All of the following are physical threats to information except:
system failures
natural disasters
human error
malicious acts
A company decides to plant bushes with sharp thorns on the side of their property facing a field. This would be an example of:
perimeter access control
security planning by environmental design
crime prevention through environmental design
agricultural environmental protection
The risk formula is based on:
threat and vulnerability
vulnerability and countermeasures
threat and mitigation
vulnerability and mitigation
A security department at a private hospital that is staffed by part time security officers would most likely be classified as a _____ security service organization.
Level IV
Level III
Level II
Level I
The type of information that has special value to organizations is:
employee handbooks
intellectual capital
intellectual property
account receivable records
Which of the following terms is applied to civil cases involving tort liability when a security officer unreasonably detains an individual without justification?
malicious prosecution
false imprisonment
false arrest
defamation
Operational plans would include all of the following except:
organization and authority
Mission, Vision, Values
strengths, weaknesses and opportunities
equipment and weapons
The vast majority of security services personnel in the private sector are employed in:
executive protection
contract watch and guard
investigations
transport and cash management
Risk to an organization includes:
reputation
people
customers and clients
equipment
all of the above
The type of malicious event typically used by disgruntled employees is a:
megabyte
logic bomb
Trojan horse
Countermeasure
The following nation has not adopted "smart card" technology for credit transactions:
China
England
United States
India
Operationally, an enterprise security risk management system would be supervised by:
the CEO
Chairman of the Board
Chief Security Officer
Chief Financial Officer
The most notable development that occurred after 9.11 for security services was:
the re-organization of various federal law enforcement agencies
the passage of various anti-crime legislative acts
the merger of state and federal agencies into national homeland security operations
the takeover of security functions by state governments
the increase of powers given to private security operations
A private employer of security personnel could be held liable and required to pay damages for the conduct of its employees based upon:
negligent hiring
negligent training
negligent supervision
all of the above
Honeywell, Siemens, and Simplex are examples of companies that provide:
executive protection
alarm services
contract watch and guard
investigations
cash management
Fire safety programs include all of the following except:
installation of alarm and fire suppression system
training for employees on how to re.
All of the following are physical threats to information except.docx
1. All of the following are physical threats to information except:
system failures
natural disasters
human error
malicious acts
A company decides to plant bushes with sharp thorns on the
side of their property facing a field. This would be an example
of:
perimeter access control
security planning by environmental design
crime prevention through environmental design
agricultural environmental protection
The risk formula is based on:
threat and vulnerability
vulnerability and countermeasures
2. threat and mitigation
vulnerability and mitigation
A security department at a private hospital that is staffed by
part time security officers would most likely be classified as a
_____ security service organization.
Level IV
Level III
Level II
Level I
The type of information that has special value to organizations
is:
employee handbooks
intellectual capital
intellectual property
account receivable records
3. Which of the following terms is applied to civil cases involving
tort liability when a security officer unreasonably detains an
individual without justification?
malicious prosecution
false imprisonment
false arrest
defamation
Operational plans would include all of the following except:
organization and authority
Mission, Vision, Values
strengths, weaknesses and opportunities
equipment and weapons
The vast majority of security services personnel in the private
sector are employed in:
executive protection
contract watch and guard
investigations
transport and cash management
Risk to an organization includes:
reputation
4. people
customers and clients
equipment
all of the above
The type of malicious event typically used by disgruntled
employees is a:
megabyte
logic bomb
Trojan horse
Countermeasure
The following nation has not adopted "smart card" technology
for credit transactions:
China
England
United States
India
Operationally, an enterprise security risk management system
would be supervised by:
the CEO
5. Chairman of the Board
Chief Security Officer
Chief Financial Officer
The most notable development that occurred after 9.11 for
security services was:
the re-organization of various federal law enforcement agencies
the passage of various anti-crime legislative acts
the merger of state and federal agencies into national homeland
security operations
the takeover of security functions by state governments
the increase of powers given to private security operations
A private employer of security personnel could be held liable
and required to pay damages for the conduct of its employees
based upon:
negligent hiring
negligent training
negligent supervision
all of the above
Honeywell, Siemens, and Simplex are examples of companies
that provide:
executive protection
6. alarm services
contract watch and guard
investigations
cash management
