CJ 385
The first function of the public information and warning by the CDC is to
Activate the emergency public information system
Without use of an ICS response typically
All of the Above
Information becomes intelligence after it has been
All of the above (processed, evaluated, and analyzed)
A common behavioral factor when identifying shoplifters include all of the following except
Ask an employee where certain items may be located
Types of information sough during social engineering include all the following except
Company address
The acronym COOP stands for
Continuity of Operations
NIMS was developed by ___________ and issued in March 2004
DHS
The Department of the Interior is responsible for
Developing policies and procedures for all types of hazards and emergencies
Insurance fraud can be
Hard or soft
Another term for employee theft is
Internal theft
Presidential Policy Directive (PPD) 8, released in March 2011, was designed to develop policy and planning guides to ___________ for natural and human-made disasters
Prepare
At the Core, the primary mission of public-sector responders is to protect the community while the primary mission of private-sector responders is to
Protect the company's assets
Religious extremists are willing to kill because they embrace specific theologies that sanction violence in the ___________ of their God.
Service
CIKR protection process begins with a
Vulnerability Assessment
The average shoplifter is caught with stolen merchandise in their possession worth approximately
$200
It has been estimated that retail organizations lose ___________ of their sales and 25% of their profits to loss and theft of merchandise.
1 to 2%
PPD-21 identified ___________ infrastructure sectors.
16
The three basic surveillance methods are loose, close, and
A combination of the two
The FRP established both an all-hazards and functions-based approach to emergency management that aimed for
A coordinated and efficient use of resources during disasters
Today's threats often asymmetrically blend national and homeland security threats and require
A response by a public-private partnership
Domestic Terrorist Groups include
All of the above
Fraudulent disbursements include
All of the above
Conducting private investigations involves many services, including those providing activities such as
All the above
Identifiable levels of expertise or motivation of black hackers are referred to as
All the above
The Harakat al-Shabaab al-Mujahidin known as Al-Shabaab was the clan-based insurgent and terrorist Group that served
As the militant wing of the Somali Council of Islamic Courts
Managing and protecting both physical property and information storage capacity is referred to as
Asset Protection
Book Haram promotes a version of Islam that forbids Muslims to take part in any political or social activity
Associated with society in the west
The acronym BAI stands for
Behavioral Analysis Interview
BYOD is an Acronym for
Bring you own device
What crime is the most common and most costly affecting businesses?
Burglary
Security professionals designated as CISSPs define the architecture, design, management, and/or controls that assure the security of ___________ environments.
Business
What program involves businesses and community groups taking steps to reduce opportunities for crime in and around business locations?
Business Watch
What was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024
CISSP
What state uses the Standardized Emergency Management System (SEMS)?
California
During a covert operation after you've assumed a vantage point you are likely to discern an even better vantage point. In the best case scenario you should
Call in reinforcement and go to a new vantage point
For security professionals, the art of networking can be critical to
Career success
NIMS standard incident command structures are based on all except
Centers for Disease Control
Programmers with malicious intent can use the technique of code injection to introduce code into a computer program to cause the processing of invalid data by
Changing the course of code execution
DHS has personnel in more than 75 countries, the 3rd largest ___________ of any U.S. agency working overseas.
Civilians Blueprint
Because security professionals are more engaged with preventing loss and theft than the display of merchandise, it is critical that they
Collaborate with employees responsible for item placement and display
The key to any collaboration effort is
Communication
The target corporations is committed to partnering with law enforcement and public safety organizations to build stronger, safer ___________ across the nation.
Communities
Which of the following is not one of three primary areas of cybercrime?
