ThatQuiz Test Library Take this test now
(LEA 3) INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS
Contributed by: Ninge
  • 1. A security manager must decide whether to subcontract guard services to meet sudden demand. Under RA 11917’s objectives on professional practice, which factor is most important to evaluate before subcontracting?
A) Speed of contract signing
B) Number of guards available this month
C) Lowest bid from contractors
D) Contractor reputation, licensing compliance, and personnel training records
  • 2. A private security agency violates RA 11917 by failing to register personnel properly. To evaluate risk exposure, which step best aligns with the law’s management intent?
A) Ignore it if no incident occurred
B) Conduct an audit of all personnel files and implement corrective registration and training actions
C) Fire the negligent staff immediately
D) Blame outsourced HR
  • 3. Given RA 11917’s emphasis on professional standards, which performance metric most accurately measures compliance across guard teams?
A) Percentage of personnel with up-to-date certifications, completed training hours, and records of disciplinary actions
B) Client satisfaction surveys only
C) Number of arrests made
D) Average daily patrols logged
  • 4. A security firm wants to redesign its SOPs to meet RA 11917. Which redesign approach best demonstrates compliance and continuous improvement?
A) Make SOPs only for supervisors
B) Copy SOPs from a competitor
C) Keep SOPs informal to allow flexibility
D) Use risk assessment results, stakeholder input, and mandatory provisions of RA 11917 to create measurable SOPs and training plans
  • 5. An operations director must allocate limited budget to training or equipment upgrades. Evaluating RA 11917’s focus on professional competency, which allocation is more defensible?
A) Delay both until next fiscal year
B) Hire more administrative staff
C) Upgrade CCTV only
D) Invest in prioritized training for key skills and minimum equipment upgrades ensuring competence and compliance
  • 6. A client requests a security strategy that contradicts RA 11917 professional responsibilities (e.g., encourage guards to use excessive force). What should the agency do?
A) Implement but keep it undocumented
B) Refuse, explain legal/professional limits, propose compliant alternatives, and document the interaction
C) Ignore the request
D) Comply to keep the client
  • 7. To ensure RA 11917’s practice-of-profession standards, the board issues new implementing rules. As an operations manager, how would you operationalize them?
A) Announce them once to staff
B) Wait for enforcement visits
C) Only update senior management
D) Immediately integrate rules into SOPs, train staff, and create monitoring KPIs with audit schedules
  • 8. You detect recurring minor violations by night-shift guards. Applying RA 11917’s managerial intent, which is the best corrective action?
A) Terminate the night shift supervisor instantly
B) Ignore since violations are minor
C) Analyze root causes, update training, adjust schedules, and implement supervisory spot-checks to prevent recurrence
D) Transfer the guards to day shift
  • 9. A security agency’s internal audit reveals documentation gaps that could breach RA 11917 during inspections. What evaluation approach best reduces risk?
A) Prioritize corrective documentation practices, assign owners, and run weekly compliance reviews until stable
B) Do nothing until an inspection occurs
C) Assume auditors won’t notice
D) Hide gaps from inspectors
  • 10. A licensed security officer is accused of misconduct. Under RA 11917 principles, the agency’s best course is to.
A) Terminate immediately without investigation
B) Suspend pending a fair investigation, document findings, coordinate with the licensing authority if required, and follow due process
C) Defend the officer publicly without investigation
D) Ignore the complaint
  • 11. The agency faces reputational risk after a public incident. Which management action best aligns with RA 11917’s requirement for professionalism?
A) Fire personnel and keep it secret
B) Conduct transparent internal review, communicate corrective measures to stakeholders, and update training/policies
C) Blame the client
D) Deny involvement and stay silent
  • 12. When introducing biometric access for guards, which strategy best ensures alignment with RA 11917 on privacy and operational integrity?
A) Share biometrics openly with clients
B) Install without policies
C) Develop data protection procedures, obtain consent, limit access rights, and train personnel on privacy obligations
D) Use biometrics only for some staff inconsistently
  • 13. A junior manager proposes performance-based pay tied to arrest counts. Evaluating against RA 11917 standards, why might this be problematic?
