ASIS

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is "CL" and "L/T"

"CL" - Current Liability "L/T" - Long term Liability

What is One of the most important rules of physical surveillance?

"DON'T LOOK THE SUBJECT IN THE EYE"

sensitive investigative reports, such as undercover reports, should be disseminated on a:

"need-to-know" basis

Describe a psychological stress evaluation?

-does not require body attachment -It records and analyzes stress-related components of the human voice -with or without knowledge of individual being tested

How wide can a tornado be?

. The width of a tornado ranges from 200 yards to one mile and travels 5-30 miles along the ground at speeds of 30-70 m.p.h.

What are the three elements a basic emergency plan should be made up of?

1. Authority 2. Types of emergencies 3. Plan execution

What are the 4 basic stages a normal fire proceeds through?

1. Incipient Stage - no smoke at this point 2. Smoldering Stage - smoke begins to appear 3. Flame Stage - actual visible fire 4. Heat Stage - heat is intense and building up

Give two key points about proprietary resources

1. It is better to staff a proprietary investigative unit with personnel who have acquired prior investigative experience 2. The investigator's job should be regarded as an "exempt" job because it is considered to be "professional" to the extent it requires special preparation

What are the 2 types of fire alarms?

1. Local alarms - alerting personnel in building 2. Station alarms - signal is transmitted directly to a monitoring station

Most sprinklers will operate at temperatures between

130 and 165 F

The number of security personnel required to cover a single post around the clock on three eight-hour shifts is

4-1/2 to 5 persons

Describe narcotic antagonists

A class of compounds developed to block and reverse the effects of narcotics

Describe a clear zone around a suspicious object

A clear zone with a radius of at least 300 feet should be established around a suspicious object including the floors above and below

What is the best approach to use in a interview?

A friendly approach is considered to be the most productive in interviews

What is thermal radiation?

A large proportion of energy in a nuclear explosion is emitted in the form of light and heat

What or who is a liaison?

A linking up or connecting of parts of a whole in order to bring about proper coordination of activities.

Where should evidence be placed?

A questioned specimen of writing should be placed in a cellophane envelope and sealed

What are the methods for handling risks?

Accept Eliminate Reduce Transfer (insurance)

What is the difference between an interview and an interrogation?

An "interview" is the questioning of a person who has or is believed to have information of official interest to the investigation Whereas An "interrogation" is the questioning of persons suspected of having committed offenses or of persons who are reluctant to make full disclosure of information in their possession and pertinent to an investigation

What does ALE stand for?

Annual Loss Expectancy

What is the biggest payroll problem?

Biggest problem is "Ghosting" Paying people that don't exist

What are the two budgeting approaches?

Budgeting approaches can be bottom up and top down or top down and bottom up.

What can be used to detect ghosting?

Can use "Pay-out" to detect Ghosting manually paying each employee

What are the two most common causes of a fire?

Carelessness Ignorance

What are motivators based on Fredrick Herzberg's "Motivation-Hygene Theory"?

Challenging assignment, increased responsibility, recognition for work and individual growth

What is the oldest of sleep inducing drugs?

Chloral Hydrate

Water fog is effective in extinguishing what two class fire?

Class "A" and "B" fires

What is the most potent stimulant of natural origin

Cocaine

What is Khat?

Compulsive use may result in manic behavior with grandiose delusions or in a paranoid type of illness, sometimes accompanied by hallucinations.

______________should be done on the same specimen.

Confirming tests

What is the most important countermeasure to bombs?

Control over the entry of personnel and materials

Who is a CPO?

Crime Prevention Officer (CPO) a public servant with police powers

______,_______,__________,_____,______ and MDA are hallucinogens which are synthesized in the laboratory

DOM, DOB, JDA, MDMA, DET

What does crime analysis consist of?

Data Collection Analysis Dissemination Feedback

How should data media be protected and why?

Data media must be protected in specially insulated records containers which protect the contents against temperatures up to 150 F and 80% humidity

What are Benzodiazepines?

Depressants which relieve anxiety, tension and muscle spasms as well as producing sedation and preventing convulsions.

What are the purposes of security tools?

Deter criminal attack Detect attacks that occur Delay attack to allow time for response by authorities Deny access to selected targets

Who developed Theory X and Theory Y?

Douglas McGregor

What are the indirect costs of economic crime ?

Effects on business; Effects on government; and Effect on the public

What is classified as a Class C fire?

Electrical fires

___________ was the most frequently investigated crime by private security

Employee theft

Has little or no effect on white collar crime, embezzlement, and fraud

Environmental Security

List three purposes for budgeting:

Estimate the costs and expected revenues of planned activities Provide a warning mechanism when variances occur in actual numbers Exercise uniformity in fiscal control

Which is more potent Etorphine or Morphine?

Etorphine is more than a thousand times as potent as morphine in it's analgesic, sedative and respiratory depressant effect

What should be done to extinguish a Class B fire?

Extinguish with CO2 or water fog

What should be done to extinguish a Class D fire?

Extinguish with Dry powder

What should be done to extinguish a Class A fire?

Extinguish with Water or water fog

What should be done to extinguish a Class C fire?

Extinguish with non-conductive agent

True or False There is a specific format for the taking of notes required during an investigation

False There is no specific format for the taking of notes required during an investigation

What are the 2 basic types of protection against crime ?

Fidelity and Surety Bonds Burglary, robbery and theft insurance

Dr. Abraham Maslow developed a five-step process which describes man's behavior in terms of the needs he experiences. These needs are:

Food and shelter (basic needs) Safety - such as security, protection and avoidance of harm and risk To belong Ego status - receiving some special recognition Self-actualization, such as being given assignments which are challenging

What is classified as a Class B fire?

Gas, grease oil, volatile fluids

What are the effects of using narcotics?

Generally, there is no loss of motor coordination or slurred speech

Who shares the responsibility for emergency and disaster planning?

Government and industry

What is Hydromorphone?

Highly marketable with a potency two to eight times as great as morphine.

What are the key resources in a company?

Human resources - identification of staffing needs and selection, training, leading, and directing, and retaining of effective personnel Financial resources Administrative resources Operational resources- basic and technology based equipment to complete the mission

How should hair be collected for evidence?

In obtaining known specimens of hair from victim and/or suspect, submit at least 50 hairs from various areas of the head

What is Management by objectives?

In this approach, both subordinate and superior agree on measurable goals to be achieved primarily by the subordinate over a stated period of time

What are the two main approaches used in interrogations?

Indirect approach exploratory in nature Direct approach suspect's guilt is reasonably certain

_________________ is the most frequently exchanged item.

Information

What is the greatest ongoing threat to business?

Internal theft

List the principal fire sensors with reason

Ionization detector - useful in giving early warning. Photoelectric smoke detector - when source of light is interrupted, unit alarms Infrared flame detector - reacts to emissions from flame Thermal detectors - operates on a significant change in temperature

What is codeine?

It is by far the most widely used "natural occurring narcotic".

____________is a classic act of terrorism

Kidnapping

__________is the largest indirect cost of economic crimes for the past 20 years

Liability

Who is a LPO?

Loss Prevention Officer (LPO) private sector individual deriving authority from an employer

How can one define the problem in a risk assessment?

Loss event profile Loss event probability Loss event criticality

Who are receivables?

Money owed by customers

What are payables?

Money owed to vendors

What are the three elements of a theft triangle?

Motivation, and Opportunity, and Rationalization

How can one avoid liability in the screening process?

Notify all to be tested of the screening process. Get consent from persons tested. Provide prior notice to incumbents that testing is a condition of continued employment. Define the circumstances under which testing is done. Insure a positive identification and chain of custody for specimen collection, identification and handling. Limit dissemination of test results. Maintain an Employee Assistance Program. Regularly verify results from test facilities.

What is morphine?

One of the most effective drugs known for the relief of pain.

What is classified as a Class A fire?

Ordinary combustibles (waste paper, rags, and furniture)

What is angel dust?

PCP

Describe A.S.I.S ethics

Perform professional duties observe the precepts of truthfulness, honesty and integrity be faithful and diligent in discharging professional responsibilities competent in discharging responsibilities Safeguard confidential information Not maliciously injure reputation of colleagues

Who introduced Management by objectives?

Peter Drucker

What are the two forms surveillance can take and explain?

Physical - done by humans Technical - done by technical and electronic equipment

What does PML stand for?

Possible Maximum Loss - max loss sustained if a given target is totally destroyed or removed Probable Maximum Loss - amount of loss a target is likely to sustain

What is Meperidine (Pethidine)?

Probably the most widely used drug for the relief of moderate to severe pain

What is the cost of protection measured in?

Protection in depth Delay time

What are the main purposes of a claims report?

Provides a permanent record Provides a summary of all claims Brings together the various parts of the file

How does private security occasionally assists in law enforcement investigations?

Providing u/c operators, surv equip, CCTV, money for rewards, O/T pay

What are the principal tools for interviewing?

Question

What are the five principal crime risk management methods?

Risk Avoidance Risk Reduction Risk Spreading Risk Transfer Risk Acceptance

Budget costs are classified under one of three categories. What are those 3 categories?

Salary expenses - Sundry expenses - all ongoing non-salary expenses capital expenses - for physical improvements, physical additions or major expenditures for hardware. Generally considered one time expenses

What is the primary purpose of security?

