A) Sabotage B) Pilferage C) Subversion D) Espionage
A) Intent and premeditation in theft B) Level of Education C) Number of times they were caught D) Only steals small, easily hidden items
A) Risk Transfer B) Risk Avoidance C) Risk Self-Assumption D) Risk Reduction
A) Issue of weapons B) Allow free access C) Body Frisking D) Identification and Verification of purpose
A) Espionage is legally protected: Subversion is Criminal B) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption C) Subversion is done by governments only D) Espionage targets morale: Subversion targets information
A) Risk Reduction B) Risk Self Assumption C) Risk Spreading D) Risk Transfer
A) Hiring a private contractor to manage physical security B) Ignoring risk completely due to lack of budget C) A company opting not to ensure a low-value asset but setting aside funds in case of loss D) Spreading the risk by outsourcing critical operations
A) Espionage B) Vandalism C) Pilferage D) Subversion
A) An environmental condition causing damage B) A security measure in place to protect assets C) An entity with both intent and capability to harm another D) A legal owner of an asset
A) The number of people using the asset B) The frequency of threat attempts C) The financial or survival of losing the assets D) The visibility of the asset
A) Mental attitude B) Driver Rule C) Ambush attack D) Advance Security
A) Moving Attack B) Close in Security C) Novice Criminal D) Ambush attack
A) Ambush attack B) Moving Attack C) Political Motivated Kidnapper's D) Prophylactic Operations
A) Mental Attitude B) Ambush attack C) Advance Security D) Close in Security
A) Modus Operandi B) Ambush attack C) Driver Rule D) Moving Attack
A) Political Motivated Kidnapper's B) Mental attitude C) Driver Rule D) Novice Criminal
A) Module Operandi B) Mental Attitude C) Novice Criminal D) Advance Security
A) Modus Operandi B) Prophylactic Operations C) Political Motivated Kidnapper's D) Novice Criminals
A) Modus Operandi B) Advance Security C) Novice Criminals D) Political Motivated Kidnapper's
A) Mental attitude B) Moving Attack C) Advance Security D) Prophylactic Operations
A) Slang usage B) Expressiveness C) Alertness D) Pleasantness
A) Transmit 3 to 5 words at a time B) Use codes for every sentence C) Speak continuously without pause D) Wait for confirmation before speaking
A) Creation of laws B) Transfer of thoughts and ideas C) Hunting and gathering D) Establishment if civilization
A) Use of phonetic alphabet and numerals B) Use of long sentences and complete grammar C) Speak as fast as possible D) Avoid using any code's
A) There are not enough languages B) People still fail to understand one another C) Communication channels are too expensive D) People are talking too much
A) All codes and acronyms B) High-pitched voices C) Slang and unnatural language D) Long pauses
A) Walkie-talkies B) Messaging security C) Telephone D) Audio hailer
A) Location B) Repeat message C) Radio check D) Receiving poorly
A) Use of Signs B) Written language C) Symbolic Art D) Oral language
A) A common language shared by people exchanging ideas B) A device for broadcasting messages C) The tool used to write D) The tone of a person's voice
A) Review the state of physical security B) Assess criminal activity from outside the organization C) Determine employee productivity D) Identify vulnerabilities from natural causes
A) Training new recruits B) Boosting sales C) Designing building architecture D) Analyzing and improving a facility's security practices
A) Supplier delays B) Criminal activity within the organization C) Competitor activity D) External cyber attacks
A) A routine fire drill B) A list of employee duties C) A critical on site examination of a facility's security status D) A financial audit of company assets
A) Develop alternatives B) Prepare Schedule C) Determine how data will be gathered D) Verify the need
A) It allows skipping certain steps B) It ensures cooperation and resources C) It guarantees fast results D) It helps save money
A) Legal compliance checks only B) Checklists, audits, or inventories of security conditions C) Staff scheduling D) Background checks
A) Security briefing B) Emergency drill C) Fire inspection D) Security survey
A) To evaluate marketing strategies B) To identify security vulnerabilities and recommend improvements C) To hire new security staff D) To monitor employee performance
A) Survey is done after inspection B) Only inspection is required for long term planning C) Inspection complements the survey to maintain security integrity D) They are unrelated processes
A) Repeat message B) Receiving poorly C) Loud and clear D) Location
A) Loud and clear B) Identify yourself/call sign C) Radio check D) Location
A) Loud and clear B) Location C) Radio check D) Copied message
A) Identify yourself/call sign B) Copied message C) Location D) Repeat message
A) Repeat message B) Loud and clear C) Radio check D) Copied message
A) Radio check B) Receiving poorly C) Location D) Loud and clear
A) Proceed and locates the witnesses B) Interview the complainant and witnesses C) Preliminary investigation D) Proceed to the scene promptly and safely
A) Render Assistance for the victim, if any B) Render obedience and proper conduct C) Relay message D) Effect the arrest of the offender
A) Plaster cast B) Effectively uses investigation C) Effort and loyalty D) Effect the arrest of the offender
A) Locates and capture perpetrator B) Locates the identifies the witnesses C) Interview the company D) Locate and protect
A) Interview the complainant and witnesses B) Indirect Approach C) Affect the crime scene D) Interview and locates the offender
A) Maintains the crime scene and protects the evidence B) Methods of investigation C) Morse code D) Maintenance of crime scene and protects the evidence
A) Interrogate the suspect/offender B) Interrogate the people C) Interrogate the crime scene D) Interrogate everyone
A) Note the important things B) Note all conditions, events and remarks C) Note all happen D) Note all
A) Arrange B) Arrange of the following statements C) Arrange for the collection of evidence D) Arrange of the people
A) Reports everyone B) Reports the offender C) Report me D) Reports the incident fully and accurately
A) Yields the responsibility to the follow up investigation B) Yields the following individuals C) Yields the conducting regular inspections D) Yields the following statements |