2nd Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The average shoplifter is caught with stolen merchandise in their possession worth approximately

$200

It has been estimated that retail organizations lose __________of their sales and 25% of their profits to loss and theft of merchandise

1 to 2%

Workplace violence costs organizations an estimated ________ lost workdays per year at a cost estimated at over _____________.

3-7 million; $192 million

The three basic surveillance methods are loose, close, and

A combination of the two

Conducting private investigations involves many services, including those providing activities such as

All of the above

Domestic violence can be physical, sexual,

All of the above

Examples of structural barriers include

All of the above

Fraudulent disbursements include

All of the above

Information becomes intelligence after it has been

All of the above

Master keys can be used in what types of locks?

All of the above

The U.S. Department of Labor advised that security professionals are responsible for all except

Apprehending suspects in a workplace violence scene where an employee is being intimidated

A common behavioral factor when identifying shoplifters include all of the following except

Ask an employee where certain items may be located

Managing and protecting both physical property and information storage capacity is referred to as

Asset protection

The acronym BAI stands for

Behavioral analysis interview

Three types of barriers that can be used to delay an adversary's access include all except

Built in barriers

A normal key that is specially altered and manipulated to open locks is called a(n)

Bump key

What crime is the most common and most costly affecting businesses?

Burglary

What program involves businesses and community groups taking steps to reduce opportunities for crime in and around business locations?

Business watch

For security professionals, the art of networking can be critical to

Career success

A type of surveillance system that is used to transmit a signal from cameras set up in a specific place to a limited set of monitors

Closed-circuit television

A type of video surveillance system that is used to transmit a signal from cameras set up in a specific place to a limited set of monitors

Closed-circuit television

Because security professionals are more engaged with preventing loss and theft than the display of merchandise, it is critical that they

Collaborate with employees responsible for item placement and display

Public enforcement investigators focus on

Criminal investigations after a crime has already occurred

Industrial Control System-Cyber Emergency Response Team (ICS-CERT) is part of what government organization?

DHS

The act of making or keeping something or someone safe is called

Defense

CPTED has its roots in the practice of

Defensible space

The first step in the process of designing a security system is

Determine its objectives

Most of the strategies implemented by retail security professionals involve

Discouraging or disrupting shoplifters

The first step an individual should do when there is an active shooter is

Evacuate if possible

The U.S. Fire Administration is part of what organization?

FEMA

A safe or vault can protect against forced entry and fire

False

A vault is a metal box with a high-security locking device

False

Active shooters are adversaries or assailants with an objective to kill as many people as possible at a random location

False

Activities such as downsizing, outsourcing, and others aimed at organizational restructuring can cause tension in the workplace and always leads to workplace violence

False

An infrared sensor is a type of active sensor

False

Any person, document, or activity that provides information of an investigative nature is a witness

False

Approximately 44% of shrinkage is attributed to shoplifting, the most common source

False

Communication skills are not critical for investigators as long as they have good listening and observation skills

False

Corporate security professionals are not allowed to perform undercover investigations

False

Employees should not keep communication during an active shooter incident

False

Ground lighting focused away from the trees is most effective for deterring adversaries

False

In combating organized retail crime, product placement means keeping high value items near customer service where they can be closely monitored

False

Liaison for security professionals means building strategic relationships with individuals and organizational representatives of an industry for which you have no similar career qualities

False

More often than not, an incident of workplace violence is gang related

False

ORC groups are not very diversified or innovative

False

OSHA considers smoke detectors the best for protecting areas with high ceilings

False

Restricting personal belongings on the sales floor is counterproductive in discouraging employee theft

False

Security professionals are responsible for providing feedback to employees regarding the outcome of their reports

False

Security professionals have no need to coordinate with local law enforcement and emergency responders prior to an actual emergency

False

Security professionals should never use a firearm in a defensive posture

False

Social media has no correlation with in workplace violence

False

The first level of defense when faced with an active shooter is to attempt to incapacitate the shooter

False

The presence of any of negative behaviors means that a violent act will likely occur

False

The process used to design a security system uses different considerations and steps for different levels of security

False

There are two general types of surveillance: stationary and interval

False

While shoplifting surveys show that focusing on people and groups who have a higher percentage of shoplifting can pay off some retail security professionals will use profiling techniques by identifying suspects based on proven statistics

False

Witnesses should always be interviewed with others with them when a crime or incident occurred

False

What organization uses the acronym FMC?

Federal Maritime Commission

Flash mobs are also referred to as

Flash-gang-banging

The two principles that guide the actions of security professionals are duty or legal obligation and __________

Foresee-ability

The intentional use of deception to cause an individual to give up property or some other lawful right is termed

Fraud

According to the FBI some organizations are more likely to experience workplace violence, such as

Gas stations

Insurance fraud can be

Hard or soft

Employees experiencing the largest number of assaults are those in the

Healthcare occupations

A detector that is ideal for dirty environments where dense smoke is produced is a(n)

Heat detector

Canvass interviews are conducted

In areas surrounding the location where criminal acts are committed

An unexpected event that did not cause injury or damage this time but had the potential to do so is considered a(n)

Incident

In addition to personal qualities that are conducive to violence, there are also_______________________ that define a typical workplace violator

Institutional characteristics

The unique security requirements of specific organizations, foundations and associations is called

Institutional security

Which is not a type of security force?