Security provides protection services for the organization. The protective service of prevention is a primary service provided

"possibility of frequent lightning and/or damaging winds of greater than 50 m.p.h., hail and heavy rain." What does the above describe

Severe thunderstorm

"possibility of tornadoes, thunderstorms, frequent lightning, hail and winds greater than 75 m.p.h." What does the above describe

Severe thunderstorm watch

What techniques most commonly used during an interrogation?

Sympathetic Logic and reasoning

What is a tidal wave ?

TSUNAMI

Typically when does a strike occur

The "unfair labor practice strike" can occur suddenly with little or no effective planning

How often should the Vital Records Protection Plan be tested?

The Vital Records Protection Plan should be tested at least once a year

What is bombing classified as ?

The most common of all terrorist tactics

What is the most difficult type of surveillance?

The most difficult type of surveillance is the "moving surveillance." This entails following the subject wherever he goes

Explain how alcohol can be considered as it relates to substance abuse

The most used and abused recreational drug. Physical dependence can occur if alcohol is taken regularly in large quantities.

Carry budget out in three dimensions

The operation/project must unfold as planned The operation/project must take place when planned It will not exceed the planned costs.

In the act of terrorism, what could render the payer civilly liable ?

The payment of ransom or complying with any criminal demand, without company approval

Who is most likely to become an alcoholic?

The person most likely to become an alcoholic is a white male over 40 who is living alone

What is the main source of non-synthetic narcotics?

The poppy (papaver somnifferum)

What is risk assessment?

The possibility and probability of a risk resulting in loss depends on the risk itself and the preventative measures taken

What is tempest?

The practice of preventing unauthorized persons from gaining intelligence information by analyzing electromagnetic emanations from electronic equipment such as computers

What is the purpose of Vital Records Protection Plan?

The tests of Vital Records Program should verify that vital records needed after a disaster are: a. Current b. Protected sufficiently against natural disasters, nuclear detonation and other perils c. Retrievable as needed in usable form

What are Etorphine and Diprenorphine made from?

Thebaine

Which drug can be converted into a variety of medical compounds including codeine?

Thebaine

Why must a community based emergency control center be established ?

To coordinate all efforts in a major emergency

What is the purpose for internal auditing?

To insure correctness and accuracy of accounting records Not to detect theft and fraud More losses due to accounting errors than by theft

Which budgeting approach is preferred ?

Top down and bottom up

True or False An oral confession, as well as one which is not signed, still has legal value

True

True or False Initial positives are confirmed before any personnel action is taken.

True

_____________ cause 85% of all accidents

Unsafe acts

________________ cause the remaining 15%

Unsafe conditions

Why is external auditing needed?

Valuable because the persons conducting the audit do not know your business / company

Give an example of functional authority

When security managers exercise authority delegated by a senior executive to whom they report, such authority

___________________communication is the best means to communicate

Written

What is tolerance?

a body condition wherein ever-increasing amounts of a drug are needed to gain the desired effect

What is unity of command?

a management concept which means that an employee should have only one immediate superior to whom the employee should report

What is risk analysis?

a management method used to minimize risks through application of security measures commensurate with the threat

What is span of control?

a management term which refers to the number of personnel over which one can effectively supervise

What is chain of command?

a management term which refers to the path along which authority flows

What is a budget?

a plan stated in financial terms. It sets forth in dollars the necessary allocation of funds to achieve the plan

Who should make the decision to evacuate a building upon the receipt of a bomb threat ?

a senior member of management

What is a drug?

a substance which, because of its chemical make-up, alters the mood, perception or consciousness of the user. All drugs are not illegal

In non-entry level recruiting, the recommended technique is: a. "Blind ad" b. Open advertisement in newspaper c. Advertisement in trade journal d. By word of mouth on selective basis

a. "Blind ad"

Vital records normally constitute the following percentage of the company's total records: a. 2% b. 5% c. 10% d. 15%

a. 2%

Of all reported bomb threats, it is estimated that the percentage of real threats is: a. 2-5% b. 7-10% c. 15% d. Less than 1%

a. 2-5%

As a general rule the number of consecutive years of employment or non-employment to be verified preceding the date of investigation are: a. 5 years b. 7 years c. 3 years d. 2 years

a. 5 years

A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : a. A bug b. A wiretap c. A tempest d. A beeper

a. A bug

Which of the following statements is incorrect with regard to an information security program? a. A good information security program will provide absolute protection against an enemy spy b. The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it c. A trust relationship must be established and maintained with employees d. The good will and compliance of employees is crucial for success

a. A good information security program will provide absolute protection against an enemy spy

Which of the following is not true with regard to electronic eavesdropping: a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment c. All wiring should be traced out and accounted for in a countermeasures survey d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line

In a strike, the refusal by management to allow members of the bargaining unit on the premises is called: a. A lockout b. Shutout c. Lock in d. Permissive picketing

a. A lockout

Effective protection of this vital information in a data environment is complicated for a number of reasons. Which of the following is incorrect in this regard: a. A nuclear detonation produces an electro-magnetic pulse (EMP) which could cause considerable damage. However well tested EMP protective devices are available (wrong) b. Formerly dispersed information is consolidated, which intensifies its exposure to possible destruction or compromise c. The data processing medium is extremely vulnerable to a wide variety of perils such as fire, water, dirt and hazardous chemical gases d. Both the computer and the area in which it is located must be protected along with the vital information

a. A nuclear detonation produces an electro-magnetic pulse (EMP) which could cause considerable damage. However well tested EMP protective devices are available (wrong)

Which of the following is not true concerning a witness: a. A witness must have directly observed the incident b. A person who heard the accused make certain remarks may be a witness c. Provide information for personnel action d. A person with knowledge of the whereabouts of the accused at the time of the incident may be a witness

a. A witness must have directly observed the incident

What are the behavioral characteristics are associated with substance abuse?

a. Abrupt changes in attendance, quality of work grades and work output b. Attitude changes c. Withdrawal from responsibility d. Breakdown in personal appearance e. Wearing sunglasses at inappropriate times f. Wears long-sleeved garments to hide needle marks g. Association with known substance abusers h. Excessive borrowing of money I. Stealing small items from home, work or school j. Secretive habits

Written statements used in recording investigative facts are primarily of the following types. Which are

a. Affidavit b. Question/answer statement c. Unsworn statements d. Memorandum of interview

Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: a. Alert senior management to marketplace changes in order to prevent surprise b. Alert senior management as to the personal habits of competitive senior management c. Alert government intelligence agencies to marketplace changes d. Alert senior management to changes in protocol in foreign countries

a. Alert senior management to marketplace changes in order to prevent surprise

List the purposes of emergency planning

a. Anticipate the emergency b. Provide action during the emergency; and c. Return to normal operations

A trade secret is: a. Any formula, pattern, device or compilation of information which is used in one's business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it b. All information about a company which the company desires to protect c. Information of a company which is registered as such with the Patent Office d. Information so designated by the government

a. Any formula, pattern, device or compilation of information which is used in one's business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it

In an incident investigation, the general rule is to first interview persons who: a. Are not likely to be available for later interview b. Are likely to be hostile c. Have the most extensive information about the incident d. Are familiar with some part of the subject matter

a. Are not likely to be available for later interview

What are the 3 main theories of organizational behavior?

a. Autocratic theory b. Custodial theory c. Supportive theory

Questioning an employee should be: a. Behind a closed door b. With the door open c. Closed and locked door d. At a police station

a. Behind a closed door

What are some examples of depressants

a. Chloral Hydrate b. Barbiturates c. Benzodiazepines

What are the types of crime scene searches?

a. Circle search b. Strip search c. Grid search d. Zone or sector search

One of the following is not considered an element of the common law crime or arson: a. Commercial building b. Malicious c. Burning d. Willful

a. Commercial building

In conducting gambling investigations, the staff investigator should: a. Cooperate with local, county, state or federal law enforcement b. Not use undercover operatives c. Wiretap the employees home telephone d. Search the lockers of all suspects

a. Cooperate with local, county, state or federal law enforcement

What are the 3 principles of disaster control planning?

a. Coordinated planning; b. Mutual assistance; and c. Community resources

In investigating homicide and suicide the best source would probably be: a. County coroner's office b. Health office c. State attorney general's office d. Federal law enforcement

a. County coroner's office

What is the most frequently investigated crime by private security? a. Employee theft b. Shoplifting c. Bad checks d. Embezzlement

a. Employee theft

What are the major factors in assessing the vulnerability of individual facilities?

a. Environment b. Indigenous c. Economic

What are the 4 legs of a fire?

a. Heat b. Fuel c. Oxygen, and a d. Chemical reaction

You are charged with the responsibility for formulating a disaster plan to handle emergencies which arise as a result of earthquakes. Which of the following warnings to be issued to employees as to their actions during the shaking should not be included in the plan? a. If employees are outside, proceed to the nearest building and head for the basement b. If employees are indoors at the time of the shaking, they should stay there c. If inside, take cover under sturdy furniture d. If inside, stay near center of building

a. If employees are outside, proceed to the nearest building and head for the basement

