A) Subversion B) Sabotage C) Pilferage D) Espionage
A) Number of times they were caught B) Level of Education C) Only steals small, easily hidden items D) Intent and premeditation in theft
A) Risk Transfer B) Risk Self-Assumption C) Risk Reduction D) Risk Avoidance
A) Body Frisking B) Issue of weapons C) Allow free access D) Identification and Verification of purpose
A) Espionage targets morale: Subversion targets information B) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption C) Subversion is done by governments only D) Espionage is legally protected: Subversion is Criminal
A) Risk Spreading B) Risk Self Assumption C) Risk Transfer D) Risk Reduction
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Spreading the risk by outsourcing critical operations C) Hiring a private contractor to manage physical security D) Ignoring risk completely due to lack of budget
A) Vandalism B) Pilferage C) Subversion D) Espionage
A) A legal owner of an asset B) An entity with both intent and capability to harm another C) A security measure in place to protect assets D) An environmental condition causing damage
A) The financial or survival of losing the assets B) The frequency of threat attempts C) The number of people using the asset D) The visibility of the asset
A) Ambush attack B) Advance Security C) Driver Rule D) Mental attitude
A) Novice Criminal B) Close in Security C) Ambush attack D) Moving Attack
A) Ambush attack B) Moving Attack C) Prophylactic Operations D) Political Motivated Kidnapper's
A) Close in Security B) Ambush attack C) Mental Attitude D) Advance Security
A) Driver Rule B) Ambush attack C) Moving Attack D) Modus Operandi
A) Mental attitude B) Political Motivated Kidnapper's C) Novice Criminal D) Driver Rule
A) Module Operandi B) Novice Criminal C) Advance Security D) Mental Attitude
A) Novice Criminals B) Political Motivated Kidnapper's C) Prophylactic Operations D) Modus Operandi
A) Novice Criminals B) Political Motivated Kidnapper's C) Advance Security D) Modus Operandi
A) Advance Security B) Mental attitude C) Moving Attack D) Prophylactic Operations
A) Alertness B) Slang usage C) Pleasantness D) Expressiveness
A) Speak continuously without pause B) Wait for confirmation before speaking C) Transmit 3 to 5 words at a time D) Use codes for every sentence
A) Establishment if civilization B) Creation of laws C) Hunting and gathering D) Transfer of thoughts and ideas
A) Use of phonetic alphabet and numerals B) Use of long sentences and complete grammar C) Speak as fast as possible D) Avoid using any code's
A) There are not enough languages B) People still fail to understand one another C) Communication channels are too expensive D) People are talking too much
A) Slang and unnatural language B) Long pauses C) High-pitched voices D) All codes and acronyms
A) Audio hailer B) Messaging security C) Walkie-talkies D) Telephone
A) Radio check B) Receiving poorly C) Repeat message D) Location
A) Symbolic Art B) Oral language C) Written language D) Use of Signs
A) A common language shared by people exchanging ideas B) The tool used to write C) A device for broadcasting messages D) The tone of a person's voice
A) Assess criminal activity from outside the organization B) Review the state of physical security C) Identify vulnerabilities from natural causes D) Determine employee productivity
A) Boosting sales B) Designing building architecture C) Analyzing and improving a facility's security practices D) Training new recruits
A) Competitor activity B) External cyber attacks C) Supplier delays D) Criminal activity within the organization
A) A financial audit of company assets B) A critical on site examination of a facility's security status C) A routine fire drill D) A list of employee duties
A) Develop alternatives B) Verify the need C) Prepare Schedule D) Determine how data will be gathered
A) It allows skipping certain steps B) It guarantees fast results C) It ensures cooperation and resources D) It helps save money
A) Checklists, audits, or inventories of security conditions B) Legal compliance checks only C) Background checks D) Staff scheduling
A) Security briefing B) Emergency drill C) Fire inspection D) Security survey
A) To monitor employee performance B) To hire new security staff C) To evaluate marketing strategies D) To identify security vulnerabilities and recommend improvements
A) Only inspection is required for long term planning B) Survey is done after inspection C) Inspection complements the survey to maintain security integrity D) They are unrelated processes
A) Repeat message B) Location C) Receiving poorly D) Loud and clear
A) Location B) Identify yourself/call sign C) Radio check D) Loud and clear
A) Location B) Copied message C) Loud and clear D) Radio check
A) Location B) Identify yourself/call sign C) Repeat message D) Copied message
A) Repeat message B) Copied message C) Loud and clear D) Radio check
A) Location B) Radio check C) Receiving poorly D) Loud and clear
A) Preliminary investigation B) Interview the complainant and witnesses C) Proceed and locates the witnesses D) Proceed to the scene promptly and safely
A) Render obedience and proper conduct B) Relay message C) Effect the arrest of the offender D) Render Assistance for the victim, if any
A) Effort and loyalty B) Effectively uses investigation C) Effect the arrest of the offender D) Plaster cast
A) Locates the identifies the witnesses B) Interview the company C) Locates and capture perpetrator D) Locate and protect
A) Interview the complainant and witnesses B) Interview and locates the offender C) Indirect Approach D) Affect the crime scene
A) Morse code B) Maintains the crime scene and protects the evidence C) Maintenance of crime scene and protects the evidence D) Methods of investigation
A) Interrogate the suspect/offender B) Interrogate everyone C) Interrogate the crime scene D) Interrogate the people
A) Note all conditions, events and remarks B) Note all happen C) Note the important things D) Note all
A) Arrange for the collection of evidence B) Arrange C) Arrange of the people D) Arrange of the following statements
A) Reports the offender B) Report me C) Reports everyone D) Reports the incident fully and accurately
A) Yields the conducting regular inspections B) Yields the responsibility to the follow up investigation C) Yields the following statements D) Yields the following individuals |