QUIZ Questions #2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Psychoactive drugs affect which of the following: a. Brain b. Blood c. Lungs d. None of above

a. Brain

The three (3) Cs of report writing are: a. Clear, Complete and Concise b. Complete, Competent, Clear c. Clear, Concise, Compartmentalized d. Concise, Clear, Clever

a. Clear, Complete and Concise

When an information loss is known or suspected, the following actions should be taken: a. Corrective actions b. Damage assessment c. Containment d. Determine root cause

a. Corrective actions b. Damage assessment d. Determine root cause

The practice of asset protection focuses on which categories of "assets"? (Circle all that apply.) a. Information b. Physical c. People d. Property

a. Information c. People d. Property

If it is imperative that evidence at a crime scene is recovered and protected by the security officer, which of the following is a recommended procedure? a. Keep individual items separate so they do not contaminate each other b. Gloving up before touching evidence is not necessary c. Wrapping evidence in sheets of newspaper is a good way to keep the evidence from being contaminated d. None of the above

a. Keep individual items separate so they do not contaminate each other

Which of the following is a legal move by management to put pressure on the unions: a. Lockout b. Legal strike c. Locked gate process d. A and C only

a. Lockout

When involved in a one-on-one situation, the first action taken should be: a. Make a plan of action b. Do not block the doorway c. Communicate with the individual d. Be sure assistance is en route

a. Make a plan of action

When a safety recommendation made by an employee is acted upon: a. Management recognizes the employee's contribution to the safety program b. The employee is likely to become a member of the safety committee c. The employee is likely to become less safety conscious d. Management perceives this kind of action as interfering with the safety committee

a. Management recognizes the employee's contribution to the safety program

Observing which of the following guidelines increases the chances that emergency plans will be more effective and efficient: a. Promote multi-organization response b. Allow resistance to the planning process c. Separate emergency response from disaster recovery d. None of the above

a. Promote multi-organization response

In a scatter chart used for risk analysis, which quadrant represents a "high-likelihood/ high-consequence" risk? a. Quadrant 1 b. Quadrant 2 c. Quadrant 3 d. Quadrant 4

a. Quadrant 1

Which of the following is a good investigative interviewing technique? a. Request that the subject tell the story multiple times b. Thank people for their help c. Summarize d. Don't allow the subject to sleep

a. Request that the subject tell the story multiple times

Which of the following is the first responding officer responsible for at the crime scene: a. Take emergency actions necessary to preserve life and protect property b. Do nothing until the security supervisor arrives c. Start picking up items that look like they may be evidence d. Start taking pictures of the crime scene to create a record

a. Take emergency actions necessary to preserve life and protect property

Because vulnerabilities are actually a characteristic of the organization or facility, they are: a. The risk factor over which the organization has the most control b. Impossible to accurately assess by an outside consultant c. The risk factor that is most expensive to correct d. The only risk factor that can be influenced by the organization

a. The risk factor over which the organization has the most control

The single overarching goal of all investigations is: a. To discover facts about a situation, person, or behavior b. To continue an ongoing process of collection c. To win the "credibility battle" d. To analyze the behavior of the perpetrator and/or victim

a. To discover facts about a situation, person, or behavior

A good rule to follow is: If it is an uncommon event, then report it. a. True b. False

a. True

A person who does not use drugs, but is preoccupied with a loved one who does, is said to be codependent. a. True b. False

a. True

A polite respectful approach will make those being searched more cooperative with a search officer and make the search more effective. a. True b. False

a. True

A principal is about to enter a room; a protection specialist should enter the room before the protectee to make sure it is safe and consider closing the blinds to prevent outside adversaries from observing activity in the room. a. True b. False

a. True

According to this chapter, a very small percentage of employees who have violent propensities will actually perform a violent crime. a. True b. False

a. True

An employee who exhibits rude manners toward his or her fellow workers is a definite workplace violence threat. a. True b. False

a. True

An example of a non-violent extremist might be an animal rights supporter that uses no animal products at all. a. True b. False