Which of the following is not recommended action with regard to survival of earthquakes: a. If outside, immediately go inside b. Keep calm c. Douse all fires d. Keep away from utility wires

a. If outside, immediately go inside

Probably the main reason for loss of sensitive information is: a. Inadvertent disclosure b. Deliberately stolen by outsider c. Industrial espionage d. Deliberately stolen by insider

a. Inadvertent disclosure

The single most important administrative control in handling investigations is: a. Indexing b. Case assignment c. Case review d. Documentation of status

a. Indexing

The unauthorized acquisition of sensitive information is known as: a. Industrial espionage b. Embezzlement c. Larceny d. False pretenses

a. Industrial espionage

What are the 3 most frequently used investigative techniques ?

a. Informants b. Surveillance c. Undercover

The ionization fire detector warns of fire by responding to: a. Invisible products of combustion emitted by a fire at its earliest stages - incipient stage b. Infrared emissions from flames c. Light changes d. Smoke

a. Invisible products of combustion emitted by a fire at its earliest stages - incipient stage

Which of the following statements does not pertain to cocaine ? a. It has a medical use as a sedative b. There is a possibility that sustained use could result in physical dependence c. There is a high possibility that sustained use could result in psychological dependence d. Tolerance is a distinct possibility

a. It has a medical use as a sedative

What are examples of hallucinogenic drugs?

a. LSD b. Mescaline and peyote c. Phencyclidine (PCP) d. Amphetamine Variants (such as DOM and DOB)

The likelihood or probability of risks affecting the assets becoming actual loss events is known as: a. Loss event probability b. Loss event profile c. Threat analysis control d. Threat target control

a. Loss event probability

The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives for behavior is known as: a. Maslow's "Hierarchy of Prepotency" b. McGregor"s Theory X c. McGregor"s Theory Y d. Herzberg's Two Factor Theory

a. Maslow's "Hierarchy of Prepotency"

Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as: a. McGregor's "Theory Y" b. McGregor's "Theory X" c. The supportive theory d. The motivation theory

a. McGregor's "Theory Y"

What are some frequently cited measures for improving private security ?

a. More or better training b. Mandated training c. Improved selection process d. Higher wages e. Establishment or improvement of licensing and regulation

Which of the following is not a high explosive? a. Nitrocellulose b. Nitroglycerin c. Dynamite d. Nitro starch

a. Nitrocellulose

Who are the persons notified if a bomb threat received? (in order)

a. Persons responsible for search and evacuation b. Local authorities c. Explosive demolition teams; and d. Medical facilities

What are the 2 major types of surveillance?

a. Physical b. Technical

What are the values of an emergency plan? (7 items)

a. Provides a written record and means of communicating information throughout the organization b. Assures that all procedures fit into an integrated plan c. Promotes uniformity d. Assures a permanent record of decisions and acquired knowledge e. Provides a means of orientation of new employees into emergency responsibilities f. Permits management to delegate specific authorities g. Presents a public relations medium for communicate to employees, customers and stockholders

Any investigation which includes unfavorable information, or which results in an adverse employment decision, should be: a. Retained in file for a minimum of three years b. Retained in file for a minimum of five years c. Retained in file for one year d. Destroyed when the employment decision is made

a. Retained in file for a minimum of three years

Two problems in police and security relationships which seem to have the greatest intensity of feelings are

a. Secondary employment or moonlighting by police officers in private security b. Police response to activated alarms which are largely false

Which of the following is generally not true in regard to proprietary information? a. Secret information does not have to be specifically identifiable b. Secret information must be such that it can be effectively protected c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information d. It is difficult to protect as a trade secret that which can be found in publicly accessible sources

a. Secret information does not have to be specifically identifiable

A critical on-site examination and analysis of an industrial plant business, home or public or private institution to ascertain the present security status, to identify deficiencies or excesses to determine the protection needed to make recommendations to improve the overall security is the definition of : a. Security survey b. Risk analysis c. Full-field inspection d. Crime prevention assessment

a. Security survey

What are the by products of a fire?

a. Smoke b. Gas c. Heat d. Expanded air

A key role in any emergency will be played by the plant manager or in his place, such authorized official as emergency coordinator or security chief. Which of the following should not be done personally by this official a. Take personal charge off all operations at the disaster scene b. Activate the plant center c. Alert and inform head of local government emergency coordinator d. Brief plant control center staff on the emergency

a. Take personal charge off all operations at the disaster scene

The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed: a. Tempest b. Veiling c. Bugging d. Hardening

a. Tempest

The rule which states that approximately one in ten applications will have major omissions which will require going back to the applicant is called: a. The Rule of Ten b. The Rule of Nine c. The 1-10 Rule d. The Verification Rule

a. The Rule of Ten

A full evacuation of a building should be ordered upon receipt of a bomb threat when: a. The caller is credible and refuses to name a specific bomb location b. Any threat is received c. Threat is received during working hours d. The caller has a foreign accent

a. The caller is credible and refuses to name a specific bomb location

If interviewee during investigations is hostile, it is preferable to conduct the interview at: a. The security office b. Home of the interviewee c. A neutral spot d. In an automobile

a. The security office

Discipline is primarily the responsibility of: a. The supervisor b. The employee c. The security manager or director d. The inspection division

a. The supervisor

With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when: a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information b. The trade secret was not registered c. The trade secret did not involve national defense information d. The trade secret was not in current use

a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information

What are the 6 main causes of death in a building fire?

a. Toxic gases b. Smoke c. High temperatures d. CO2 e. Fear and resultant actions f. The fire itself

Which of the following is known to be one of the disadvantages of contract security services? a. Turnover b. Cost c. Manpower resource d. Skills

a. Turnover

The persons who find integrity tests offensive are: a. Twice as likely to admit to criminal or drug abuse behavior b. No more likely than anyone else to admit to criminal or drug abuse behavior c. Sensitive persons who should not be required to take the test d. Usually found to have a violent criminal past

a. Twice as likely to admit to criminal or drug abuse behavior

An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is : a. Unity of command b. Supervisory limits c. Span of control d. Line of discipline

a. Unity of command

In the organizational structure of proprietary firms, security may provide both line and staff functions. What are line and staff functions?

a. When advising senior executives, the security manager performs "staff" duties b. In security operations, the security manager carries out "line" duties As a general rule, "line" duties are considered to be operational in nature and "staff" duties are of a support nature

What qualifies someone to being a good undercover investigator?

a. Willingness to do the job b. Self-confidence c. Resourcefulness and adaptability d. Initiative and judgment e. Patience

Earthquake emergency plans should stress safest place during a quake is: a. Within work area under pre-selected cover b. At work in open spaces away from building c. At home d. In a building made of concrete

a. Within work area under pre-selected cover

What is Natural Surveillance as per Defensible Space by Oscar Newman ?

ability of inhabitants of particular territory to casually and continually observe public areas.

The ____________________ department of a company is the most vulnerable to major loss due to crime

accounting

What is Crime prevention through environmental design (CPTED)?

advocates that the proper design and effective use of the building environment leads to a reduction in crime and in the fear of crime.

What is the most abused drug?

alcohol and the most used "drug" also alcohol

The emergency plan must be distributed to __________________________

all personnel with responsibility for action

What is classified as a heavy snow warning?

an expected snowfall of 4 inches or more in a 12-hour period or 6 inches or more in a 24-hour period

What are designer drugs?

analogues of controlled substances with slight variations in their chemical structure so as not to be specifically listed as a controlled substance

How often is an emergency plan at least to be tested?

annually

Budgets are normally prepared___________ or _________

annually or biannually

When "depressant" drugs are used to obtain a "high" they are usually taken in conjunction with

another drug, such as alcohol

What are examples of stimulants?

are cocaine and amphetamines The two most prevalent stimulants are nicotine and caffeine, both accepted in our culture

Give examples of synthetic narcotics produced entirely within the laboratory

are meperidine and methadone

What are the two most prevalent stimulants?

are nicotine in tobacco and caffeine

What are Halogenated agents (1211, 1302)?

are non-corrosive chemical agents used for extinguishing fires in areas containing computers and electrical equipment

What are Vital records ?

are those necessary to insure the survival of the business

Who are line executives?

are those who are delegated chain of command authority to accomplish specific objectives in the organization.

What are control questions?

are used in polygraph examinations to determine whether the person is a suitable subject for the polygraph test and whether capable of producing a specific physical response

What are tornadoes?

are violent local storms with whirling winds that can reach 200 - 400 m.p.h

What are the two most important expensive items in the budget of an investigations unit ?

are: Personnel costs Communications cost

What is territoriality as per Defensible Space by Oscar Newman ?

attitude of maintaining perceived boundaries. Outsider quietly recognized, observed.