A) It reduces costs
B) It increases arrests
C) It may incentivize improper conduct; instead, design balanced KPIs that reward lawful, professional behavior and client service
D) It’s standard practice everywhere
  • 14. A company wishes to expand to a new province. What RA 11917–aligned analysis must be performed first?
A) Hire local guards immediately
B) Copy existing contracts without change
C) Announce expansion on social media
D) Legal/regulatory compliance check, local licensing requirements, market risk assessment, and staffing plan aligned with professional standards
  • 15. Confronting systemic low morale tied to unrealistic workloads, which RA 11917–consistent management decision best addresses both compliance and wellbeing?
A) Ignore morale, focus on outputs
B) Redesign shift rosters, hire additional staff, provide welfare and training, and monitor service quality metrics
C) Require overtime indefinitely
D) Cut rest breaks to increase coverage
  • 16. A training program is proposed to meet RA 11917. To evaluate its effectiveness, which method is best?
A) Use a single multiple-choice test
B) Pre/post competency testing, practical assessments, field audits, and follow-up performance metrics tied to SOPs
C) Ask trainers if they liked it
D) Count attendance only
  • 17. A client asks the agency to withhold incident reports to avoid bad publicity. Under RA 11917, what should the agency do?
A) Refuse, explain legal obligations, report as required, and propose reputational management strategies that are lawful
B) Partially redact and send a false summary
C) Cooperate without question
D) Hide the incident forever
  • 18. Which decision best demonstrates organizational accountability required by RA 11917 after a compliance breach?
A) Public acknowledgement of breach, corrective plan, assigned responsibilities, and transparent progress reports to stakeholders and regulators
B) Firing CEO immediately without investigation
C) Ignoring the breach
D) Only disciplining frontline staff
  • 19. In designing hiring criteria to meet RA 11917, which candidate attribute should be weighted highest to ensure professional practice?
A) Willingness to work for low pay
B) Valid licensing/certification, background check clearance, competency in required skills, and evidence of integrity
C) Age alone
D) Physical strength only
  • 20. A field commander suggests reducing patrol frequency to save cost, despite increased local theft. Using RA 11917 framework, the manager should____.
A) Perform a risk assessment, quantify impact on safety/service, propose an optimized deployment that balances cost and risk mitigation
B) Replace patrols with fewer cameras only
C) Reduce patrols to save money
D) Ignore the commander
  • 21. Which measure best shows proactive compliance with RA 11917 before an external audit?
A) Waiting for audit feedback
B) Only updating documents on the audit day
C) Conducting internal compliance audit using the law’s checklist, fix issues, and prepare evidence of corrective actions
D) Hiding records likely to be queried
  • 22. For career development aligned with RA 11917 professionalism, which policy is most effective?
A) Promote relatives of managers
B) No career path, only daily tasks
C) Create a competency-based career ladder with mandatory training milestones, certifications, and mentorships tied to promotions
D) Promote only by seniority
  • 23. If a security agency finds falsified training records, which action both enforces RA 11917 and protects operations?
A) Immediately investigate, validate qualifications, discipline per policy, notify licensing board if needed, and remediate training gaps
B) Ignore to keep numbers clean
C) Terminate entire staff at once
D) Replace documentation without action
  • 24. In drafting emergency SOPs to align with RA 11917, what element is most critical to ensure both professionalism and accountability?
A) Clear roles/responsibilities, communication protocols, legal compliance steps, and training/testing schedules
B) A vague description of roles
C) Only evacuation routes
D) Only a list of emergency contacts without procedures
  • 25. A security firm considers outsourcing background checks. Which RA 11917–conscious control should be implemented?
A) Only verbal assurances from vendor
B) Full delegation without oversight
C) Vendor qualification, standard operating procedures, data protection clauses, and periodic verification audits
D) No contract needed
  • 26. The agency must decide on disciplinary benchmarks. Which policy best reflects RA 11917 principles?
A) Clear, consistent disciplinary procedures with due process and appeals, proportionate sanctions, and rehabilitation options
B) Punishments only for low-ranking personnel
C) Arbitrary punishments to deter misconduct
D) No discipline to avoid conflict
  • 27. Which organizational metric best indicates successful integration of RA 11917 into daily operations?