a. True

An important tool in protecting information assets is the Economic Espionage Act (EEA) of 1996 a. True b. False

a. True

An officer can testify in several different legal arenas for a single case: a. True b. False

a. True

As a security professional it is often less important to classify a potential threat as terrorism or crime than to identify and address the threat itself. a. True b. False

a. True

Avoid close-ended questions that will typically require a simple "yes" or "no" response. a. True b. False

a. True

Counter terrorist security personnel should read and become intimately familiar with detection equipment manuals, calibration techniques, and capabilities. a. True b. False

a. True

Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies. a. True b. False

a. True

Covert operations are intended not to be known or recognized. a. True b. False

a. True

Deception can take additional forms other than what some may immediately think is a lie or untruthful statement. a. True b. False

a. True

Drug dependence is a primary disease. a. True b. False

a. True

Equipment requirements vary depending on the location, nature, and goal of the operation. a. True b. False

a. True

Formal threat assessments are certainly important; however, regular monitoring of the environment offers the opportunity to identify potential problems earlier. a. True b. False

a. True

Historically, the term "terrorist" can be traced to 1795 a. True b. False

a. True

If storage space becomes an issue, it might be that noncritical materials have to be discarded. a. True b. False

a. True

In some states/provinces/countries, recording a telephone conversation may not be done without the prior knowledge and consent of both parties on that call. a. True b. False

a. True

Incident reports must be treated as legal documents. a. True b. False

a. True

Indistinct signs of possible physical acting out, such as gritting teeth, closing and opening of hands, and tensing, may precede more combative behavior. a. True b. False

a. True

It is important that a protection officer understands the importance of statements, whether written or verbal. a. True b. False

a. True

Legal measures are generally "reactive" rather than "proactive" in nature. a. True b. False

a. True

Liaison with non security employees has many benefits for the protection officer. a. True b. False

a. True

On-the-job visits can be used to evaluate investigations: a. True b. False

a. True

Reporting observations to the right person or persons is vital. a. True b. False

a. True

Risk management is a critical process that touches every aspect of organizational asset protection—and the activities of the professional protection officer. a. True b. False

a. True

Terrorist groups frequently attempt to infiltrate a facility's workforce, including the security department, prior to conducting an attack. a. True b. False

a. True

The CARVER model of target selection offers a useful tool for considering a target. a. True b. False

a. True

The National Fire Protection Association (NFPA) standard 1600 sets criteria for both developing and evaluating existing emergency management programs. a. True b. False

a. True

The National Incident Management System (NIMS) provides a systematic, proactive, all-hazards approach that guides all levels of government, non-governmental organizations, and the private sector to work together to respond to and manage incidents of all sizes. a. True b. False

a. True

The best stance during a crisis situation is just off to the side at an angle. a. True b. False

a. True

The strike plan is designed and updated to eliminate problems that occur during a strike and provide guidelines for security and management. a. True b. False

a. True

When an incident or crime occurs, the responding protection officer is expected to protect the scene until investigators arrive. a. True b. False

a. True

Workplace violence can occur in almost every workplace: small businesses, large companies, government facilities. a. True b. False

a. True

Workplace violence is broadly defined as the use of violence against workers. a. True b. False

a. True

Writing a report is one of the most important duties of a security professional. a. True b. False

a. True

Tension will often cause speech to become more rapid and stammered sometimes _______ times the normal speed. a. 1—2 times b. 2—3 times c. 5--6 times d. 10 times

b. 2—3 times

In a 2006 survey conducted by the Bureau of Labor Statistics, U.S. Department of Labor, for the National Institute for Occupational Safety and Health, Centers for Disease Control, what percentage of workplace violence events were perpetrated by coworkers? a. 22.7% b. 34.1% c. 24.1% d. 12.5%

b. 34.1%

Routine activity theory states that crime will only happen when a motivated offender, a suitable target, and the absence of ___________ ___________ occur at the same place and time. a. Suitable guardians b. Capable guardians c. Protection officers d. Probation officers