Those in management who believe the behavioral assumption of "Theory X" take an __________________ approach to get work done.

autocratic approach

The investigator's best approach to questioning relies on the following: a. Most suspects will lie or circumvent the truth b. A suspect is innocent until proven guilty c. A key suspect is guilty and evidence must be found to substantiate that feeling d. A signed statement in the form of a confession must be obtained

b. A suspect is innocent until proven guilty

The state of periodic or chronic intoxication produced by the repeated consumption of a substance is known as: a. Tolerance b. Addiction c. Habituation d. Drug dependence

b. Addiction

The president of the ZYX Company expresses concern relative to the company's ability to act in time of emergency to protect life and property. He instructs that you undertake the necessary action to establish the desired emergency capability within the facility. Which of the following should be the first step in initiating this action? a. Contact established guard companies to make bids to oversee the operations b. An emergency coordinator should be appointed at the corporate level c. Make a physical survey of the plant d. Form a committee of key executives to operate out of the command center

b. An emergency coordinator should be appointed at the corporate level

The primary tool of pre-employment screening is the: a. Interview b. Application form c. The investigation d. The investigator

b. Application form

One of the objectives of an undercover investigation is not to: a. Establish a method of diversion of goods b. Ascertain the level of organized labor activity in the work force c. Provide information for personnel action d. Obtain evidence of past or future crime

b. Ascertain the level of organized labor activity in the work force

In the event the media makes contact as a result of a crisis situation, they should: a. Be given "no comment" b. Be put in touch with person designated in the emergency plan for orderly release of information c. Be put in contact with the president of the company d. Be put in contact with the plant manager

b. Be put in touch with person designated in the emergency plan for orderly release of information

A line item budget is the traditional and most frequently used method of budgeting. Two other commonly used budgeting techniques include: a. Management and program budgets b. Capital and program budgets c. Program and exception item budgets d. Fund allocation and capital budgets

b. Capital and program budgets

In forming an industrial mutual aid association, a number of definitive plans must be made. Which of the following is not true and should not be relied upon in formulating these plans? a. Each member firm must be willing to defray Industrial Mutual Aid Association expenses b. Capital outlay and operating costs are usually modest c. The basic operating element of a mutual aid association is an operating board d. Any industrial mutual aid association should be established in advance of emergencies

b. Capital outlay and operating costs are usually modest

Which of the following is not suggested behavior for the victim of a kidnapping? a. Stay calm b. Do not cooperate with captors c. Do not try to escape unless good chance of success d. Try to remember events

b. Do not cooperate with captors

The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by: a. Abraham Maslow b. Douglas McGregor c. Warren Bennis d. B.F. Skinner

b. Douglas McGregor

A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as: a. Carbon microphone b. Dynamic microphone c. Contact microphone d. Parabolic microphone

b. Dynamic microphone

Which of the following is not recommended policy with regard to security manuals? a. It must be updated on a regular basis b. Employees should not be allowed to have possession of it c. The manual should be put in the hands of all regular security personnel d. It should include procedural instructions for specific incidents

b. Employees should not be allowed to have possession of it

Perhaps the most common shortcoming in the security industry is: a. Lack of support by top management b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training) c. Lack of planning d. Lack of monetary resources

b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training)

Many experts agree that the most important deterrent to internal theft is: a. Threat of dismissal b. Fear of discovery c. Threat of prosecution d. Conscience pangs

b. Fear of discovery

Bonds which require that an employee be investigated by the bonding company to limit the risk of dishonesty, and if that trust is violated, the insurance company must indemnify the employer, are called: a. Surety Bonds b. Fidelity Bonds c. Insurance Bonds d. Blanket Bonds

b. Fidelity Bonds

The effects of illusions and hallucinations with poor perception of time and distance possibly indicates the use of which of the following substances ? a. Cannabis b. Hallucinogen c. Stimulants d. Depressants

b. Hallucinogen

Completed background investigations: a. If apparently completed favorable, may be reviewed by an investigative clerk b. If apparently completed favorable or containing unfavorable information, are reviewed by a responsible supervisory security employee c. If containing unfavorable information, should be immediately referred to legal counsel d. Should be reviewed jointly by the Human Relations Director and the Security Director

b. If apparently completed favorable or containing unfavorable information, are reviewed by a responsible supervisory security employee

The ability of design to counteract the perception that the area is isolated and criminally vulnerable is known as: a. Natural Surveillance Techniques b. Image and Milieu c. Soft Area Protection d. Territorial Cleansing

b. Image and Milieu

Interviews should be conducted: a. In the company of the suspect's attorney b. In an area where distractions are minimal c. In a comfortable room which is well furnished like home d. In an area where light is focused in suspect's face

b. In an area where distractions are minimal

Which of the following is not a basic requirement for handling pre-employment interviews: a. Interview must be voluntary b. Interviews to be effective should be conducted with a friend of applicant present c. Interview must be unbiased d. Interviewer should not give out information

b. Interviews to be effective should be conducted with a friend of applicant present

Which of the following should not be applicable to the development of an effective emergency disaster plan: a. Plan should be written b. It should involve the minimum number of people possible in the preparation of the plan c. It should contain an inventory of available resources d. It should list preventative measures

b. It should involve the minimum number of people possible in the preparation of the plan

All of the following are hallucinogens except: a. LSD b. Marihuana (it is also a hallucinogen) c. Mescaline d. Phencyclidine

b. Marihuana (it is also a hallucinogen)

At the time of a strike, if no guard force is available, the following action should be taken: a. Immediately hire one b. Mobilize supervisory personnel into a patrol group c. Have police come on property to act as security force d. Have maintenance employees trained to act as guards

b. Mobilize supervisory personnel into a patrol group

A cooperative organization of industrial firms, business firms, and similar organizations within an industrial community that are united by a voluntary agreement to assist each other by providing materials, equipment and personnel needed to ensure effective industrial disaster control during emergencies is called: a. Emergency Squads b. Mutual Aid Association c. Community Emergency Cooperatives d. Disaster Control Squads

b. Mutual Aid Association

In devising plans to protect vital records during an emergency, a prime decision to make would be the identification of vital records. Whether such records are vital depends, to a large extent, upon the type of business conducted. However, as a general rule, all of the following would be considered vital to any corporate organization except: a. The incorporation papers b. Personal identification fingerprints of employees c. The by-laws of the corporation d. The stock record books e. B of Dir minutes and certain corporate fin records

b. Personal identification fingerprints of employees

Of all security processes, the most critical is: a. Information b. Personnel c. Physical d. Perimeter

b. Personnel

The most frequently shared resource between law enforcement and private security is: a. CCTV and other surveillance equipment b. Personnel c. "Buy money" for stolen goods d. Reward money

b. Personnel

In issuing policy statements regarding the handling of disturbed persons, the primary consideration is: a. Legal liability to the disturbed b. Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger c. Legal liability to employees and third persons if restraint not achieved d. Employee-community public relations

b. Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger

The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: a. Time Domain Reflectometer b. Remote Maintenance Access Terminal c. Current Carrier Signaling Port d. Internal and Remote Signal Port

b. Remote Maintenance Access Terminal

The process of determining the probability and cost of potential loss is known as: a. Probability analysis b. Risk assessment c. Potential loss analysis d. Physical survey

b. Risk assessment

The concept that an individual should be aware of the security program and persuaded that the program is relevant to his or her own behavior is known as: a. Security consciousness b. Security awareness c. Security motivation d. Motivation analysis

b. Security awareness

Training sessions consisting of a security awareness program for new employees should be conducted by: a. Special training officers b. Security personnel c. Consultants skilled in training d. Member of management

b. Security personnel

The process whereby communications are intercepted or recorded is known as: a. Physical surveillance b. Technical surveillance c. Surreptitious surveillance d. Black bag operations

b. Technical surveillance

Which of the following is not true regarding communications with an undercover agent: a. Normal contact is initiated by the agent b. The contact telephone should be answered with the name of the company c. An alternate contact telephone number should be established d. The telephones should be reserved exclusively for investigations

b. The contact telephone should be answered with the name of the company

The fire detector which responds to changes or interruption in the light source is known as: a. The ionization detector b. The photoelectric smoke detector c. The infrared flame detector d. The thermal detector

b. The photoelectric smoke detector

Which of the following statements is incorrect in selecting records to be included in a vital records program: a. Management should protect vital records by systematically determining what information is vital b. The vital records protection program is an administrative device for preserving existing records c. If a particular record does not contain vital information, it has no place in the company's vital records protection program -even though having other value to the company d. Decision making in determining individual vital records should be rapid. A record either contains vital information or it does not

b. The vital records protection program is an administrative device for preserving existing records

Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as: a. The supportive theory b. The work motivation theory c. The custodial theory d. McGregor's "Theory X"

b. The work motivation theory

According to estimates, about 1/3 of all business failures are caused by: a. Thefts by outsiders (non-employees) b. Thefts by employees c. Mismanagement d. Poor quality of product

b. Thefts by employees

The main objective of private security is: a. To apprehend those who steal property from their firms b. To protect assets and prevent losses c. To assist police in investigations of crimes d. To prevent unauthorized persons entry on firm's property

b. To protect assets and prevent losses

Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: a. Microwaves b. Ultrasonic c. High frequency d. Short-wave

b. Ultrasonic

What was the most frequent recommendation made by both law enforcement and security managers to improve private security and their working relationships with police? a. Higher entry-level pay b. Upgrading quality of security personnel c. A planned educational program involving both police and private security d. Requirement of being armed

b. Upgrading quality of security personnel

Why do experts feel that the reason a person steals the first time?

because the "opportunity" was present

What kind of dependency can depressants cause?