A) Percentage of staff current with licensing, passing rates on competency tests, and reduction in incident recurrence
B) Number of client complaints ignored
C) Total number of guards hired this year
D) Number of social media posts about compliance
  • 28. A manager must choose between two training vendors: one cheaper but unaccredited, one slightly costlier with accreditation and QA. RA 11917–aligned choice is_____.
A) Use in-house unstructured training only
B) Accredited vendor to ensure compliance and quality of professional competency
C) Choose randomly
D) Cheaper vendor to save funds
  • 29. To comply with RA 11917 data transparency, which reporting policy is best for incident data shared with clients?
A) Share raw staff notes
B) Never share any data
C) Standardized incident reports with factual details, timelines, and corrective actions while protecting privacy and legal rights
D) Only verbal summaries without records
  • 30. A new technological tool promises efficiency but conflicts with licensing requirements under RA 11917. What should management do?
A) Deploy immediately to gain advantage
B) Deploy selectively without oversight
C) Halt deployment until legal compliance review, risk assessment, and policy updates are completed
D) Ignore licensing and assume no consequences
  • 31. During customer confrontation, a guard must de-escalate and document. Which combined action best shows higher-order competency?
A) Call supervisor only after incident
B) Use force to end argument
C) Escort the customer off premises immediately without documentation
D) Apply verbal de-escalation, preserve evidence, capture witness statements, and file an objective incident report for investigative follow-up
  • 32. A complaint alleges discriminatory behavior by a guard. Evaluating training efficacy, what analysis identifies root causes?
A) Fire the guard immediately without assessment
B) Mark complaint as resolved without investigation
C) Blame the complainant
D) Analyze training records, situational transcripts, supervisor oversight, and cultural-competency gaps to redesign training modules
  • 33. A security trainer must design a scenario-based exercise for investigation skills. Which objective best demonstrates HOTS learning outcomes?
A) Simulate a complex theft, require teams to collect evidence lawfully, interview witnesses, chain evidence, analyze motive, and prepare prosecutable documentation
B) Only practice radio communication
C) Watch a video about investigations
D) Memorize the steps of filing a report
  • 34. A security officer finds suspicious behavior suggesting corporate espionage. Which investigative action best balances immediate safety and intelligence integrity?
A) Secure the area, discreetly observe, collect non-intrusive intelligence, escalate to authorized investigators, and preserve chain of custody for any evidence
B) Publicly accuse individuals
C) Confront aggressively and interrogate
D) Ignore unless theft occurs
  • 35. A customer claims property missing; CCTV is inconclusive. Which investigative method best uses HOTS skills?
A) Cross-check access logs, interview guards and staff, analyze patterns, seek physical evidence, and map possible timelines to reconstruct events
B) Blame CCTV system
C) Replace missing item immediately
D) Accept client’s claim without verification
  • 36. Training includes ethics and use-of-force. Which training assessment best shows a trainee has evaluated complex scenarios correctly?
A) True/false quiz
B) Multiple-choice Only
C) A practical exercise presenting ambiguous threat levels where trainee articulates proportional response, legal justification, and post-incident reporting steps
D) Timed obstacle course
  • 37. A VIP requests privacy beyond normal protocol. Which action best balances customer relations skills with policy and legal constraints?
A) Handle privately without documentation
B) Grant all VIP requests regardless of policy
C) Evaluate request, seek management approval, document exceptions, and ensure legal and safety approvals are met before altering protocols
D) Refuse all VIP requests automatically
  • 38. A guard detects a potential insider leak. Which investigative strategy best aligns with corporate intelligence principles?
A) Initiate discreet intelligence collection, limit disclosure to need-to-know, correlate access histories, and coordinate with HR and legal before a covert operation or disciplinary action
B) Send a company-wide email accusing staff
C) Ignore the possibility
D) Accuse the suspected employee publicly
  • 39. Which protocol best demonstrates advanced customer-relations judgement in a crisis evacuation?
A) Lock doors and continue operations
B) Provide clear, calm instructions, designate staff to assist vulnerable customers, communicate updates, and ensure post-evacuation accountability and client communications
C) Evacuate without informing customers of exits
D) Evacuate only employees and leave customers
  • 40. A guard obtains eyewitness statements that conflict. Which investigative evaluation produces the most reliable reconstruction?