b. Capable guardians

Persons who are behaving in a physically violent manner may be controlled in all of the following ways except: a. Verbally b. Challenged c. Physically d. Chemically

b. Challenged

Overt personal surveillance: a. Reties on being properly concealed b. Could deter some incidents c. Both of the above d. Neither a nor b

b. Could deter some incidents

Which of the following is an example of a technique of neutralization that would be used if the employee believed the company would get insurance money to replace the loss? a. Denial of responsibility b. Denial of injury c. Appeals to higher loyalties d. Condemning the condemners

b. Denial of injury

The acronym ELF refers to: a. Equal Liberation Front b. Earth Liberation Front c. Earth Liaison Front d. Earth Liberal Front

b. Earth Liberation Front

Being complacent during a crisis situation is good; it allows the individual not to know what you are thinking. a. True b. Fa1se

b. Fa1se

Experts say that 7—15% of the messages we convey are nonverbal. a. True b. Fa1se

b. Fa1se

A company can effectively fight substance abuse by just starting a drug testing program. a. True b. False

b. False

A good acronym to remember when it comes to writing reports is H.U.G. a. True b. False

b. False

A proper understanding of privacy issues is only important if the case goes to court. a. True b. False

b. False

A security professional need only concentrate on their own facility when coping with terrorism. a. True b. False

b. False

A wildcat strike is a legal strike. a. True b. False

b. False

An emergency response plan will work regardless of any realistic training prior to the implementation in an actual emergency. a. True b. False

b. False

Computer security, information security, and information technology (IT) security all mean the same thing and are interchangeable terms. a. True b. False

b. False

Field notes are equivalent to incident reports. a. True b. False

b. False

Incidents must always be written in a way that shows the organization in a favorable manner. a. True b. False

b. False

Informants are a very expensive and risky method to use: a. True b. False

b. False

Information that is lost is not permanently lost a. True b. False

b. False

Interviewing people is NOT the best way to gather information as there are many other more effective methods and resources. a. True b. False

b. False

It is important to state your opinion in incident reports to ensure that management can figure out what really occurred. a. True b. False

b. False

It is impossible to identify potential targets. a. True b. False

b. False

It is necessary to establish the boundaries of a crime scene before an investigation can begin. a. True b. False

b. False

Nonverbal communication is the most commonly understood form of interviewing. a. True b. False

b. False

Personal operations are the least expensive in the long run. a. True b. False

b. False

Personal protection specialists should attempt to stand out as obvious security personnel in the principal's entourage so people know whom to rely on in an emergency. a. True b. False

b. False

Personal protection specialists should only worry about assassins and kidnappers, since common criminals are unlikely to attack a VIP. a. True b. False

b. False

Protection officers may visit any office or activity without notice and at the officer's convenience. a. True b. False

b. False

Searches should be conducted randomly without a pattern that can be detected by adversaries. a. True b. False

b. False

Service providers should not base their core business model on risk management principles. a. True b. False

b. False

Social learning theory is only about learning how to commit a crime, not why crime might be acceptable. a. True b. False

b. False

Suspicious activity should be reported only in writing. a. True b. False

b. False

The National Response Framework (NRF) established an on-scene management system that would help responding agencies work together using a coordinated and systematic approach that can be used for all types of incidents regardless of size. a. True b. False

b. False

The biggest single roadblock to addressing a person's substance abuse problem is their drug of choice. a. True b. False

b. False

The boundaries of a crime scene will be immediately evident once the protection officer arrives on the scene. a. True b. False

b. False

The concept of "risk management" originated within the security profession. a. True b. False

b. False

The scene of a crime or incident will always require a boundary using police tape. a. True b. False

b. False

The terms "threat" and "risk" can be used interchangeably; for example, a "threat assessment" is the same as a "risk assessment." a. True b. False

b. False

The worst terrorist act on U.S. soil was the bombing of the Murrah Federal Building in Oklahoma City on April 19, 1995. a. True b. False

b. False

Verbal reports are equally as reliable as written reports. a. True b. False

b. False

Weingarten established the Exclusionary Rule, which prohibits statements made in violation of the law from being used in a criminal court: a. True b. False

b. False

Work stoppages as a result of labor relations difficulties will arise when union officials order production limitations. a. True b. False

b. False

To track loss-event-occurrences, the organization needs to know all of the following except? a. What was lost b. How long was it lost c. When was it lost d. Who lost it

b. How long was it lost

According to this chapter, the field of "information security" includes: a. Competitive intelligence b. IT security c. Intellectual property protection d. Traditional information security

b. IT security c. Intellectual property protection d. Traditional information security