both physical and psychological dependence

Any investigation containing unfavorable information should be retained in file for a period of not less than: a. 1 year b. 5 years c. 3 years d. 2 years

c. 3 years

Any formula, pattern, device or compilation of information which is used in one's business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: a. A monopoly b. An unfair trade practice c. A trade secret d. A patent

c. A trade secret

An employer may not question an applicant on which of the following: a. Unexplained gaps in the employment history b. Unsatisfactory interview c. An arrest for a crime against property d. A conviction for a crime against property

c. An arrest for a crime against property

The basic principle of personnel security is: a. To weed out bad apples among employees after they are located b. Education is the key to loss prevention c. Attitudes and honesty of rank and file employees are key to minimizing theft losses d. Terminate undesirables

c. Attitudes and honesty of rank and file employees are key to minimizing theft losses

In conducting interviews during a background investigation, the investigator should more appropriately tell the person being interviewed that the employee is: a. Being considered for a promotion b. Suspected of wrongdoing c. Being investigated in connection with a position of trust d. Tell the interviewee nothing

c. Being investigated in connection with a position of trust

The term "eavesdropping" refers to: a. Wiretapping only b. "Bugging" only c. Both wiretapping and "bugging" d. Mail covers

c. Both wiretapping and "bugging"

To obtain information concerning marriage licenses an investigator would contact the: a. Appropriate health department b. Tax bureau c. Bureau of Vital Statistics d. Appropriate court

c. Bureau of Vital Statistics

A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: a. Carbon microphone b. Dynamic microphone c. Contact microphone d. Parabolic microphone

c. Contact microphone

A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as: a. Parabolic microphone b. Special audio microphone c. Contact microphone d. Surreptitious microphone

c. Contact microphone

It is generally accepted that insurance rates are dependent upon two primary variables. These are: a. Cost of claims and competitors rates b. Competition among insurance companies and frequency of claims c. Cost of claims and frequency of claims d. Cost of claims and government regulations

c. Cost of claims and frequency of claims

A key element in focusing the use of police and security resources to address crime problems is commonly called: a. Data collection and analysis b. Systematic evaluation of data available c. Crime analysis d. Analysis and feedback

c. Crime analysis

Oscar Neuman published a classic in which he presented ideas and applied strategies from the New York public housing project to aid in reducing the risk of being victimized and reducing fear of crime when on the streets. What is the name of this book? a. Crime Prevention b. Crime Reduction c. Defensible Space d. Crime in Architectural Planning

c. Defensible Space

Which of the following procedures should not be advocated as part of emergency planning? a. Emergency plan should be in writing b. Emergency plan should be revisited as needed c. Distribution should be limited to senior management d. Plan should be tested through practice

c. Distribution should be limited to senior management

In designing a proprietary information protection program, the area of greatest vulnerability is: a. Personnel files b. Marketing data c. Employees d. Computers

c. Employees

While protection of people is the first priority in emergency planning, shutdown procedures must be thorough and done by those who are trained to do so. Your disaster plans should have such shutdown procedures assigned to: a. The security force b. The plant manager c. Employees on each shift who handle these procedures on a regular basis d. The fire brigade

c. Employees on each shift who handle these procedures on a regular basis

The class of person under a duty to safeguard a proprietary secret is known as: a. Agents b. Principals c. Fiduciaries d. Business Associates

c. Fiduciaries

The greatest single destroyer of property is: a. Bombs b. Sabotage c. Fire d. Earthquakes

c. Fire

A subject who has a sixth grade education has a statement typed for him by the investigator. Which of the following should not be included in the typed statement: a. Profanity used by the subject b. The actual sentences spoken by the subject c. Highly complex sentences and large words d. References to witnesses to the incident

c. Highly complex sentences and large words

The greatest ongoing threat to any business is: a. Shoplifting b. Shrinkage c. Internal Theft d. Pilferage

c. Internal Theft

The heart of personnel selection is: a. Polygraph test b. Review of application c. Interview d. Background investigation

c. Interview

Impelling type of leadership tends to reduce employee dishonesty because: a. It sets a good example b. It creates discipline c. It reduces employee frustration d. It improves morale

c. It reduces employee frustration

Which of the following characteristics does not pertain to morphine? a. It is the principal constituent of opium b. Its legal use is restricted primarily to hospitals c. It tastes sweet and is marketed in the form of yellow crystals d. Tolerance and dependence develop rapidly

c. It tastes sweet and is marketed in the form of yellow crystals

The impact or effect on the enterprise if the loss occurs is known as: a. Loss event profile b. Loss event probability c. Loss event criticality d. Security survey analysis

c. Loss event criticality

Spotting the individual loss events that might take place is the primary step in dealing with security vulnerability. This process is called a. Loss event probability b. Threat assessment process c. Loss event profile d. Actual threat analysis

c. Loss event profile

A microphone with a large disk-like attachment used for listening to audio from great distances is known as: a. Contact microphone b. Spike microphone c. Parabolic microphone d. Moving coil microphone

c. Parabolic microphone

In conducting a "claim" investigation where the claim is a serious one and where there is cause for doubt in connection with the loss or claim, the type of investigation to be used is: a. Telephone b. Mail c. Personal contact d. Undercover

c. Personal contact

As a rule, which department of the company administers the recruiting activity? a. The security department b. Administrative department c. Personnel department d. Internal affairs

c. Personnel department

The most consistently available and most valuable sources of information are: a. Documents at the scene b. Fingerprints on the objects involved c. Persons involved in the incident d. Telephone records of calls into and out of the area

c. Persons involved in the incident

The activity concerned with proposals for the future, an analysis of these proposals and method for achieving them is known as: a. Effective Management b. Evaluation Techniques c. Planning d. Budgeting

c. Planning

The keys to the success of any emergency organization and plan are training and testing. In designing effective testing procedures, the following are all valid observations except: a. Records should be maintained so deficiencies can be corrected following the test b. The testing exercise should be as realistic as possible c. Plenty of advance notice should be given so all possible preparations can be made d. One of the best times to test the plant emergency plan is in coordination with your local government periodic test exercises

c. Plenty of advance notice should be given so all possible preparations can be made

The removal of any suspected bomb should be by: a. Proprietary guard force b. Office employees c. Professional bomb-disposal personnel d. The patrol office of the city police department

c. Professional bomb-disposal personnel

In order to adequately plan for emergencies, the security manager must make certain that this corporation has access to all necessary resources that will save lives, minimize damages, and insure the continued operation of rapid restoration of damaged member plants. Most plants assure access to such resources by: a. Providing for a budget which will supply all the resources needed to cope with a major emergency b. Establishing appropriate liaison with the police, fire, rescue and medical forces of the community to provide services as needed c. Relying upon their own self-help organization and equipment and joining hands with other plants in the community for mutual aid

c. Relying upon their own self-help organization and equipment and joining hands with other plants in the community for mutual aid

After a bomb threat is made, if suspicious object is found during search, it should be: a. Handled with great care b. Disarmed immediately c. Reported immediately to the designated authorities d. Placed in a bucket of water

c. Reported immediately to the designated authorities

Cannabis products are usually taken: a. Through sniffing b. Injection c. Smoking d. By rubbing into the skin

c. Smoking

One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called: a. Unity of command b. Supervisory limits c. Span of control d. Line of discipline

c. Span of control

Protection for a corporation, if there is a failure to perform specified acts within a certain period of time, is known as a: a. Contract Bond b. Blanket Bond c. Surety Bond d. Fiduciary Bond

c. Surety Bond

Which of the following investigative resources should not normally be used in a gambling investigation conducted by a proprietary investigative force a. Closed circuit TV cameras b. Undercover operatives c. Telephone surveillance d. Fluorescent powder

c. Telephone surveillance

Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment? a. A current carrier device b. Pneumatic cavity shielding c. Tempest shielding d. Pen register shielding

c. Tempest shielding

Earthquakes constitute a definite concern to the emergency management responsibilities of security managers in certain areas of the country. Accordingly, it is incumbent upon our security professionals to have a clear understanding of the basic facts concerning earthquakes. Which of the following is an incorrect statement? a. Earthquakes are unpredictable and strike without warning b. Earthquakes may last from a few seconds to as much as 5 minutes c. The actual movement of the ground in an earthquake is usually the direct cause of injury or death ( Falling materials is cause)

c. The actual movement of the ground in an earthquake is usually the direct cause of injury or death ( Falling materials is cause)

The major item conspicuously absent from police-based crime prevention programs was: a. Comprehensive training program b. Manpower dedicated to crime prevention concepts c. The input of huge number of persons employed in private security d. Use of up-dated technology

c. The input of huge number of persons employed in private security

Responsibility for shutdown of machines in the plant as a result of disaster should be assigned to: a. The security officers on duty b. The maintenance persons on duty c. The persons familiar with the shutdown process d. The plant manager

c. The persons familiar with the shutdown process

In establishing a disaster plan, provision should be incorporated which would permit you to be prepared for a variety of emergency situations. Which of the following probably would not have a key role in such plans? a. Employee welfare service b. Rescue teams c. The recreational coordinator d. Radiological Defense Service

c. The recreational coordinator

Ideally, the person who should conduct the inspection of a security department is: a. An outside consultant b. The second ranking person c. The security director or security manager d. The ranking sergeant

c. The security director or security manager

Social engineering" is: a. The conversation involved in the beginning of a romantic relationship b. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity c. The subtle elicitation of information without revealing the true purpose of the call d. The specific design of a business structure to facilitate the interaction of the inhabitants

c. The subtle elicitation of information without revealing the true purpose of the call