A) Cross-validate statements with physical evidence, timelines, and CCTV; assess witness credibility and corroborate with independent sources
B) Discard all statements as unreliable
C) Ignore contradictions and accept the first statement
D) Choose the statement that fits a manager’s preconception
  • 41. You're designing a training module on report writing. Which learning activity demonstrates creating-level skills?
A) Reading sample reports
B) Trainees must draft a full investigative report from a simulated incident, including chain-of-custody forms, legal considerations, and executive summary for stakeholders
C) Copying a template report
D) Watching sample report videos
  • 42. A guard must decide whether to detain a suspect until police arrive. Which criterion best reflects lawful and professional decision-making?
A) Evaluate probable cause, safety, legal authority, risk to the public, and document justification for detention consistent with law and organizational policy
B) Always detain suspects regardless of evidence
C) Never detain to avoid trouble
D) Detain only if manager is present
  • 43. For improving client trust, which intelligence practice should a security unit implement?
A) Share raw intelligence files externally
B) Implement a confidential incident feedback loop, transparent service-level reporting, and regular stakeholder briefings while protecting sensitive intelligence
C) Market and publicize internal investigations widely
D) Withhold all incident information
  • 44. A guard faces confrontation where de-escalation fails and a suspect flees. Which evaluative step best supports later investigation and accountability?
A) Immediately secure scene, interview witnesses, note pursuit details (times, directions), coordinate with police, and ensure bodycam/CCTV capture preserved
B) Continue searching without reporting
C) Post chase details on social media
D) Ignore documenting the chase
  • 45. A company wants metrics for customer service by guards. Which combined KPI set best demonstrates HOTS alignment?
A) Number of calls to security center
B) Number of compliments only
C) Response time, resolution effectiveness, lawful conduct incidents, follow-up documentation quality, and client satisfaction surveys analyzed for training gaps
D) Number of guard selfies with clients
  • 46. When investigating industrial sabotage, which multi-disciplinary approach most effectively uses corporate intelligence principles?
A) Focus only on physical security
B) Integrate physical forensics, digital forensics, personnel access records, vendor contract review, and external threat intelligence to determine motive and actors
C) Blame external competitors without proof
D) Fire a random employee to deter sabotage
  • 47. A trainee shows bias in interactions. For competency development, which learning intervention best addresses the issue?
A) Facilitate scenario-based bias-awareness training, role-play customer-relations simulations, and evaluate behavior changes through supervision and feedback
B) Ignore since performance is otherwise good
C) Give a written warning only
D) Immediately terminate the trainee
  • 48. A security team must create an intelligence brief for management. Which structure best reflects analyzing-level skills?
A) Use raw messages with no analysis
B) Long narrative without conclusions
C) Bullet list of rumors
D) Executive summary, threat assessment with evidence, impact analysis, recommended mitigations, and prioritized action plan with resource estimates
  • 49. An officer must preserve digital evidence from a smartphone found at a crime scene. Which sequence best ensures forensic integrity?
A) Isolate device (airplane mode), document chain-of-custody, avoid powering on/off unnecessarily, and coordinate with digital forensics specialists for imaging
B) Post images from the phone on social media
C) Let anyone access phone to look for info
D) Hand phone to client for safekeeping
  • 50. After a major incident, which customer-relations strategy best demonstrates evaluative leadership?
A) Provide transparent incident report, outline corrective actions, offer remediation where appropriate, and solicit client feedback for continuous improvement
B) Provide a generic press release only
C) Ignore clients to avoid panic
D) Blame clients for causing incident
  • 51. A guard notices a pattern of petty thefts correlated with a specific vendor shift. Which investigative action best demonstrates analytical intelligence?
A) Remove vendor without cause
B) Review vendor access logs, reconcile deliveries, interview staff, and recommend vendor audits and strengthened access controls
C) Ignore since thefts are petty
D) Confront vendor employees immediately
  • 52. For measuring investigative competence, which evaluation method demonstrates HOTS?
A) Asking trainees if they feel confident
B) Practical casework assessment requiring chain-of-custody, witness interview, analytical timeline, and prosecutable report reviewed by external expert
C) Quiz on definitions
D) Observing attendance only
  • 53. A guard must decide whether to detain a person found with a suspicious keycard. Which decision shows legal and investigative reasoning?