According to "Primer on Security Risk Management," the primary categories of threats are (circle all correct answers): a. Criminal b. Intentional c. Inadvertent d. Terrorist e. Natural

b. Intentional c. Inadvertent e. Natural

A safety program that initiates regular safety inspections (audits) demonstrates to employees: a. Management's concern for improved productivity b. Management's interest in accident prevention c. Management's concern for the off-duty worker d. Management's concern for an unsafe workplace

b. Management's interest in accident prevention d. Management's concern for an unsafe workplace

The foundation of a good report lies in and begins with: a. Intelligence b. Notes and reports c. Interviews d. Investigative logic

b. Notes and reports

According to this chapter, the generally recognized primary objective of a security program is the protection of: a. Property and the organization's employees b. People, property, and information c. Fire, property, and information d. People, property, and money

b. People, property, and information

Buying insurance is one example of: a. Risk spreading b. Risk transfer c. Risk avoidance d. Risk reduction

b. Risk transfer

"When you lose your ________, someone else has control over you." a. cool b. Temper c. Money d. Job

b. Temper

In order to effectively mitigate risks, a security professional should: a. Limit their strategy to using proven security measures only b. Assess all possible threats to the organization c. Apply a protection strategy that employs a suite of solutions d. Ensure that management is aware of existing vulnerabilities

c. Apply a protection strategy that employs a suite of solutions

Which of the following is not illegal during a legal strike? a. Picketing of residences b. Obstructing highways c. Carrying placards d. Picketing within the premises

c. Carrying placards

Labor relations include the employee/ employer relations dealing with matters pertaining to which of the following activities: a. Strike parameters b. Lock out regulations c. Collective bargaining and associated activities d. None of the above

c. Collective bargaining and associated activities

The Incident Command System (ICS) identified common concepts that form the basis for the control and management of emergencies. Which of the following is not one of those concepts: a. Control b. Communications c. Concentricity d. Cooperation

c. Concentricity

Effective crisis media communications steps that organizations should consider include all the following except: a. Have a media plan b. Build a relationship with media before a crisis c. Develop strict restrictions on what media can do on your property d. Train employees on communications with the media

c. Develop strict restrictions on what media can do on your property

The protection officer should be aware of the types of discipline available to his employer because: a. The protection officer may hand out discipline b. The protection officer will be disciplined if he doesn't know the types of discipline c. Discipline is an effective deterrent d. The protection officer should know what is going on

c. Discipline is an effective deterrent

Although the 2006 survey discussed in this section indicated that 51.4% of respondents reported that workplace violence events had no effect on their workplace, 29.7% reported that this effect was observed: a. Absenteeism b. Turnover c. Fear levels d. Productivity e. Morale

c. Fear levels

Accident investigations can be investigated by any of the following except: a. Private investigators b. Insurance investigators c. Federal or state agency investigators d. Security officers

c. Federal or state agency investigators

There are six (6) questions that every report must attempt to answer and they include: Who, What, Where, When, Why. What is the additional question? a. If b. Could c. How d. Summary

c. How

There are many effects of workplace violence on an organization. Find the most correct group of effects below. a. Interruption to sales, Increased wages, Loss of management, Repair/replacement of equipment/facilities b. Interruption to business, Increased legal/wages, Logs of machines, Repair/replacement of equipment/facilities c. Interruption to business, Increased legal/medical fees, Loss of productivity, Repair/replacement of equipment/facilities d. Complete organizational failure

c. Interruption to business, Increased legal/medical fees, Loss of productivity, Repair/replacement of equipment/facilities