Intrusion detectors

The Employee Polygraph Protection Act of 1988 allows polygraph examinations to be used in connection with

Jobs in security

Access controls is based on

Least privilege

The National Crime Prevention Council suggests that a good workplace lighting strategy includes all except

Lighted gates

When conducting security operations in a foreign country, it is often necessary to establish and conduct a liaison with local law enforcement, all local security, and

Local intelligence agencies

Characteristics of an amateur shoplifter include all except

May visit store well in advance of the actual theft

OSHA stands for

None are correct

Undercover operations are a useful option to investigate crimes involving

None of the above

ORC stands for

Organized Retail Crime

The U.S. Department of Energy separates human adversaries into three classes: Insiders, Outsiders, and

Outsiders in collusion with insiders

The primary focus of physical security is

Perimeter Security

A misuse of profiling by security professionals is based on

Personal bias

Workplace security encompasses many practices to secure the workplace, such as risk management, __________________, cybersecurity, and loss prevention practices

Physical security

The most widely used lock in the U.S. for exterior and interior building doors is the

Pin tumbler lock

The investigative mindset contains five principles: Understanding the source of material; Examination; Recording and collation; Evaluation; and

Planning and preparation

One of the primary legal concerns when using video surveillance systems is

Privacy issues

Private sector investigators are more likely to be ______ than public law enforcement

Proactive

Organized crime networks are drawn to pharmaceutical crimes by the significant

Profit potential

Two accredited standards developers created the American National Standard. They are ASIS and

SHRM

Specific behaviors related to potential workplace violators include all of the following except

Sleeping on the job

What does the acronym SHRM stand for?

Society for Human Resource Management

During a covert operation after you've assumed a vantage point you are likely to discern an even better vantage point. In the best-case scenario you should

Stay there

CPTED is based on

The application of common sense and awareness about how people use their space

Recovery refers to

The restoration of full levels of service delivery following an incident

Employers must promote a work environment free from

Threats and violence

A primary focus of physical security is perimeter security

True

ANSI's standards recommendations are intentionally broad in order for flexibility

True

An effective and reliable investigation has five qualities: Objectivity, thoroughness, relevance, accuracy, and timeliness

True

An investigation can help identify why risk control measures failed

True

Biometric devices differentiate between verification and recognition

True

Class B extinguishers are used on fires involving liquids, greases, and gases

True

Employee theft is the primary cause of inventory shrinkage

True

Employees who steal are frequently involved in other counterproductive workplace activities

True

Generally, reports should be complete stand-alone documents

True

Having an interlinked and complementary policy may provide additional security for adjacent organizations

True

Intimidation is an act of workplace violence

True

It is an employee's responsibility to accept and follow an employer's preventive policies and practices

True

Managers must have access to the necessary resources and expertise to manage shrinkage effectively in a retail environment in which shopper satisfaction is paramount

True

Mechanical locks are subject to a variety of attacks that can result in their failure or compromise

True

Payments with debit and credit cards have recently become more secure by banks or credit unions replacing the magnetic strips with chips

True

Physical security systems protect assets from threats by integrating physical protective measures and security procedures

True

Security personnel should not interfere in any way with a law enforcement investigation

True

Security professionals can increase their professional relationships by asking their acquaintances for introductions and the contact information of people with whom they want to be acquainted, and other networking strategies

True

Security professionals should take steps to implement a workplace violence prevention program after an assessment is conducted on the organizations vulnerability to violence

True

Security professionals, in all organizations, must plan for active shooter events and stay abreast of industry best practices

True

Some security professionals specialize in cyber crimes or computer crimes, such as identity theft, finding the source of harassing emails, and identifying people who illegally downloaded copyrighted material

True

The goal of CPTED is to make unauthorized access difficult and time consuming, not to prevent it.

True

The intelligence cycle is the foundation of the intelligence analysis process, at both operational and strategic levels

True

The key distinction between threats to physical security is their cause

True

The preferred method of surveillance is to use a building that provides an unobstructed view of the area or person being observed

True

The primary purpose of surveillance is to obtain information about the subject or subjects under investigation

True

The process of assessing an active shooter situation and evaluating options should continue until the threat is over

True

The term retail security also refers to retail loss prevention

True

Using profiling based on demographic characteristics may have far less value than using behavioral characteristics

True

When combined with a recording system, a video surveillance system can provide vital information about security events

True

Another name for a dead-bolt lock

Tubular dead bolt

Another name for a deadbolt lock

Tubular dead bolt

Who investigates reports of counterfeiting cosmetics?

U.S. Food and Drug Administration

What 3 government entities are charged with investigating healthcare fraud? Federal Bureau of Investigation; Office of Inspector General; and

U.S. Postal Service

Who investigates violations involving the counterfeiting of U.S. obligations and securities?

U.S. Secret Service

The first needed response to an active shooter incident is to figure out

What is occurring

A crime committed by a person of respectability and high social status in the course of their occupation is considered a

White-Collar crime

Once an assessment of the workplace's vulnerability to violence is conducted, security professionals should take steps to implement a

Workplace violence prevention program

The best protection employers can offer toward workplace violence is a(n)

Zero-tolerance policy


Ensembles d'études connexes

NR 206 Collecting Subjective Data: The Interview and Health History

View Set

ECON 120 ch 9: Savings, Interest Rates, and the Market for Loanable Funds

View Set

Acid Base, Blood gases and Electrolytes

View Set

CCNA 2 Chapter 8 Exam Answers Fall 2017

View Set

Peds Evolve Quizzing Cardiovascular

View Set

There are three types of bonding.

View Set

Pre-Production, Production, and Post-Production

View Set

Chapter 5-8 Study Guide Microeconomics

View Set

Social Roles/Social Norms/Social Influence

View Set

Utah Real Estate: Application and Underwriting 2 ch 28

View Set