A) Assess card ownership via access logs, interview the person, secure evidence, and detain only if probable cause exists and legal authority is clear
B) Ignore the keycard since it’s not a weapon
C) Immediately arrest the person without cause
D) Destroy the keycard to prevent misuse
  • 54. A security manager needs to reallocate training hours after a budget cut. Which analytical choice best preserves investigative readiness?
A) Outsource all training abroad
B) Prioritize scenario-based, high-impact modules (e.g., evidence handling, interview skills), cross-train supervisors, and use blended learning to save costs
C) Replace training with memos
D) Cancel all investigative training
  • 55. A guard observes a senior staff member bypassing access controls. Which response best demonstrates professional integrity and investigative judgment?
A) Ignore due to seniority
B) Copy the senior staff’s behavior
C) Confront publicly and humiliate the staff member
D) Discreetly document the breach, report via appropriate channels, and follow up with a compliance investigation regardless of rank
  • 56. A client requests summary intelligence on theft patterns across their multiple sites. Which analytic product best meets their needs?
A) Comparative incident trend analysis with heat maps, root-cause insights, and prioritized remediation recommendations across sites
B) Raw incident logs with no analysis
C) One-line email saying “everything’s fine”
D) A single site’s incident report only
  • 57. During a simulated active aggression drill, which trainee behavior shows creating-level mastery?
A) Leaving the area immediately
B) Hiding from the drill
C) Shouting to scare suspect away
D) Developing a controlled, multi-step response integrating de-escalation, team coordination, evidence preservation, and post-incident documentation plan
  • 58. In preparing investigators, which policy ensures integrity of witness interviews?
A) Encourage leading questions to speed up results
B) Offer witnesses money to change statements
C) Allow informal interviews with no record
D) Use structured interview protocols, record sessions (where legal), document non-leading questioning, and protect witness confidentiality to maintain credibility
  • 59. A security team must convert raw intelligence into actionable tasks. Which prioritization method best demonstrates HOTS reasoning?
A) Act on the first tip received
B) Randomly choose tasks
C) Prioritize by risk (likelihood × impact), feasibility, legal constraints, and potential to prevent harm, then assign resources accordingly
D) Only pursue tasks that are easy
  • 60. A guard must create an incident narrative for prosecution. Which approach shows evaluative skills?
A) Produce objective, chronological facts, corroborate with evidence, avoid opinion, and include evidence logs and witness details for legal scrutiny
B) Include hearsay as fact
C) Omit inconvenient facts
D) Write emotional descriptions to sway court
  • 61. A newly contracted warehouse has repeated after-hours break-ins. Which step in a security survey demonstrates analytical evaluation before recommending countermeasures?
A) Hand the problem to the client
B) Replace lock hardware only
C) Immediately hire more guards
D) Conduct a site survey mapping vulnerabilities, crime patterns, access points, lighting, CCTV blind spots, and then match controls to quantified risk priorities
  • 62. After a risk assessment, management must choose between two mitigation options: costlier CCTV coverage or hiring additional guards. Which decision-making approach best aligns with risk management principles?
A) Perform cost-benefit analysis, consider residual risk, deterrence effects, and long-term total cost of ownership before selecting a layered solution
B) Flip a coin
C) Choose the cheaper option
D) Pick both regardless of budget
  • 63. While performing a personnel security review, you find several positions lack background checks. Which remedial plan best balances continuity and compliance?
A) Wait for an incident to act
B) Fire all unvetted personnel immediately
C) Ignore the oversight
D) Implement urgent background checks for critical roles, temporary restrictions on sensitive access, and a schedule to complete checks for all relevant staff
  • 64. A facility’s document-handling SOPs permit broad internal copying of sensitive records. Which change will best reduce information security risk while preserving operations?
A) Introduce classification levels, need-to-know access, logging of sensitive document handling, and secure disposal procedures balanced with business needs
B) Ban all internal copying
C) Store all records outside the facility only
D) Allow anyone access if they request it
  • 65. During BCP planning, which business process should be prioritized for recovery if it directly supports life safety?