All except which of the following is a key step in preliminary investigation? a. Attending to injured persons b. Preserving the crime scene c. Interviewing the suspect d. Detaining those who have committed the crime

c. Interviewing the suspect

Physical evidence found at the crime scene may explain what exactly happened and/ or provide a list of suspects. Which of the following is not an item of physical evidence found at a crime scene? a. Blood b. Fiber samples c. Low levels of C02 in the soil samples d. Fingerprints

c. Low levels of C02 in the soil samples

The protection officer is to take which of the following actions in reference to substance abuse behavior in the workplace: a. Set up an undercover operation b. Arrest the perpetrators c. Observe and report to your up line d. None of the above

c. Observe and report to your up line

Which of the following is not relevant to general deterrence? a. Punishment certainty b. Punishment celerity c. Punishment carnality d. Punishment severity

c. Punishment carnality

When in the presence of a hostage taker or other violence-prone individual you should attempt to take what actions? a. Assert your authority so they know you are in charge, not the hostage takers b. Let them know you are skilled in martial arts and it would be dangerous to confront you c. Remain calm, use your first name, and cooperate with the hostage takers d. Use your time with the hostage takers to convince them their cause is wrong so they are more likely to release the hostages e. All of the above

c. Remain calm, use your first name, and cooperate with the hostage takers

When stopped at a picket line in your vehicle, you should: a. Cross the picket line on foot b. Roll down the window and demand that you be let through c. Remain in the vehicle and proceed with caution d. Unlock the windows and doors

c. Remain in the vehicle and proceed with caution

Which step must immediately follow observation of suspicious activity? a. Marking b. Concealment c. Reporting d. Liaison

c. Reporting

The ICS structure is built around five major management activities of functions. Which of the following is not one of these functions: a. Operations b. Planning c. Safety d. Logistics

c. Safety

This is often referred to as "the silent killer." a. Insulin shock b. Diabetes c. Stress d. Mental illness

c. Stress

The most widely used drug testing material in use today is: a. Blood b. Saliva c. Urine d. Hair

c. Urine

The first step in developing a Drug-Free Workplace Program is to: a. Provide education b. Start an employee assistance program c. Write a policy d. Start drug testing

c. Write a policy

When writing a report from your notes, which of the following will not be included: a. The names, dates of birth, addresses and phone numbers of witnesses and suspects identified at the crime scene b. A description of what happened c. Your best interpretation of why the incident happened d. A description of the crime scene where the incident took place

c. Your best interpretation of why the incident happened

According to consultant Michael Moberly, approximately what percentage of a company's value generally lies in information and intangible assets? a. 90% b. 50% c. 10% d. 75%

d. 75%

Examples of workplace violence situations are a. One worker's aggression toward his or her fellow employees in the workplace b. An armed robbery of a taxicab driver c. Criminal activity involving personal injury to a worker d. AII of the above

d. AII of the above

Some rules for setting limits are to: a. Set reasonable limits b. Set only limits that can be enforced c. Repeat the limits if necessary d. AII of the above

d. AII of the above

The role of the protection officer has an influence on the labor relations climate at any given company. Which of the following activities does the protection officer influence: a. Wildcat strikes b. Lawful strikes c. Lockouts d. AII of the above

d. AII of the above

A safety checklist is useful because (check best answers): a. It makes employees aware of safety hazards b. It can be used by various departments to audit general safety procedures c. It can be incorporated into security patrol procedures d. All of the above

d. All of the above

A simple camera surveillance system will often include: a. A camera b. A recorder c. A cable and connections d. All of the above

d. All of the above

An incident of theft whereby an employee is discharged can become an issue in: a. Civil court b. Criminal court c. An arbitration hearing d. All of the above

d. All of the above

Considerations for the retention of records could include: a. Company policy b. Statutes of limitation c. Storage space d. All of the above

d. All of the above

Electronic surveillance could include: a. CCTV b. Interception of radio transmissions c. Interception of other electronic information d. All of the above

