A) Sabotage B) Subversion C) Espionage D) Pilferage
A) Only steals small, easily hidden items B) Level of Education C) Intent and premeditation in theft D) Number of times they were caught
A) Risk Transfer B) Risk Avoidance C) Risk Reduction D) Risk Self-Assumption
A) Issue of weapons B) Allow free access C) Identification and Verification of purpose D) Body Frisking
A) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption B) Espionage is legally protected: Subversion is Criminal C) Espionage targets morale: Subversion targets information D) Subversion is done by governments only
A) Risk Transfer B) Risk Reduction C) Risk Self Assumption D) Risk Spreading
A) Hiring a private contractor to manage physical security B) Ignoring risk completely due to lack of budget C) Spreading the risk by outsourcing critical operations D) A company opting not to ensure a low-value asset but setting aside funds in case of loss
A) Pilferage B) Vandalism C) Subversion D) Espionage
A) A legal owner of an asset B) An environmental condition causing damage C) A security measure in place to protect assets D) An entity with both intent and capability to harm another
A) The number of people using the asset B) The financial or survival of losing the assets C) The frequency of threat attempts D) The visibility of the asset
A) Advance Security B) Mental attitude C) Ambush attack D) Driver Rule
A) Ambush attack B) Novice Criminal C) Moving Attack D) Close in Security
A) Moving Attack B) Ambush attack C) Political Motivated Kidnapper's D) Prophylactic Operations
A) Close in Security B) Ambush attack C) Mental Attitude D) Advance Security
A) Driver Rule B) Moving Attack C) Modus Operandi D) Ambush attack
A) Novice Criminal B) Mental attitude C) Political Motivated Kidnapper's D) Driver Rule
A) Mental Attitude B) Advance Security C) Novice Criminal D) Module Operandi
A) Prophylactic Operations B) Modus Operandi C) Novice Criminals D) Political Motivated Kidnapper's
A) Modus Operandi B) Advance Security C) Political Motivated Kidnapper's D) Novice Criminals
A) Mental attitude B) Advance Security C) Prophylactic Operations D) Moving Attack
A) Slang usage B) Expressiveness C) Alertness D) Pleasantness
A) Wait for confirmation before speaking B) Transmit 3 to 5 words at a time C) Use codes for every sentence D) Speak continuously without pause
A) Establishment if civilization B) Transfer of thoughts and ideas C) Hunting and gathering D) Creation of laws
A) Avoid using any code's B) Speak as fast as possible C) Use of long sentences and complete grammar D) Use of phonetic alphabet and numerals
A) There are not enough languages B) People still fail to understand one another C) People are talking too much D) Communication channels are too expensive
A) All codes and acronyms B) Long pauses C) Slang and unnatural language D) High-pitched voices
A) Walkie-talkies B) Telephone C) Audio hailer D) Messaging security
A) Radio check B) Repeat message C) Location D) Receiving poorly
A) Oral language B) Use of Signs C) Written language D) Symbolic Art
A) The tone of a person's voice B) A device for broadcasting messages C) A common language shared by people exchanging ideas D) The tool used to write
A) Determine employee productivity B) Identify vulnerabilities from natural causes C) Assess criminal activity from outside the organization D) Review the state of physical security
A) Boosting sales B) Training new recruits C) Designing building architecture D) Analyzing and improving a facility's security practices
A) Criminal activity within the organization B) Competitor activity C) External cyber attacks D) Supplier delays
A) A routine fire drill B) A critical on site examination of a facility's security status C) A list of employee duties D) A financial audit of company assets
A) Develop alternatives B) Prepare Schedule C) Verify the need D) Determine how data will be gathered
A) It ensures cooperation and resources B) It guarantees fast results C) It allows skipping certain steps D) It helps save money
A) Legal compliance checks only B) Staff scheduling C) Background checks D) Checklists, audits, or inventories of security conditions
A) Fire inspection B) Security survey C) Security briefing D) Emergency drill
A) To evaluate marketing strategies B) To hire new security staff C) To identify security vulnerabilities and recommend improvements D) To monitor employee performance
A) Inspection complements the survey to maintain security integrity B) Survey is done after inspection C) Only inspection is required for long term planning D) They are unrelated processes |