Fire safety programs include all of the following except:
installation of alarm and fire suppression system
training for employees on how to react when an alarm is
sounded
review of building codes for fire safety
reliance on local fire departments for fast and rapid response
The major weakness of most CCTV systems is:
the inability to detect human faces at night
the inability to observe crime activity in progress if there are
multiple sites
the lack of digital imaging in most network systems
the limits on placing cameras in hidden areas
The software technology that enables a criminal to hide data
inside another file is:
Trojan horse
7. worm
steganography
spyware
Governmental powers include all of the following except:
evacuation of people
custodial intervention for people who are a threat to themselves
the use of deadly physical force and to carry firearms
planning for disasters
issuance of motor vehicle summonses
The trial court in the U.S. court system that handles criminal
cases is the:
Supreme Court
Court of Appeals
Court of International Trade
District Court
All of the following contributed to the development of national
security service organizations in the 19th century except:
railroad construction
telegraph and telephone expansion
8. intelligence operations during the civil war
state border control operations
the industrial revolution
A manager who wants to review the agency's missions and goals
for the future would engage in what type of planning:
strategic
operational
short term
emergency
The risk management process is composed of which of the
following correct steps:
assessment, prioritization of assets/risks, mitigation, operations
plan
prioritization of assets/risks, operations planning, assessment,
mitigation
mitigation, assessment, prioritization of assets/risks, mitigation
e. asset evaluation, assessment, mitigation, operations plan
The technology that enables computers to synchronize with data
on PDAs is:
encryption
spyware
9. image master
universal serial bus
The agency mainly responsible for the enforcement of laws and
security on the American frontier during the 19th Century was:
Alcohol, Tobacco and Firearms
Secret Service
Customs
Marshals Service
Rangers
Security equipment consultants must be chosen on which set of
guidelines
cost, track record, reliability, contract need
track record, client satisfaction, cost, government clearance
client satisfaction, service and maintenance, company history,
track record
cost, customer satisfaction, state review, state license
In Gap Analysis, the objective is to reduce
____________between the goal and the present status or state of
affairs.
ambiguity
impediments
10. outcomes
benchmarks
In the prioritization phase, a value must be placed on:
assets and probability or possibilities assigned to threats
countermeasures related to vulnerabilities
the role of liability if a catastrophic event were to occur
profit and loss factors if the business were to shut down
The liability concept concerning whether an employer can be
held liable for the conduct of its employee is known as:
stare decisis
constitutional tort
vicarious liability
common law
Malicious software code that is distributed via the Internet and
that infects computers in a manner that impairs the performance
of programs or destroys data is known as a:
virus
spyware
keylogger
11. steganoid
If a person performing security services is found negligent that
means that he or she:
was reckless
acted intentionally
failed to exercise reasonable care
willfully caused injury
To deal with public area security issues, many cites, shopping
malls, and schools have installed _________________ systems
to increase security.
CCTV
biometric security
Internet communications systems
smart card technology
The category of laws that define legal rights and responsibilities
is:
substantive law
criminal law
procedural law
public law
12. The United States Secret Service was originally formed to deal
with:
terrorists
executive protection
counterfeit money
military intelligence
Legal limitations imposed upon the performance of security
functions usually are found in:
a constitution
administrative regulations
common law traditions
administrative decisions
Which of the following terms describes the identification of
weaknesses in an organization's security:
vulnerability assessment
cost benefit analysis
threat analysis
asset valuation
All of the following are important for the selection and
implementation of countermeasures except:
13. Regular inspections of telecommunications equipment.
Obtaining credible and trusted serve providers for technical
countermeasures.
Performing periodic scans for unauthorized wireless network
devices.
Undertaking the selection of countermeasures based on the
lowest cost.
A global trend is for many American security companies to:
become subsidiaries or major holdings of international security
conglomerates
provide security protection for federal and state agencies
take over investigations involving industrial espionage in
Europe and Asia.
provide training on counter-terrorism issues to private
companies in Europe and Asia
Fusion centers were created to:
provide security services to federal facilities
initiate communications facilities to all federal agencies
gather and distribute intelligence on major crimes and terrorism
for federal, state, and local agencies
monitor Internet transactions between the U.S. and foreign
countries
14. The major issue to determine if security personnel should be
armed is:
the response level of municipal police forces
the level of search and seizure powers for uniformed personnel
the level of emergency response required by the organization
certification requirements by the federal government for
homeland security needs