d. All of the above

Guidelines for written statements may include: a. Use lined paper and write margin to margin b. Text should flow into additional pages (if necessary) c. If corrections are required, draw a line d. All of the above

d. All of the above

Paraverbal communications—how we deliver our words or verbal intervention— includes which of the following? a. Tone b. Volume c. Rate d. All of the above

d. All of the above

When the protection officer concludes the interview they should make detailed notes of the following: a. Name of the interviewee b. Contact details c. Identification d. All of the above

d. All of the above

Which of the following applies to drug dependence? a. It is fatal b. It is a family disease c. It is contagious d. All of the above

d. All of the above

The protection officer should continue with a professional demeanor when dealing with: a. Witnesses b. Victims c. Persons of interest d. All the above

d. All the above

The security officer's responsibilities when arriving at a crime scene is which of the following: a. Establish a boundary b. Protect the incident scene c. Maintain detailed notes d. All the above

d. All the above

Regardless of the type of crisis, there is a series of common requirements that must be taken into account for an organization to be successful when a critical incident occurs. These include all the following except: a. Assessing threat b. Selecting crisis team personnel c. Training crisis team personnel d. Being willing to spend lots of money on a solution

d. Being willing to spend lots of money on a solution

Employee package policies usually include: a. Search on demand b. Periodic or random search c. Neither of the above d. Either a or b

d. Either a or b

Nicotine and marijuana are referred to as which of the following: a. Equal in terms of habit forming drugs b. A harmless recreational drug c. The most dangerous drug d. Gateway drugs

d. Gateway drugs

The smallest sized cell is: a. 3--5 b. 5--10 c. 10--15 d. Individual

d. Individual

Which of the following is NOT a characteristic of the Economic Espionage Act of 1996? a. It makes it a federal crime to steal trade secrets b. It is a forward-looking piece of legislation c. It includes "altering" information as a prohibited act d. It must be updated every 5 years

d. It must be updated every 5 years

Acase effort undertaken in cooperation with other organizations is called: a. Auditing b. Intra Intelligence c. Undercover investigation d. Liaison

d. Liaison

In addition to a yearly audit of the emergency plan, that plan should be evaluated and modified, if necessary, at all of the following times except: a. When there has been a change in personnel b. When the layout or design of a facility changes c. When there is a change in policies and procedures d. None of the above

d. None of the above

Once the protection officer arrives on the scene, the first priority is to: a. Get the names of all those present b. Lock all the doors and wait for the police c. Preserve evidence found at the scene d. Provide first aid and call for assistance

d. Provide first aid and call for assistance

Which one of the following is not one of the underlying concepts on which a risk mitigation strategy should be based? a. The five avenues to address risk b. The "Four D's" c. Layered security d. Quantitative analysis

d. Quantitative analysis

Which of the following is the least agreeable time to detect a terrorist plot? a. While the terrorists are conducting surveillance to learn about the facility b. When a terrorist operative applies for a job at the site and undergoes a background check c. When a terrorist attempts a rehearsal by attempting to penetrate the facility d. When the terrorists arrive at the site to conduct the attack

d. When the terrorists arrive at the site to conduct the attack

There has been a hostage-taking in a building on your employer's property. What items of information would be valuable to hostage response teams? a. The physical layout of the facility b. The numbers and descriptions of hostage takers c. Psychological and background information on all those involved in the incident d. Numbers, identities, and descriptions of the hostages e. All of the above

e. All of the above


Conjuntos de estudio relacionados

Applied Business Economics Exam 3

View Set

Ch. 04 Civil Liberties InQuizitive

View Set

Quiz Mendelian Genetics and Extensions of Mendelian Genetics

View Set

Earth and Life Science Module 1 Reviewer

View Set

Chapter 59-Care of Clients with Diabetes Mellitus MED SURG QUESTIONS

View Set

Postural Drainage Techniques and Precautions/Contraindications

View Set

Real Estate Finance and Investments: Chapter 9: Income-Producing Properties: Leases, Rents, and the Market for Space [Due 1/15/20]

View Set