Which of the following characteristics do not pertain to the use or effects of depressants generally? a. The usual methods of administration are oral or injected. b. Excessive use results in drunken behavior similar to that of alcohol c. There is no danger of tolerance developing d. Taken as prescribed, they may be beneficial for the relief of anxiety and tension

c. There is no danger of tolerance developing

Perhaps one of the most difficult tasks in planning for disasters and emergencies is the actual formulation of a basic disaster plan. Which of the following is an incorrect procedure in developing such a plan? a. The basic plan should provide for coordination of government and company actions before and during a disaster b. A glossary of terms used should be included c. There should be a listing of types of emergencies limited to those experienced by the company in the past d. The plan should utilize appendices as needed such as maps, call-up lists and mutual aid agreements

c. There should be a listing of types of emergencies limited to those experienced by the company in the past

All of the following are factual statements descriptive of illicit cocaine except one, which is: a. It is distributed on the street as a white to dark brown powder. b. It is often adulterated to about half its volume by a variety of other ingredients. c. This substance is only used through the process of injection d. It is popularly accepted as a recreational drug

c. This substance is only used through the process of injection

Which of the following should be interviewed last or near the end of an investigation under usual circumstances: a. Those with extensive information b. Those preparing to take a trip out of area c. Those likely to be hostile d. Those with less than extensive information

c. Those likely to be hostile

Which of the following is not a legitimate purpose of an investigation for employee misconduct? a. To determine whether company rules have been violated b. To ascertain whether company policies have been violated c. To catalog information of employees which might be derogatory for future use d. To determine if state or federal laws have been violated

c. To catalog information of employees which might be derogatory for future use

Potential disasters caused by man should be included when developing a firm's emergency plan. One of the most common man-made disasters is the plant fire. Which of the following is considered to be the most important aspect of plans coping with major plant fires? a. To make certain that the plant's fire-fighting equipment is adequate and in good operating condition b. To make certain plant personnel are well-trained in fire-fighting techniques c. To make certain that mutual assistance agreements have been developed with local governments, other plants and nearby installations

c. To make certain that mutual assistance agreements have been developed with local governments, other plants and nearby installations

An undercover operator should be: a. A member of the investigative staff of the organization b. A trusted employee in the department under investigation c. Unknown by anyone likely to be in the target population d. An off-duty law enforcement officer

c. Unknown by anyone likely to be in the target population

It is becoming increasingly more difficult to do a good pre-employment background investigation because : a. Expense b. Lack of skilled investigators c. Various laws and court decisions which inhibit the use of techniques and/or instruments available d. Uncooperative attitude of persons interviewed

c. Various laws and court decisions which inhibit the use of techniques and/or instruments available

The two major components of economic crime have been: a. Employee theft and corporate bribery b. Fraud and embezzlement c. White collar and ordinary crime d. Computer and ordinary crime

c. White collar and ordinary crime

What can result from excessive dose of cocaine?

cause seizures and death. There is no "safe" dose of cocaine

What causes a tidal wave?

caused by underwater disturbances

What is the most potent stimulant of natural origin?

cocaine which is extracted from the leaves of the coca plant

Counterfeiting of checks and other documents has increased primarily because of sophistication of _________________

color-copying machines

What is classified as a Class D fire?

combustible metals

What is a blizzard warning?

considerable snow and winds of 35 m.p.h. or more are expected.

Vital records usually constitute no more than 2 percent of a ______________________.

corporation's records

What are the two forms surveillance can take?

covert or overt

What is the critical element in dealing with plant fires?

critical element is the ability to respond quickly with well trained personnel to contain and extinguish the fire

What is Security functions ?

cut across departmental lines and consist of involvement into every activity of the company but should not involve significant interference

Which of the following does not fit into good emergency planning? a. An individual should be appointed as coordinator b. Plan should be reduced to writing c. Plan should be simple d. A new organization should be developed to handle emergency situations

d. A new organization should be developed to handle emergency situations

The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called: a. A wiretap b. A bug c. An electronic surveillance d. A pen register

d. A pen register

Every applicant's first interview should be with: a. The security manager director b. The security supervisor c. A security line employee d. A personnel interviewer

d. A personnel interviewer

From an organizational standpoint, the head of security should report to: a. Superintendent of buildings b. Manager of buildings and grounds c. Head housekeeper d. A vice-president or higher

d. A vice-president or higher

In conducting background investigations, it is good policy to: a. Not let prospective employee know investigation is being conducted b. Restrict investigation to "confidential" records checks c. Restrict investigation to employment checks d. Advise applicant of forthcoming investigation and secure his permission

d. Advise applicant of forthcoming investigation and secure his permission

The basic types of protection which security personnel realize as best can be described by the following: a. Fidelity Bonds b. Surety Bonds c. Burglary/Robbery/Theft Insurance d. All of the above

d. All of the above

Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information? a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship c. Other than employees, any other persons to be bound to secrecy must agree to be so bound d. Any agreements to be bound must always be in writing and are not implied from acts

d. Any agreements to be bound must always be in writing and are not implied from acts

Proprietary information is: a. Information which must be so classified under government order b. Private information of highly sensitive character c. Defense data which must be classified according to federal regulations d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

In a labor dispute which of the following measures is not advisable: a. Change all perimeter gate padlocks b. Issue special passes to non-striking employees c. Notify employees who go to work to keep windows rolled up d. Armed guards

d. Armed guards

The source of marihuana is the: a. Peyote cactus b. Mushrooms c. Coca plant d. Cannabis plant

d. Cannabis plant

Which of the following is not an advantage of using in-house (career) personnel? a. Career personnel develop a loyalty to the department b. Career personnel tend to be more ambitious c. There is more stability among career personnel d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

Most of this substance is produced from morphine; but it is often combined with other products such as aspirin or Tylenol. It is often used for the relief of coughs; and it is by far the most widely used natural occurring narcotic in medical treatment. It is: a. Barbiturates b. Mescaline c. Chloral Hydrate d. Codeine

d. Codeine

On the whole, employees are: a. Easily tempted b. Honest c. Indifferent d. Conscientious, honest individuals who have the firm's best interest at heart

d. Conscientious, honest individuals who have the firm's best interest at heart

Which of the following is not a requirement for a successful undercover investigation: a. A qualified investigator b. A plausible cover story c. An effective control scheme d. Developing necessary evidence for prosecution

d. Developing necessary evidence for prosecution

Crime analysis is a key element in focusing the use of police and security resources to address crime problems. Data collection and analysis are two specific steps. The other two are: a. Inspection and discovery of facts b. Response and feedback c. Feedback and corrective action d. Dissemination and feedback

d. Dissemination and feedback

There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is: a. When order is given by the rank of captain or above b. When order is given by the head of a department c. When the order is given by the head of internal affairs d. During emergencies

d. During emergencies

Pilferage is defined as stealing in small quantities over a long period of time. The taking of property entrusted to someone's care is called: a. Mistake of fact b. Misprison of a felony c. Uttering d. Embezzlement

d. Embezzlement

Searches made during work hours as a result of a bomb threat call should be made by: a. Local Police Department b. Military Police c. Federal investigative personnel d. Employees familiar with work area where bomb is reportedly located

d. Employees familiar with work area where bomb is reportedly located

The urban planning and design process which integrates crime prevention techniques with neighborhood design is known as: a. Urban Development Planning b. Conceptual Modeling in Architecture c. Environmental Design d. Environmental Security (E/S)

d. Environmental Security (E/S)

The frequency of reinvestigation of the "financial life style" inquiry should generally be: a. Never b. Every 6 months c. Every year d. Every 18 months

d. Every 18 months

In connection with corporate kidnappings by terrorist, the decision as to whether ransom is to be paid should be made by: a. Local police b. Spouse or blood relative of victim c. City government d. Highest corporate level

d. Highest corporate level

The issuance of weapons to guards is usually not justified: a. In a situation where deterrence is needed in handling control of large amounts of cash b. In situations in which terrorism is a real threat c. In situations where there would be greater danger to life without weapons than with them d. In a situation where there is no danger to life safety

d. In a situation where there is no danger to life safety

Non-directional counseling of upset employees: a. Should not be used because it is not effective b. Does not carry the danger inherent in giving advice c. Does not directly advise, criticize or try to help d. Involves primarily being a good listener

d. Involves primarily being a good listener

Which of the following is not true with regard to a resume? a. It does not provide the information which the company requires b. It is never accepted in lieu of a completed application form c. It is always accepted and is reviewed as part of the investigation d. It is an acceptable form of information for a professional position

d. It is an acceptable form of information for a professional position

Another widely abused depressant is methaqualone. All of the following are factually descriptive of methaqualone except one. Identify this exception. a. It is chemically unrelated to the barbiturates b. It was once mistakenly thought to be effective as an aphrodisiac. c. It is administered orally d. It is one of the depressants that does not lead to tolerance and dependence.

d. It is one of the depressants that does not lead to tolerance and dependence.