A) Evacuation communications, emergency medical response coordination, and secured access to critical safety systems
B) Marketing campaign systems
C) Payroll processing
D) The coffee vending machine
  • 66. An auditor asks for evidence that proposed security controls reduce risk. Which evaluation method provides the strongest proof?
A) Verbal assurance only
B) Pilot implementation with metrics: incident rates pre/post, penetration test results, and quantitative risk reduction modeling
C) Testimonials without data
D) Photo of new equipment only
  • 67. A perimeter fence upgrade is considered low priority but highly visible to customers. What advanced recommendation most appropriately balances security effectiveness with stakeholder expectations?
A) Opt for an ornamental fence for appearance only
B) Recommend a layered approach: discreet intrusion detection, natural surveillance improvements (lighting/landscaping), and targeted fencing where risk justifies it
C) Ignore both risk and appearance
D) Build the thickest, most aggressive fence possible regardless of impact
  • 68. A company wants to digitize personnel files. Which information-security control should be applied first?
A) Only password-protect with a generic password
B) Post files on a public drive for convenience
C) Save on local desktops only
D) Implement access controls, encryption, audit logging, role-based permissions, and a documented retention/destruction policy before digitization
  • 69. A supply-chain disruption threatens critical components. Which BCP step best demonstrates HOTS planning?
A) Activate contingency suppliers, prioritize critical processes for recovery, implement manual fallback procedures, and communicate with stakeholders per the BCP
B) Hope the supplier resumes quickly
C) Close operations until supplier returns
D) Blame the supplier publicly
  • 70. A security survey shows repeated tailgating at main gates. Which multi-layered control plan best addresses the root cause?
A) Replace guards with a single camera only
B) Increase gate height alone
C) Allow tailgating during busy hours
D) Combine physical barriers, access credential upgrades, anti-tailgate technology, staff training, and monitoring with enforcement policies and sanctions
  • 71. Evaluating a document security breach, which analytical sequence will best determine corrective measures?
A) Ignore if not publicized
B) Fire a random staff member
C) Map the leak pathway (who had access), review controls, interview staff, assess extent of compromise, and implement technical/administrative remediations and monitoring
D) Delete the breached files to hide the issue
  • 72. Which risk treatment option best demonstrates an evidence-based approach for high-likelihood, low-impact threats?
A) Spend maximum budget to eliminate them entirely
B) Ignore such threats entirely
C) Wait until something happens before deciding
D) Accept where cost of mitigation exceeds impact, but monitor and periodically reassess; implement low-cost controls where feasible
  • 73. For information security, which control best addresses both insider threat and business continuity?
A) Use a single master password for ease
B) Implement least-privilege access, session monitoring, privileged access management, and documented emergency override procedures with audit trails
C) Give administrators full access with no oversight
D) Remove all admin privileges from everyone permanently
  • 74. A new manufacturing line adds unknown risks. Which planning approach best ensures resilient operations?
A) Conduct a targeted risk assessment, integrate controls into process design, update BCP and recovery priorities, and train staff before commissioning
B) Rely on insurance to cover problems
C) Start production immediately and adapt later
D) Outsource risk to contractors
  • 75. When evaluating CCTV placement, which analytic consideration yields the best coverage plan?
A) Use threat scenarios, sightlines, lighting conditions, image retention needs, privacy impacts, and integration with response procedures to optimize placement
B) Cover only entrances and ignore interior zones
C) Place cameras randomly to cover all walls
D) Place them only where cosmetically appropriate
  • 76. A critical document is accidentally made public. Which immediate response demonstrates proper incident management and continuity planning?
A) Blame the IT department without analysis
B) Delete the document and hope for the best
C) Contain exposure, assess scope, notify affected parties per policy, apply legal/PR strategies, and strengthen access controls to prevent recurrence
D) Ignore unless someone complains
  • 77. Which combination of countermeasures best reduces both physical theft and data exfiltration risks at a sensitive research lab?
A) Allow open access to foster collaboration
B) Only increase signage about confidentiality
C) Access control, visitor vetting, CCTV, data segmentation, endpoint protection, and strict document handling policies with staff vetting and monitoring
D) Lock doors only
  • 78. A building’s emergency generator fails during a drill. Which analytic step best informs BCP revision?
