A) Subversion B) Sabotage C) Pilferage D) Espionage
A) Level of Education B) Number of times they were caught C) Intent and premeditation in theft D) Only steals small, easily hidden items
A) Risk Reduction B) Risk Self-Assumption C) Risk Avoidance D) Risk Transfer
A) Allow free access B) Issue of weapons C) Body Frisking D) Identification and Verification of purpose
A) Espionage is legally protected: Subversion is Criminal B) Espionage targets morale: Subversion targets information C) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption D) Subversion is done by governments only
A) Risk Spreading B) Risk Transfer C) Risk Reduction D) Risk Self Assumption
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Ignoring risk completely due to lack of budget C) Spreading the risk by outsourcing critical operations D) Hiring a private contractor to manage physical security
A) Pilferage B) Espionage C) Vandalism D) Subversion
A) A legal owner of an asset B) An environmental condition causing damage C) A security measure in place to protect assets D) An entity with both intent and capability to harm another
A) The visibility of the asset B) The financial or survival of losing the assets C) The number of people using the asset D) The frequency of threat attempts
A) Ambush attack B) Advance Security C) Driver Rule D) Mental attitude
A) Moving Attack B) Novice Criminal C) Ambush attack D) Close in Security
A) Prophylactic Operations B) Moving Attack C) Political Motivated Kidnapper's D) Ambush attack
A) Advance Security B) Ambush attack C) Mental Attitude D) Close in Security
A) Driver Rule B) Ambush attack C) Modus Operandi D) Moving Attack
A) Political Motivated Kidnapper's B) Mental attitude C) Novice Criminal D) Driver Rule
A) Novice Criminal B) Advance Security C) Module Operandi D) Mental Attitude
A) Modus Operandi B) Political Motivated Kidnapper's C) Novice Criminals D) Prophylactic Operations
A) Novice Criminals B) Modus Operandi C) Political Motivated Kidnapper's D) Advance Security
A) Mental attitude B) Advance Security C) Moving Attack D) Prophylactic Operations
A) Slang usage B) Alertness C) Expressiveness D) Pleasantness
A) Wait for confirmation before speaking B) Use codes for every sentence C) Transmit 3 to 5 words at a time D) Speak continuously without pause
A) Creation of laws B) Transfer of thoughts and ideas C) Hunting and gathering D) Establishment if civilization
A) Use of phonetic alphabet and numerals B) Speak as fast as possible C) Use of long sentences and complete grammar D) Avoid using any code's
A) Communication channels are too expensive B) There are not enough languages C) People still fail to understand one another D) People are talking too much
A) Long pauses B) Slang and unnatural language C) High-pitched voices D) All codes and acronyms
A) Walkie-talkies B) Telephone C) Audio hailer D) Messaging security
A) Receiving poorly B) Location C) Repeat message D) Radio check
A) Symbolic Art B) Written language C) Oral language D) Use of Signs
A) A device for broadcasting messages B) A common language shared by people exchanging ideas C) The tone of a person's voice D) The tool used to write
A) Review the state of physical security B) Assess criminal activity from outside the organization C) Determine employee productivity D) Identify vulnerabilities from natural causes
A) Analyzing and improving a facility's security practices B) Training new recruits C) Designing building architecture D) Boosting sales
A) Criminal activity within the organization B) External cyber attacks C) Supplier delays D) Competitor activity
A) A list of employee duties B) A routine fire drill C) A financial audit of company assets D) A critical on site examination of a facility's security status
A) Prepare Schedule B) Verify the need C) Determine how data will be gathered D) Develop alternatives
A) It helps save money B) It ensures cooperation and resources C) It guarantees fast results D) It allows skipping certain steps
A) Checklists, audits, or inventories of security conditions B) Legal compliance checks only C) Background checks D) Staff scheduling
A) Fire inspection B) Security briefing C) Security survey D) Emergency drill
A) To hire new security staff B) To monitor employee performance C) To identify security vulnerabilities and recommend improvements D) To evaluate marketing strategies
A) Only inspection is required for long term planning B) Inspection complements the survey to maintain security integrity C) They are unrelated processes D) Survey is done after inspection |