German scientists synthesized methadone during World War II because of a shortage of morphine. Which of the following is not characteristic of methadone and it's usage ? a. Although chemically unlike morphine and heroin, it produces many of the same effects b. It was distributed under such names as amidone, dolophine, and methadone c. It was widely used in the 1960's in the treatment of narcotic addicts. d. It is only effective when administered by injection

d. It is only effective when administered by injection

Which of the following is considered to be one of the 3 basic functions of risk management? a. Lock control b. Barrier control c. Disaster management d. Loss control

d. Loss control

Probably the chief reason for the loss of information about sensitive operations is: a. Deliberately stolen by an outsider b. Loss by fire or other disaster c. Deliberately stolen by insider d. Lost through inadvertent disclosure

d. Lost through inadvertent disclosure

A management tool wherein there is a systematic method of achieving agreed upon goals set in advance is known as : a. Matrix Management b. Proactive Management c. Scheduling Management d. Management by Objective

d. Management by Objective

Which of the following is not an example of the intelligence test: a. Stanford-Binet IQ Test b. Henman-Nelson IQ Test c. Armed Forces General Classification d. Manual Placement Test

d. Manual Placement Test

Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as: a. The autocrat theory b. The custodial theory c. The supportive theory d. McGregor's "Theory X"

d. McGregor's "Theory X"

All of the following are controlled substances grouped as stimulants except one. Identify the exception. a. Cocaine b. Amphetamines c. Phenmetrazine d. Mescaline

d. Mescaline

The theft triangle consists of the following components: a. Desire, skill and training b. Motivation, skill and opportunity c. Opportunity, desire and skill d. Motivation, opportunity and rationalization (Desire)

d. Motivation, opportunity and rationalization (Desire)

A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered? a. You may have to expose the very secrets you are attempting to protect b. The cost of the litigation may exceed the value of the secret information c. You may lose your case d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

The principal item of expense in an investigations budget will be: a. Communications b. Equipment c. Maintenance d. Personal costs

d. Personal costs

A yellow colored crystalline solid pertains to the following explosive: a. TNT b. Dynamite c. Nitroglycerin d. Picric acid

d. Picric acid

The most conspicuous role of the security department in any organization is that of: a. Educational services b. Management services c. Special services d. Protective services

d. Protective services

The continuity of business and industrial leadership and direction are essential parts of all industrial emergency plans. The following specific measures should be included in the development of a plan for continuity of leadership except: a. Assure a functioning board of directors b. Establish lines of succession for key officers and operating personnel c. Establish an alternate company headquarters d. Provide for special stockholder's meeting immediately after attack to provide for methods of operation

d. Provide for special stockholder's meeting immediately after attack to provide for methods of operation

The condition whereby a user develops an attachment to the use of a substance due to it's ability to satisfy some emotional or personality need of the person is known as: a. Tolerance b. Physical dependence c. Addiction d. Psychological Dependence

d. Psychological Dependence

There are two generally accepted definitions of risk. These are more commonly known to risk managers and security officers as: a. Potential risk and dynamic risk b. Profit risk and dynamic risk c. Potential risk and pure risk d. Pure risk and dynamic risk

d. Pure risk and dynamic risk

If necessary to terminate an undercover investigation which one of the following actions should not be done: a. Withdraw agent safely b. Withdraw agent immediately c. Salvage as much of the result of date d. Reveal identity of the agent

d. Reveal identity of the agent

Which of the following is another name for cocaine ? a. Adipex b. Bacarate c. Piegine d. Snow

d. Snow

Compared with other plant emergencies, bomb threats present a highly complex problem for plant management and emergency service personnel. Which of the following actions should not be in the bomb threat emergency plan as it is incorrect? a. Planning to meet the threat should include contact with nearby military explosive ordnance disposal detachment (EODD) b. Prior planning should include contact with the local police department c. Training programs for plant specialists in handling improvised explosive devices should be utilized when available from the military EODD d. The Chief of Police must make the decision whether or not to evacuate building after a bomb threat has been received

d. The Chief of Police must make the decision whether or not to evacuate building after a bomb threat has been received

The first skill the manager must learn is: a. How to give orders b. How to check up on procedures c. How to maintain authority d. The ability to listen

d. The ability to listen

From a security perspective, what is the first factor to be considered in facility construction? a. The identity of experienced consultants b. An effective security plan c. An architect with knowledge of physical security d. The building site itself

d. The building site itself

The qualifications and background of an applicant are considered in light of the needs of the company to perform duties of a specific position. Which of the following is not accurate regarding the job description for the position: a. It must include accurate specifications and genuine skill requirements b. The details of the description may tend to exclude certain groups of people c. The specifications and skills should be described concisely and without prejudice d. The job description should be intentionally vague in order to allow the max number of applicants to qualify for the position

d. The job description should be intentionally vague in order to allow the max number of applicants to qualify for the position

The ultimate responsibility for the internal security in a department should rest with: a. The president b. Chairman of the board c. Security director d. The line supervisor

d. The line supervisor

A simplified answer to the question of why employees steal is: a. Sickness in family b. To feed a drug habit c. To live on a higher level d. The theft triangle

d. The theft triangle

Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third: a. Newspaper articles b. Television c. Magazine articles d. Theft by an insider

d. Theft by an insider

The fire detector which responds to a predetermined temperature or to an increase in temperature is known as: a. Ionization detector b. Photoelectric smoke detector c. Infrared flame detector d. Thermal detector

d. Thermal detector

Which of the following characterization regarding investigative surveillance is not true? a. They are expensive b. They are time-consuming c. They are often non-productive d. They are illegal in most jurisdictions

d. They are illegal in most jurisdictions

Which of the following is not a correct statement with regard to narcotics? a. The term "narcotic" in it's medical meaning refers to opium and opium derivatives or synthetic substitutes b. They are the most effective agents known for the relief of intense pain c. They have been used for a long period of time as a remedy for diarrhea d. They tend to intensify vision and increase alertness

d. They tend to intensify vision and increase alertness

Usually the most difficult part of an Executive Protection Plan is: a. To secure trained personnel b. To initiate liaison with Federal Agencies c. To initiate liaison with local authorities d. To convince the executive being protected on the need for such protection

d. To convince the executive being protected on the need for such protection

Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don't discuss sensitive information" and the other is: a. To use a wire tap detector b. To use a radio jammer c. To use an audio jammer d. To use encryption equipment

d. To use encryption equipment

Probably the single most important safeguard for preventing internal theft is: a. An extensive statement of personal history b. The personal interview c. Interviewing reference d. Upgrading the screening of new employees

d. Upgrading the screening of new employees

In reviewing the emergency plans of the XYZ Corporation, the legal counsel of the firm notes that there is a definite possibility that a quorum of the board of directors cannot be readily assembled which will not allow action in accordance with law. Which of the following methods generally would not be acceptable to remedy this legal problem? a. Reduce the quorum number if allowed by the state b. Summary filling of board vacancies if allowed by the state c. Establishment of an emergency management committee, if allowed by the state d. Utilizing chain of command, execute proper power of attorney papers for the top 3 officials so the most senior could execute legal affairs if board not functioning

d. Utilizing chain of command, execute proper power of attorney papers for the top 3 officials so the most senior could execute legal affairs if board not functioning

The most effective deterrent to shoplifting is: a. Highly competent and educated security officers b. Widespread use of sensor devices c. Well positioned CCTV's d. Well trained personnel

d. Well trained personnel

What is economic crime?

defined as the illicit behavior having as its object the unjust enrichment of the perpetrator at the expense of the economic system as a whole

Describe Fredrick Herzberg's "Motivation-Hygene Theory" -

defined two independent categories of needs - hygene factors and motivators.

Describe the vertical plane in a organizational chart

defines the levels of authority

What is the best way to ensure a terrorism hostage is alive?

direct communication

The emergency plan should be _________ in nature

directive

80% of computer security incidents result from insider attacks by whom?

dishonest and disgruntled employees

Describe pros and cons of a voice analyzer

does not require body attachment Records sub-audible tremors in speech on a digital tape Processes speech electronically and provides immediate results for single or multiple-word questions

What are hallucinogenic drugs?

drugs distort the perception of objective reality

What are stimulants?

drugs which may produce a temporary sense of exhilaration, superabundant energy and hyperactivity including extended wakefulness

What are Line item budgets?

each item is listed by separate line

What is the Enzyme Multiplied Immunoassay Technique (EMIT) screening ?

easy to administer and relatively inexpensive

What is the most frequent type of strike?

economic strike

The art of ______________ ____________ is the most important skill for successful management.

effective communication

Most fires are ____________ in origin

electrical

Who should make the decision as to who should search in event of a bomb threat?

facility manager

What is one of the most common errors made in the interrogation of a subject in a larceny case ?

failure to ask if he/she stole the object

What is the most common management weakness?

failure to properly delegate responsibility and the authority to carry out the responsibility.

