A) Pilferage B) Subversion C) Espionage D) Sabotage
A) Level of Education B) Number of times they were caught C) Intent and premeditation in theft D) Only steals small, easily hidden items
A) Risk Reduction B) Risk Avoidance C) Risk Self-Assumption D) Risk Transfer
A) Identification and Verification of purpose B) Body Frisking C) Allow free access D) Issue of weapons
A) Espionage targets morale: Subversion targets information B) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption C) Espionage is legally protected: Subversion is Criminal D) Subversion is done by governments only
A) Risk Transfer B) Risk Spreading C) Risk Reduction D) Risk Self Assumption
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Hiring a private contractor to manage physical security C) Spreading the risk by outsourcing critical operations D) Ignoring risk completely due to lack of budget
A) Vandalism B) Pilferage C) Subversion D) Espionage
A) A legal owner of an asset B) An entity with both intent and capability to harm another C) An environmental condition causing damage D) A security measure in place to protect assets
A) The financial or survival of losing the assets B) The number of people using the asset C) The frequency of threat attempts D) The visibility of the asset
A) Advance Security B) Mental attitude C) Driver Rule D) Ambush attack
A) Moving Attack B) Novice Criminal C) Close in Security D) Ambush attack
A) Political Motivated Kidnapper's B) Prophylactic Operations C) Moving Attack D) Ambush attack
A) Close in Security B) Mental Attitude C) Advance Security D) Ambush attack
A) Ambush attack B) Driver Rule C) Moving Attack D) Modus Operandi
A) Driver Rule B) Novice Criminal C) Political Motivated Kidnapper's D) Mental attitude
A) Advance Security B) Novice Criminal C) Mental Attitude D) Module Operandi
A) Prophylactic Operations B) Modus Operandi C) Political Motivated Kidnapper's D) Novice Criminals
A) Advance Security B) Modus Operandi C) Novice Criminals D) Political Motivated Kidnapper's
A) Mental attitude B) Moving Attack C) Prophylactic Operations D) Advance Security
A) Pleasantness B) Slang usage C) Expressiveness D) Alertness
A) Wait for confirmation before speaking B) Speak continuously without pause C) Use codes for every sentence D) Transmit 3 to 5 words at a time
A) Hunting and gathering B) Creation of laws C) Establishment if civilization D) Transfer of thoughts and ideas
A) Avoid using any code's B) Speak as fast as possible C) Use of long sentences and complete grammar D) Use of phonetic alphabet and numerals
A) There are not enough languages B) People are talking too much C) Communication channels are too expensive D) People still fail to understand one another
A) All codes and acronyms B) High-pitched voices C) Slang and unnatural language D) Long pauses
A) Walkie-talkies B) Telephone C) Messaging security D) Audio hailer
A) Radio check B) Repeat message C) Location D) Receiving poorly
A) Use of Signs B) Written language C) Oral language D) Symbolic Art
A) The tone of a person's voice B) A common language shared by people exchanging ideas C) The tool used to write D) A device for broadcasting messages
A) Assess criminal activity from outside the organization B) Determine employee productivity C) Review the state of physical security D) Identify vulnerabilities from natural causes
A) Boosting sales B) Analyzing and improving a facility's security practices C) Training new recruits D) Designing building architecture
A) Competitor activity B) Criminal activity within the organization C) External cyber attacks D) Supplier delays
A) A critical on site examination of a facility's security status B) A list of employee duties C) A routine fire drill D) A financial audit of company assets
A) Verify the need B) Determine how data will be gathered C) Prepare Schedule D) Develop alternatives
A) It allows skipping certain steps B) It guarantees fast results C) It ensures cooperation and resources D) It helps save money
A) Legal compliance checks only B) Checklists, audits, or inventories of security conditions C) Staff scheduling D) Background checks
A) Security survey B) Fire inspection C) Emergency drill D) Security briefing
A) To evaluate marketing strategies B) To monitor employee performance C) To hire new security staff D) To identify security vulnerabilities and recommend improvements
A) Only inspection is required for long term planning B) Inspection complements the survey to maintain security integrity C) Survey is done after inspection D) They are unrelated processes
A) Location B) Receiving poorly C) Loud and clear D) Repeat message
A) Loud and clear B) Radio check C) Identify yourself/call sign D) Location
A) Location B) Radio check C) Loud and clear D) Copied message
A) Location B) Identify yourself/call sign C) Copied message D) Repeat message
A) Copied message B) Loud and clear C) Repeat message D) Radio check
A) Receiving poorly B) Radio check C) Loud and clear D) Location
A) Proceed to the scene promptly and safely B) Interview the complainant and witnesses C) Proceed and locates the witnesses D) Preliminary investigation
A) Relay message B) Effect the arrest of the offender C) Render Assistance for the victim, if any D) Render obedience and proper conduct
A) Plaster cast B) Effectively uses investigation C) Effect the arrest of the offender D) Effort and loyalty
A) Interview the company B) Locates and capture perpetrator C) Locates the identifies the witnesses D) Locate and protect
A) Interview the complainant and witnesses B) Indirect Approach C) Affect the crime scene D) Interview and locates the offender
A) Maintenance of crime scene and protects the evidence B) Maintains the crime scene and protects the evidence C) Morse code D) Methods of investigation
A) Interrogate the suspect/offender B) Interrogate everyone C) Interrogate the crime scene D) Interrogate the people
A) Note all conditions, events and remarks B) Note all happen C) Note the important things D) Note all
A) Arrange B) Arrange of the following statements C) Arrange for the collection of evidence D) Arrange of the people
A) Reports the incident fully and accurately B) Reports everyone C) Report me D) Reports the offender
A) Yields the responsibility to the follow up investigation B) Yields the conducting regular inspections C) Yields the following individuals D) Yields the following statements |