) Remove all admin privileges from everyone permanently
A) Conduct a targeted risk assessment, integrate controls into process design, update BCP and recovery priorities, and train staff before commissioning B) Rely on insurance to cover problems C) Outsource risk to contractors D) Start production immediately and adapt later
A) Cover only entrances and ignore interior zones B) Place cameras randomly to cover all walls C) Place them only where cosmetically appropriate D) Use threat scenarios, sightlines, lighting conditions, image retention needs, privacy impacts, and integration with response procedures to optimize placement
A) Delete the document and hope for the best B) Contain exposure, assess scope, notify affected parties per policy, apply legal/PR strategies, and strengthen access controls to prevent recurrence C) Ignore unless someone complains D) Blame the IT department without analysis
A) Allow open access to foster collaboration B) Lock doors only C) Only increase signage about confidentiality D) Access control, visitor vetting, CCTV, data segmentation, endpoint protection, and strict document handling policies with staff vetting and monitoring
A) Conduct root-cause analysis, test redundancy, evaluate manual workarounds, update recovery time objectives (RTOs), and schedule corrective maintenance and alternate backup sources B) Replace the generator with the same model without analysis C) Dismiss the failure as a fluke D) Cancel future drills to avoid failures
A) Treat all events equally B) Only buy the most expensive mitigation available C) Only plan for everyday minor events D) Use risk-based prioritization focusing on high-impact events first, adopt proportional controls, and incorporate scalable contingency options
A) Hire quickly without vetting to fill vacancies B) Require multi-source reference checks, financial background screenings, integrity testing, and role-specific monitoring with separation of duties C) Hire friends of management only D) Only check identity documents
A) Rely on on-premises tapes only without testing B) No change is needed; cloud providers are always reliable C) Cancel backups altogether D) Single-point-of-failure in vendor dependency; recommend multi-region/backups, contractual SLAs, and test restores to ensure recovery capability
A) Keep the corridor unlocked for convenience B) Use bolt locks that require keys and prevent escape C) Use alarmed, access-controlled doors that comply with egress codes (fail-safe mechanisms), combined with monitoring and clear signage to preserve life-safety while securing areas D) Block the corridor to prevent unauthorized access
A) Implement enterprise-wide classification policy, training, and enforcement with tools for labeling and automated controls tied to BCP priorities B) Let each department do as they wish C) Delete old classifications D) Outsource classification to an external vendor with no integration
A) Discard all low-priority risks entirely B) Treat low-priority items first C) Spend budget evenly across all items D) Group similar risks, assess aggregated impact, reprioritize by combined likelihood and impact, and address clusters with single controls where effective
A) Close the entrance permanently B) Add access control, monitoring, staff awareness, and integrate the utility entrance into patrol and CCTV coverage with procedural checks C) Remove all utility entrances and relocate utilities D) Ignore since utilities are low profile
A) Do nothing and hope supplier remains stable B) Develop alternate suppliers, maintain safety stock for critical items, and create contractual contingencies and rapid switch-over procedures C) Rely on the supplier’s assurances only D) Move all production to the unstable region
A) Says it looks more professional B) Offer anecdotal stories only C) Present quantified risk reduction, ROI estimate, incident-avoidance costs vs. implementation cost, and regulatory/compliance benefits for decision-making D) Claim it is mandatory without evidence
A) Outsource testing and ignore results B) Only read the BCP document annually C) Regular drills of full-scale recovery, desktop scenario testing, supplier continuity tests, and evidence-based post-exercise improvements with timelines D) A tabletop exercise only every five years
A) Use the corporate network for guests B) Remove Wi-Fi entirely C) Implement segmented guest networks isolated from corporate resources, enforce bandwidth/security policies, and present clear acceptable-use terms D) Display passwords publicly in the lobby
A) Assume systems will be back in time by luck B) Only purchase extra servers without testing C) Reduce employee hours to save costs and hope for the best D) Map critical processes, identify dependencies, establish recovery strategies (hot/warm sites), test restores, and align resource allocations to meet the RTO
A) Reconfigure sightlines with low landscaping, optimize lighting, create natural surveillance, control access, and combine signage and territorial reinforcement to reduce crime opportunities B) Add more security guards only C) Add metal detectors only D) Install only high fences with barbed wire
A) CPTED is obsolete B) Mechanistic security always wins C) A hybrid approach that uses CPTED for long-term social prevention and targeted mechanical systems for high-risk nodes yields better resilience and community acceptance D) Use only police patrols and nothing else
A) Introduce transparency (glass), natural surveillance points, mirrored sightlines, and controlled access while maintaining aesthetic coherence B) Close the corridors permanently C) Add murals to decorate blind spots only D) Keep blind corridors and increase patrols only
A) Close the space at night permanently B) Design inclusive public spaces with active uses (cafés, vendor stalls), adequate lighting, seating that discourages long-term loitering in sensitive areas, and community policing initiatives C) Remove seating entirely to prevent anyone from staying D) Enforce blanket anti-loitering laws harshly
A) Hide guards in basements only B) Add visible armed sentries on every corner of the roof C) Use architectural features (bollards disguised as planters, setback landscaping, and reinforced glazing) that provide protection without visible fortress aesthetics D) Cover the façade with solid metal plates
A) Install random spikes that damage tires to stop parking B) Ban parking entirely C) Reorganize parking into well-lit, surveilled zones, increase natural surveillance through foot traffic patterns, add controlled access points, and run community awareness campaigns D) Only hand out pamphlets about theft prevention
A) Randomly place shops with no planning B) One concentrated atrium for maximum density C) Distributed nodes with clear sightlines, controlled access points, and secure back-of-house circulation to reduce single-point-target risk and support emergency egress D) Hide all shops behind secured doors only accessible by staff
A) Engaged communities increase social cohesion, informal guardianship, and long-term deterrence, reducing reliance on costly mechanical controls and improving legitimacy of security measures B) Community engagement slows down planning C) Community input always increases crime D) Only technology can prevent crime, community engagement is irrelevant
A) Replace the heritage site with a modern fortress B) Ignore security to preserve authenticity C) Use reversible, non-invasive security installations (discreet cameras, mobile access solutions, sympathetic barriers) and collaborate with conservationists to maintain historical integrity while improving protection D) Build a separate modern structure next to the heritage site and move everything there
A) Use temporary measures only during festivals B) Close the promenade to the public permanently C) Use graduated measures (landscaped barriers, retractable bollards, widened sidewalks, setback café zones) combined with pedestrian experience analysis and emergency access planning to balance protection and livability D) Install visible concrete blocks everywhere |