About 95% to 99% of activated alarms are "________"

false

What is the best means to identify people?

fingerprints

Long after hallucinogens are eliminated from the body, users may experience "_____________"

flashbacks

Organizational structure should be ______ to be most effective

flexible

What are Program budgets?

funds are allocated by specific activity

Only 1% of computer security incidents annually are attributed to "___________"

hackers

Describe the autocratic theory

holds that management is all-powerful and employees are obligated to follow orders without question

Describe the custodial theory

holds that the aim of the company is to make the employee happy and contented through economic benefits and thus they will be positively adjusted to their work. This theory does not motivate employees to produce to their full capacity

Describe the Theory Y management theory

holds that the average employee does not dislike work, is self-directed, is creative and imaginative, accepts responsibility and is committed to achieving organizational needs and objectives -Douglas McGregor

Describe the Theory X management theory

holds that the average employee has little ambition, dislikes work and must be coerced, controlled and directed to achieve organizational objectives - Douglas McGregor

Describe the supportive theory

holds that through good leadership, management will provide a climate where employees will take on added responsibilities and thus make greater contributions to the growth of the company. Leadership: "We rather than they"

Searching motor vehicles for contraband poses special problems. One area often overlooked is the "_________" of a vehicle.

hub caps

What is the role of HR?

identification of staffing needs and selection, training, leading, and directing, and retaining of effective personnel

What is the purpose of a fire door?

impeding the spread of fire

Describe the horizontal plane in a organizational chart

indicates the divisions of areas of responsibility

Every industrial firm, regardless of size, should establish an _________

internal organization that will be able to protect life and property in time of any emergency

What is Image and Milieu as per Defensible Space by Oscar Newman ?

involve the ability of design to counteract the perception that the area is isolated and vulnerable to crime.

What is Chain of custody with regard to collection of evidence?

is a chronological written record of those individuals who have had custody of the evidence from its initial acquisition until its final disposition

Define drug dependence

is a condition resulting from repeated use whereby the user must administer progressively larger doses to attain the desired effect, thereby reinforcing compulsive behavior

What is the most important aspect of an undercover operation?

is a credible cover or background story used by the undercover agent

What is the most effective counter-measures against embezzlement?

is a disciplined environment with appropriate audits and other appropriate safeguards

What is a exemplar?

is a document requested by the investigator which duplicates the text of a questioned document and is known to be the product of a particular person or machine

What is Questioned Document?

is a document whose genuineness is questioned, normally because of origin, authenticity, age or circumstances under which the document was written

What is Theory Z?

is a recent management style used effectively by the Japanese. This theory emphasizes humanized working conditions along with attention by management to enhance trust and close personal relationships

What is Management by objective (MBO)?

is a systematic way of achieving agreed to goals set ahead of time.

What is planning?

is an activity concerned with proposals for the future, an evaluation of those proposals, and methods for achieving the proposals

What is a accident?

is an undesired event resulting in physical harm to a person or damage to property

What is Environmental Security (E/S)?

is an urban planning and design process which integrates crime prevention with neighborhood design and urban development.

What is a incident?

is anything from serious injury to a breakdown in quality control.

What is the focus of disaster control planning?

is on solutions to major problems and to prevent a disaster from becoming a tragedy

What is crime and incident analysis?

is one of the first tools to be applied to the assessment of risks in order to determine vulnerability.

Who is a confidential informant?

is one who furnishes information on the expectation that his/her identity will not be disclosed

How is a automatic sprinkler system activated?

is ordinarily activated by the melting of a metal seal and water then flows through the system when the head valves are released

Describe Top down and bottom up

is preferred by some because senior management initiates the process by establishing acceptable expenditure limits and guidelines prior to detailed planning by middle or operating management

What is the first thing for an investigator to do at a crime scene?

is provide for any needed medical attention and protect the scene

What is the main deterrent value of a burglar alarm system?

is that the alarm signal enunciated locally or transmitted to a central station brings a police response

What is the most important management skill?

is the ability to communicate effectively

What is management?

is the activity which plans, organizes and controls activities in an organization

What is the largest single item of expense in the security operation?

is the cost of the security personnel

What is the most common security management failure ?

is the inability to delegate responsibility and the authority necessary to carry it out

Explain how in interviewing, leading or suggestive questions effects

leading or suggestive questions tend to influence the answers given by a subject should be avoided while asking for the original information.

What is Chloral Hydrate?

liquid with a slightly acrid odor and a bitter, caustic taste

In a strike, who is the most important outside contact?

local police

What is Safe area as per Defensible Space by Oscar Newman ?

locales that allow for high degree of observation by police

What is shrinkage?

loss of inventory through any means

What is Herzberg's theory?

management theory which holds that motivation comes from work achievement satisfaction and not from such things as salary and job security

What is the major resource required for a risk analysis?

manpower

Another source of hallucinogens (psilocybin and psilocyn) is psilocybe_____________

mushrooms

What is the time frame for a economic strike?

must be preceded by at least 60 days notice

In dealing with plant fires, ___________ and prior coordination with the fire department is essential.

mutual assistance

What are the two major causes of employee theft ?

personal problems environment (inadequate socialization)

What does Emergency readiness mean?

preparation has reached the point where you are prepared to react promptly to save life and protect property if the plant is threatened or hit by a major emergency

What is a open ended question?

question affords the interviewee opportunity to reply in a narrative fashion

What is a close ended question?

question restricts an interviewee in the amount of information given during a reply

What is a polygraph ?

records changes in respiration, blood pressure, pulse and skin's sensitivity to electricity

What is physical dependence?

refers to an alteration of the normal functions of the body that necessitates the continued presence of a drug in order to prevent the withdrawal or abstinence syndrome

What is marijuana?

refers to cannabis plant parts and extracts that produce somatic or psychic changes in humans

What does narcotic in its medical meaning mean?

refers to opium and opium derivatives or synthetic substitutes

Who does private security rely on and why?

relies upon both commercial security services and government agencies for intelligence gathering and crisis management planning

What is zero-based budgeting?

requires that the benefits from an activity be weighed against the benefits to be lost if the planned activity is carried out at a lesser level or not done at all.

Give examples of Hygene Factors

salary, fringe benefits, security (Civil Service), rules and regulations and supervision.

Who should be responsible for a shutdown?

should be assigned to persons familiar with the process

Where should charred evidence be placed?

should be placed on top of loose cotton in a box and delivered to the laboratory in person

Who is the security manager and what are their responsibilities?

should have the necessary authority to carry out responsibilities. To accomplish this, the security manager should occupy a position where the manager reports directly to a vice-president or higher

What is business crime is most effectively attacked through?

sound management controls. The emphasis on loss prevention rather than the "offender" involved in the incident is a distinguishing characteristic of private security

What is pilferage?

stealing in small quantities over a long period of time

"Theory Y" encourages managers to ________________ employees in efforts to higher achievement

support and encourage employees

What is embezzlement?

taking money/property entrusted to their care

What is fire loading?

the amount of combustible materials that occupy its interior spaces

What should a facility have in case of a fire?

the capability to respond quickly with well trained personnel to contain and extinguish the fire

Who activates a emergency plan?

the facility manager, the President, or the CEO

In a high rise building, what does partial evacuation include?

the floor above and the floor below

Why doesn't the investigator take notes during an interrogation?

the investigator does not take notes during the interrogation in order to keep from disrupting the interrogator's rhythm

What is a blizzard?

the most dangerous of all winter storms.

What is one thing that distinguishes disasters or major emergencies from the emergencies plant personnel deal with each day?

the need for coordinated emergency operations

What is span of control and what is the ratio recommended?

the number of personnel which one individual can effectively control 1 supervisor to 3 employees - ideal 1 supervisor to 6 employees - good 1 supv to 12 employees - Acceptable

Both private security and public law have, as their primary mission

the prevention of crime and protection of persons and property

What is thebaine?

the principal alkaloid in a species of poppy which has been grown experimentally in the U.S.

To a large measure, the success of a polygraph examination depends upon

the professional capabilities of the investigator

Automatic fire doors are held open until

there is sufficient combustion to trigger the door closing devices

The primary objective in implementing a protection program within an organization should be

to motivate every employee to become part of the protection team

What is the most important rule in crime scene photography?

to photograph all evidence or possible evidence before anything is moved or touched

What constitutes as a tornado warning?

tornado has actually been sighted in the area

What is a tornado watch?

tornadoes are expected to develop

More fire fatalities are caused by __________________ than by the flames

toxic gases

What is Gas Chromatography/Mass Spectrometry?

used for confirming drug tests

What are Capital budgets?

used for infrequently purchased high dollar items

Who uses a bomb blanket?

used only by specifically trained personnel

What is matrix management?

uses assets over a wide spectrum of activity by forming ad hoc teams to work on shorter term projects.

Describe a severe blizzard warning?

very heavy snowfall is expected with winds of at least 45 m.p.h. and temperatures of 10 degrees or lower.

All admissions or confessions must be ___________ in an interview

voluntary

Describe how the place of an interview should be

well-lighted, adequately ventilated, comfortably furnished with a minimum of distraction

When is a hurricane warning issued? State speed

when it is determined that winds of 74 mph or higher will be encountered

What are the two major components of economic crime?

white collar and ordinary crime

Private security frequently avoids or bypasses police with regard to _______________ crime

white collar or economic


Conjuntos de estudio relacionados

Long-Term Debt (Financial Liabilities)

View Set

Live Virtual Machine Lab 5.4: Module 05 Troubleshooting Cable Connectivity

View Set

Chapter 63: Management of Patients with Neurologic Trauma

View Set

Ch 9. Network Security Appliances and Technologies

View Set

Acct 4342 Ch. 8 (Data Analytics & AdHoc Reporting)

View Set

Chapter 5- Nonverbal Communication

View Set

Reproductive System Exam Study Guide (Pt. 2)

View Set

Chapter 23 Digestive System: Function of the Large Intestine

View Set