A) Subversion B) Espionage C) Pilferage D) Sabotage
A) Level of Education B) Number of times they were caught C) Intent and premeditation in theft D) Only steals small, easily hidden items
A) Risk Transfer B) Risk Reduction C) Risk Avoidance D) Risk Self-Assumption
A) Body Frisking B) Allow free access C) Issue of weapons D) Identification and Verification of purpose
A) Subversion is done by governments only B) Espionage targets morale: Subversion targets information C) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption D) Espionage is legally protected: Subversion is Criminal
A) Risk Self Assumption B) Risk Spreading C) Risk Transfer D) Risk Reduction
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Ignoring risk completely due to lack of budget C) Hiring a private contractor to manage physical security D) Spreading the risk by outsourcing critical operations
A) Subversion B) Pilferage C) Vandalism D) Espionage
A) A security measure in place to protect assets B) An environmental condition causing damage C) A legal owner of an asset D) An entity with both intent and capability to harm another
A) The number of people using the asset B) The frequency of threat attempts C) The visibility of the asset D) The financial or survival of losing the assets
A) Ambush attack B) Driver Rule C) Advance Security D) Mental attitude
A) Ambush attack B) Moving Attack C) Close in Security D) Novice Criminal
A) Political Motivated Kidnapper's B) Ambush attack C) Prophylactic Operations D) Moving Attack
A) Mental Attitude B) Ambush attack C) Advance Security D) Close in Security
A) Driver Rule B) Moving Attack C) Modus Operandi D) Ambush attack
A) Mental attitude B) Driver Rule C) Political Motivated Kidnapper's D) Novice Criminal
A) Module Operandi B) Novice Criminal C) Advance Security D) Mental Attitude
A) Modus Operandi B) Prophylactic Operations C) Novice Criminals D) Political Motivated Kidnapper's
A) Novice Criminals B) Political Motivated Kidnapper's C) Modus Operandi D) Advance Security
A) Mental attitude B) Moving Attack C) Prophylactic Operations D) Advance Security
A) Pleasantness B) Alertness C) Slang usage D) Expressiveness
A) Wait for confirmation before speaking B) Speak continuously without pause C) Transmit 3 to 5 words at a time D) Use codes for every sentence
A) Creation of laws B) Establishment if civilization C) Hunting and gathering D) Transfer of thoughts and ideas
A) Use of long sentences and complete grammar B) Use of phonetic alphabet and numerals C) Avoid using any code's D) Speak as fast as possible
A) There are not enough languages B) Communication channels are too expensive C) People still fail to understand one another D) People are talking too much
A) High-pitched voices B) Long pauses C) Slang and unnatural language D) All codes and acronyms
A) Audio hailer B) Walkie-talkies C) Messaging security D) Telephone
A) Radio check B) Receiving poorly C) Location D) Repeat message
A) Written language B) Use of Signs C) Oral language D) Symbolic Art
A) A common language shared by people exchanging ideas B) The tone of a person's voice C) A device for broadcasting messages D) The tool used to write
A) Determine employee productivity B) Assess criminal activity from outside the organization C) Review the state of physical security D) Identify vulnerabilities from natural causes
A) Boosting sales B) Analyzing and improving a facility's security practices C) Training new recruits D) Designing building architecture
A) Competitor activity B) Supplier delays C) Criminal activity within the organization D) External cyber attacks
A) A financial audit of company assets B) A list of employee duties C) A critical on site examination of a facility's security status D) A routine fire drill
A) Develop alternatives B) Determine how data will be gathered C) Verify the need D) Prepare Schedule
A) It helps save money B) It allows skipping certain steps C) It guarantees fast results D) It ensures cooperation and resources
A) Checklists, audits, or inventories of security conditions B) Background checks C) Legal compliance checks only D) Staff scheduling
A) Fire inspection B) Security survey C) Emergency drill D) Security briefing
A) To hire new security staff B) To evaluate marketing strategies C) To identify security vulnerabilities and recommend improvements D) To monitor employee performance
A) Survey is done after inspection B) Only inspection is required for long term planning C) Inspection complements the survey to maintain security integrity D) They are unrelated processes
A) Repeat message B) Loud and clear C) Location D) Receiving poorly
A) Location B) Identify yourself/call sign C) Radio check D) Loud and clear
A) Loud and clear B) Location C) Radio check D) Copied message
A) Location B) Repeat message C) Identify yourself/call sign D) Copied message
A) Repeat message B) Loud and clear C) Copied message D) Radio check
A) Location B) Radio check C) Loud and clear D) Receiving poorly
A) Proceed to the scene promptly and safely B) Interview the complainant and witnesses C) Preliminary investigation D) Proceed and locates the witnesses
A) Render obedience and proper conduct B) Effect the arrest of the offender C) Relay message D) Render Assistance for the victim, if any
A) Effect the arrest of the offender B) Effort and loyalty C) Plaster cast D) Effectively uses investigation
A) Locates and capture perpetrator B) Locates the identifies the witnesses C) Interview the company D) Locate and protect
A) Interview the complainant and witnesses B) Interview and locates the offender C) Indirect Approach D) Affect the crime scene
A) Maintains the crime scene and protects the evidence B) Maintenance of crime scene and protects the evidence C) Morse code D) Methods of investigation
A) Interrogate the crime scene B) Interrogate the people C) Interrogate the suspect/offender D) Interrogate everyone
A) Note all conditions, events and remarks B) Note all happen C) Note all D) Note the important things
A) Arrange of the people B) Arrange for the collection of evidence C) Arrange D) Arrange of the following statements
A) Report me B) Reports the incident fully and accurately C) Reports the offender D) Reports everyone
A) Yields the conducting regular inspections B) Yields the following individuals C) Yields the responsibility to the follow up investigation D) Yields the following statements |