A) Replace the generator with the same model without analysis
B) Dismiss the failure as a fluke
C) Cancel future drills to avoid failures
D) Conduct root-cause analysis, test redundancy, evaluate manual workarounds, update recovery time objectives (RTOs), and schedule corrective maintenance and alternate backup sources
  • 79. A security plan must address both low- and high-probability catastrophic events. Which planning principle ensures resource-efficient resilience?
A) Only plan for everyday minor events
B) Treat all events equally
C) Use risk-based prioritization focusing on high-impact events first, adopt proportional controls, and incorporate scalable contingency options
D) Only buy the most expensive mitigation available
  • 80. For personnel security, which hiring control best minimizes fraud risk in finance roles?
A) Only check identity documents
B) Require multi-source reference checks, financial background screenings, integrity testing, and role-specific monitoring with separation of duties
C) Hire quickly without vetting to fill vacancies
D) Hire friends of management only
  • 81. A plan relies entirely on vendor cloud backup. Which risk assessment finding should prompt a change?
A) Rely on on-premises tapes only without testing
B) Single-point-of-failure in vendor dependency; recommend multi-region/backups, contractual SLAs, and test restores to ensure recovery capability
C) Cancel backups altogether
D) No change is needed; cloud providers are always reliable
  • 82. A critical corridor is both a fire route and a security chokepoint. Which design remedy best balances safety and security requirements?
A) Use alarmed, access-controlled doors that comply with egress codes (fail-safe mechanisms), combined with monitoring and clear signage to preserve life-safety while securing areas
B) Keep the corridor unlocked for convenience
C) Use bolt locks that require keys and prevent escape
D) Block the corridor to prevent unauthorized access
  • 83. A data classification scheme is inconsistent across departments. What corrective action best improves document security governance?
A) Implement enterprise-wide classification policy, training, and enforcement with tools for labeling and automated controls tied to BCP priorities
B) Delete old classifications
C) Let each department do as they wish
D) Outsource classification to an external vendor with no integration
  • 84. A risk register lists many low-priority items. For efficient planning, which analytical step best optimizes resource allocation?
A) Spend budget evenly across all items
B) Discard all low-priority risks entirely
C) Treat low-priority items first
D) Group similar risks, assess aggregated impact, reprioritize by combined likelihood and impact, and address clusters with single controls where effective
  • 85. During penetration testing, testers exploited access via an unmonitored utility entrance. Which control revision best mitigates this vector?
A) Remove all utility entrances and relocate utilities
B) Ignore since utilities are low profile
C) Add access control, monitoring, staff awareness, and integrate the utility entrance into patrol and CCTV coverage with procedural checks
D) Close the entrance permanently
  • 86. A key supplier is in an unstable region. Which BCP strategy best ensures continuity of supply?
A) Do nothing and hope supplier remains stable
B) Develop alternate suppliers, maintain safety stock for critical items, and create contractual contingencies and rapid switch-over procedures
C) Rely on the supplier’s assurances only
D) Move all production to the unstable region
  • 87. After a security survey, you recommend layered access control. Which justification best convinces senior management?
A) Offer anecdotal stories only
B) Says it looks more professional
C) Present quantified risk reduction, ROI estimate, incident-avoidance costs vs. implementation cost, and regulatory/compliance benefits for decision-making
D) Claim it is mandatory without evidence
  • 88. For continuity, which testing regimen provides the strongest assurance BCP will work during real events?
A) Only read the BCP document annually
B) A tabletop exercise only every five years
C) Outsource testing and ignore results
D) Regular drills of full-scale recovery, desktop scenario testing, supplier continuity tests, and evidence-based post-exercise improvements with timelines
  • 89. A building uses open Wi-Fi in public areas. To reduce information security risk without hindering customer experience, which plan best balances both concerns?
A) Implement segmented guest networks isolated from corporate resources, enforce bandwidth/security policies, and present clear acceptable-use terms
B) Use the corporate network for guests
C) Display passwords publicly in the lobby
D) Remove Wi-Fi entirely
  • 90. A company is required to recover operations within 24 hours. Which planning step best ensures this recovery time objective (RTO) is achievable?
