A) Subversion B) Sabotage C) Pilferage D) Espionage
A) Intent and premeditation in theft B) Number of times they were caught C) Only steals small, easily hidden items D) Level of Education
A) Risk Avoidance B) Risk Transfer C) Risk Self-Assumption D) Risk Reduction
A) Body Frisking B) Issue of weapons C) Identification and Verification of purpose D) Allow free access
A) Espionage targets morale: Subversion targets information B) Subversion is done by governments only C) Espionage focuses on information theft, Subversion seeks to weaken authority or cause disruption D) Espionage is legally protected: Subversion is Criminal
A) Risk Self Assumption B) Risk Reduction C) Risk Transfer D) Risk Spreading
A) A company opting not to ensure a low-value asset but setting aside funds in case of loss B) Ignoring risk completely due to lack of budget C) Spreading the risk by outsourcing critical operations D) Hiring a private contractor to manage physical security
A) Pilferage B) Espionage C) Subversion D) Vandalism
A) A security measure in place to protect assets B) An environmental condition causing damage C) A legal owner of an asset D) An entity with both intent and capability to harm another
A) The frequency of threat attempts B) The financial or survival of losing the assets C) The visibility of the asset D) The number of people using the asset
A) Mental attitude B) Ambush attack C) Driver Rule D) Advance Security
A) Moving Attack B) Ambush attack C) Close in Security D) Novice Criminal
A) Ambush attack B) Prophylactic Operations C) Political Motivated Kidnapper's D) Moving Attack
A) Ambush attack B) Close in Security C) Mental Attitude D) Advance Security
A) Driver Rule B) Modus Operandi C) Moving Attack D) Ambush attack
A) Driver Rule B) Novice Criminal C) Political Motivated Kidnapper's D) Mental attitude
A) Advance Security B) Module Operandi C) Mental Attitude D) Novice Criminal
A) Prophylactic Operations B) Modus Operandi C) Novice Criminals D) Political Motivated Kidnapper's
A) Advance Security B) Modus Operandi C) Novice Criminals D) Political Motivated Kidnapper's
A) Advance Security B) Mental attitude C) Prophylactic Operations D) Moving Attack
A) Pleasantness B) Expressiveness C) Alertness D) Slang usage
A) Wait for confirmation before speaking B) Transmit 3 to 5 words at a time C) Use codes for every sentence D) Speak continuously without pause
A) Transfer of thoughts and ideas B) Establishment if civilization C) Creation of laws D) Hunting and gathering
A) Avoid using any code's B) Use of long sentences and complete grammar C) Use of phonetic alphabet and numerals D) Speak as fast as possible
A) There are not enough languages B) People still fail to understand one another C) Communication channels are too expensive D) People are talking too much
A) Slang and unnatural language B) All codes and acronyms C) Long pauses D) High-pitched voices
A) Messaging security B) Audio hailer C) Telephone D) Walkie-talkies
A) Receiving poorly B) Location C) Repeat message D) Radio check
A) Written language B) Use of Signs C) Oral language D) Symbolic Art
A) The tone of a person's voice B) A common language shared by people exchanging ideas C) A device for broadcasting messages D) The tool used to write
A) Determine employee productivity B) Review the state of physical security C) Identify vulnerabilities from natural causes D) Assess criminal activity from outside the organization
A) Analyzing and improving a facility's security practices B) Boosting sales C) Designing building architecture D) Training new recruits
A) Supplier delays B) Criminal activity within the organization C) External cyber attacks D) Competitor activity
A) A routine fire drill B) A list of employee duties C) A critical on site examination of a facility's security status D) A financial audit of company assets
A) Prepare Schedule B) Verify the need C) Develop alternatives D) Determine how data will be gathered
A) It ensures cooperation and resources B) It helps save money C) It allows skipping certain steps D) It guarantees fast results
A) Legal compliance checks only B) Checklists, audits, or inventories of security conditions C) Staff scheduling D) Background checks
A) Security survey B) Fire inspection C) Emergency drill D) Security briefing
A) To evaluate marketing strategies B) To monitor employee performance C) To hire new security staff D) To identify security vulnerabilities and recommend improvements
A) Only inspection is required for long term planning B) Inspection complements the survey to maintain security integrity C) They are unrelated processes D) Survey is done after inspection |