Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called: The security system Physical security Access control Intrusion detection Question 23 PointsA security scheme that features several rings of protection that in the abstract look like a bull’s eye is called: Ring Protection Attenuated protection Concentric protection Bull’s eye protection Question 33 PointsThe usual starting point in assessing risk at a facility is the: Area in which assets are located Front door Security guard force Perimeter Question 43 PointsA river adjacent to a protected facility is called: Natural barrier An access route A vulnerability A man-made barrier Question 53 PointsThe protective capability of lighting is diminished: When cones of light overlap one another During winter months In the absence of observation by a security officer force When the lamp is fluorescent Question 63 PointsA well-designed and skillfully managed identification system will not require the involvement of guards. True False Question 73 PointsA system that regulates movement into, within, and from a protected area or facility is called: An intrusion detection system An access control system A security system A restricted system  Question 83 PointsThe justification for inspecting vehicles leaving a nuclear power plant is based on the: Safety of the public Dollar value of removable items and materials Philosophy of management Cultural inclinations of the workforce Question 93 PointsFences, lights, sensors, and locks are: Not to be confused with walls, doors, and safes Manufactured by one company when they are to be used for a security purpose Security standards Physical security safeguards Question 103 PointsIt would be a mistake to depend on the technology of an electronic access control system: When the system was purchased from a non-U.S. manufacturer After the system has been operating more than one year And the software that drives it And neglect the human side of the system Question 113 Points. Business fraud usually takes the form of repetitive, incremental thefts. True False Question 123 PointsOne of the most frequently investigated incidents in the business environment is: Embezzlement Fraud Employee theft Bribery  Question 133 PointsA management that wishes to eliminate employee theft should do all of the following EXCEPT: Decide it is unacceptable Do something about it Involve employees in bringing it to an end Grant amnesty once for first-time offenders Question 143 PointsWhich of the following is NOT an indicator of employee theft? Borrowing Living above apparent income level Writing bad checks Speaking out against the company Question 153 PointsAn alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company’s health benefits plan. These circumstances point to a false: Workers’ compensation claim Medical services claim Finding in a civil law suit Invoice Question 163 PointsThe main administrative device for capturing employment and personal references is the: Employment application form Telephone Personal computer Assortment of public records Question 173 PointsPre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to: Filter out persons with learning problems Protect the community at large Reduce costs associated with theft, injury, accidents, and medical assistance benefits Question 183 PointsOne of the reasons employers conduct pre-employment background checks is because: Regular employees expect screening of new employees They wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment d Laws and regulations place a duty on them to maintain a safe and secure working environment Question 193 PointsCertain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions? Are you married? How many children do you have? Where were you born? Do you have any disabilities? Question 203 Points Checking references by mail or e-mail is not as effective as: Checking in person or by phone Reading the job description Talking to the applicant’s potential supervisor Sending a form to the registrar of the college attended by the applicant Question 213 PointsAn organization’s program for fire prevention and response often includes: A floor warden program Written approval of local law enforcement A requirement for an access control system Provisions for dealing with natural disasters  Question 223 PointsA Mutual Aid and Assistance Agreement: Is an agreement in which separate agencies commit to working with one another to deal with major emergencies Does not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergency Is a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA) Question 233 PointsThe Incident Command System (ICS): Is a substitute for the National Incident Management System (NIMS) Is a system for managing a major incident at the-scene Can only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA) Question 243 PointsA fire control team: Is committed to fire incidents only Answers to the senior fire warden Must include security officers Includes maintenance personnel Question 253 PointsAn Emergency Operating Plan (EOP) does all of the following EXCEPT: Assign responsibilities Identify likely incidents Dedicate particular resources Dictate cost-containment  Question 263 PointsThe Business Continuity Plan (BCP) is: Completely separate from the EOP Never a part of an EOP Integral to the EOP Question 273 Points A properly planned and executed BCP: Falls into the exclusive realm of the CSO Is written by the CSO Can be the key in preventing the death of a company Question 283 PointsRecovery follows readiness and precedes: Mitigation Response Restoration Question 293 Points The acronym RTO stands for: Reasonable termination objective Response time overall Recovery time objective Question 303 PointsIT governance is a term related to policies, procedures, and practices.  True False Question 313 PointsThe final decision-maker in the acquisition of a security system to protect information assets belonging to the company is: The chief operations officer The chief executive officer The chief security officer Question 323 PointsThe risk of information loss is present: Except when information is under lock and key When productive use of the information ends When a threat agent has targeted the information  Question 333 PointsWhich of the following is NOT a type of sensitive information? Proprietary business and technical information Personal data concerning applicants, employees, and former employees Information developed for presentation in a company’s annual report