A) Reduce employee hours to save costs and hope for the best
B) Only purchase extra servers without testing
C) Assume systems will be back in time by luck
D) Map critical processes, identify dependencies, establish recovery strategies (hot/warm sites), test restores, and align resource allocations to meet the RTO
  • 91. When redesigning a retail complex for CPTED (Crime Prevention Through Environmental Design), which integrated change best demonstrates synthesis of theory and practice?
A) Install only high fences with barbed wire
B) Reconfigure sightlines with low landscaping, optimize lighting, create natural surveillance, control access, and combine signage and territorial reinforcement to reduce crime opportunities
C) Add metal detectors only
D) Add more security guards only
  • 92. Evaluating CPTED vs. mechanistic security for a mixed-use urban plaza, which argument best reflects high-level analysis?
A) CPTED is obsolete
B) Mechanistic security always wins
C) Use only police patrols and nothing else
D) A hybrid approach that uses CPTED for long-term social prevention and targeted mechanical systems for high-risk nodes yields better resilience and community acceptance
  • 93. A proposed building layout creates many blind corridors. From an architectural-security perspective, which redesign principle best reduces risk while preserving aesthetics?
A) Add murals to decorate blind spots only
B) Close the corridors permanently
C) Keep blind corridors and increase patrols only
D) Introduce transparency (glass), natural surveillance points, mirrored sightlines, and controlled access while maintaining aesthetic coherence
  • 94. Urban planners want to discourage loitering that fuels petty crime but not alienate legitimate users. Which policy best balances security philosophy and public access?
A) Close the space at night permanently
B) Remove seating entirely to prevent anyone from staying
C) Design inclusive public spaces with active uses (cafés, vendor stalls), adequate lighting, seating that discourages long-term loitering in sensitive areas, and community policing initiatives
D) Enforce blanket anti-loitering laws harshly
  • 95. A high-rise integrates security into façade design. Which design decision best demonstrates creative application of physical security principles?
A) Hide guards in basements only
B) Add visible armed sentries on every corner of the roof
C) Cover the façade with solid metal plates
D) Use architectural features (bollards disguised as planters, setback landscaping, and reinforced glazing) that provide protection without visible fortress aesthetics
  • 96. For a campus experiencing repeated thefts from parked vehicles, which multi-disciplinary solution best applies theory to practice?
A) Reorganize parking into well-lit, surveilled zones, increase natural surveillance through foot traffic patterns, add controlled access points, and run community awareness campaigns
B) Ban parking entirely
C) Only hand out pamphlets about theft prevention
D) Install random spikes that damage tires to stop parking
  • 97. A new mall design could either concentrate retail in a single atrium or distribute shops across multiple nodes. Which layout better applies security philosophy to reduce target attractiveness while preserving commerce?
A) Distributed nodes with clear sightlines, controlled access points, and secure back-of-house circulation to reduce single-point-target risk and support emergency egress
B) Randomly place shops with no planning
C) One concentrated atrium for maximum density
D) Hide all shops behind secured doors only accessible by staff
  • 98. Which philosophical justification best supports integrating community engagement into physical security planning for neighborhoods?
A) Engaged communities increase social cohesion, informal guardianship, and long-term deterrence, reducing reliance on costly mechanical controls and improving legitimacy of security measures
B) Only technology can prevent crime, community engagement is irrelevant
C) Community input always increases crime
D) Community engagement slows down planning
  • 99. A security architect must reconcile heritage preservation with modern security needs. Which solution best balances both goals?
A) Ignore security to preserve authenticity
B) Use reversible, non-invasive security installations (discreet cameras, mobile access solutions, sympathetic barriers) and collaborate with conservationists to maintain historical integrity while improving protection
C) Build a separate modern structure next to the heritage site and move everything there
D) Replace the heritage site with a modern fortress
  • 100. When evaluating a proposal for hostile vehicle mitigation on a public promenade, which analytical framework best ensures both safety and urban amenity?
A) Close the promenade to the public permanently
B) Use temporary measures only during festivals
C) Use graduated measures (landscaped barriers, retractable bollards, widened sidewalks, setback café zones) combined with pedestrian experience analysis and emergency access planning to balance protection and livability
D) Install visible concrete blocks everywhere
Created with That Quiz — the math test generation site with resources for other subject areas.