Computer firewall crime
The lowest level of government classified data is labeled
Confidential
The grid enables more competition between providers, better use of energy, and the use of market forces to drive ___________
Conservationism
Private security organizations are often more advanced than the public sector in the use of technology to prevent the detect crime, investigation of high-tech and economic crime, and
Crime and loss prevention
Public enforcement investigators focus on
Criminal investigations after a crime has already occured
An incident or situation involving a threat to a specific country, it territories, citizens, military forces, possessions, or national security interests is a
Crisis
The first suggested guideline in a vulnerability analysis is to set goals, objectives, and ___________
Criteria
Citizen participation is ___________ in the recovery stage for its successful emergency management implementation
Critical
Business disruptions can mean lost revenues and profits, as well as the permanent loss of some ___________, a cost not covered by insurance.
Customers
Homeland security is controlled and shaped 3 main concepts: security, resilience, and
Customs and exchange
Identity theft is described as
Cyber Crime
PS-Prep is a program that has prioritized the preparedness of the private sector by what organization?
DHS
What organization has prioritized the preparedness of the private sector through PS-Prep?
DHS
Expressed or implied threat is communicating a spoken or written threat to ___________ facility/infrastructure.
Damage
Due to attacks on critical infrastructure, protection of CIKR is a national concern and triggered a variety of actions.
Designed to mitigate and minimize risk.
Dangerous events that are concentrated in time and space that sit-ups the social structure and prevent certain societal functions is termed a
Disaster
Most of the strategies implemented by retail security professionals involve
Discouraging or disrupting shoplifters
The acronym DDoS stands for
Distributed Denial of Service
LEAPS acts as a catalyst for a change and an advocate for new ideas in what U.S. city
El Paso
A functions-based approach to emergency management is used when a community or jurisdiction focuses their planned response on the potential effects of
Emergencies
An extraordinary situation in which people are unable to meet their basic survival needs is considered a
Emergency
Who does OSHA frequently consider responsible for employee deaths and injuries during a robbery?
Employer
The ICS approach helps the incident commander to safely and effectively manage and employ resources, and
Ensures responder safety through a coordinated planning and response effort
Studies show that the effective deterrent against all forms of external theft is
Excellent customer service
What policy delegated the function of the President under Section 892 of the Homeland Security Act to the Secretary Homeland
Executive Order 13311 (2003)
The U.S. Bureau of Justice Assistance defines a Terrorism Threat Assessment as a systematic effort conducted to identify and evaluate
Existing or potential terrorist threats to a jurisdiction and its assets
The Loss Prevention Certificate (LPC) is an advanced certification for ___________ professionals such as multi-unit, field and corporate LP management
Experienced
Who investigated reports of counterfeiting cosmetics?
FDA
Which President initiated the use of government funding for emergency management concerns to stimulate local economies?
FDR
In the U.S., who typically takes the lead in protection services?
Federal Departments and Agencies
Extreme right-wing groups are extremist groups that are
Fiercely nationalistic
Flash mobs are also referred to as
Flash-gangbanging
The ICS approach is designed to be ___________ and can be used incidents of any type, space, or complexity.
Flexible
Homeland Security Presidential Directive 7 established U.S. policy for critical infrastructure protection by providing a(n) ___________ to identify, prioritize, and protect critical infrastructure.
Framework
The intentional use of deception to cause an individual to give up property or some other lawful right is termed
Fraud
The information-sharing strategy described in the NIPP includes connections between many ___________ and private organizations.
Government
Terrorists mostly influenced by foreign groups or individuals are called
HVE
The next big problem to be faced by utilities security professionals
Hasn't been born yet
Violent Extremists are generally characterized as being: Polarized, absolutists; threat-oriented, and
Hateful
Small businesses contribute to all aspects of ___________ and Emily more than half of all private-sector workers.
Homeland Security
The National consortium for (START) categorizes terrorists by their ___________ motivation
Ideological
The Department of Homeland security overseesNIPP management and ___________ in the U.S.
Implementation
Canvass interviews are conducted
In areas surrounding the location where criminal acts are committed
An unexpected event that not cause injury or damage this time but had the potential to do so is considered
Incident
The various processes and methodologies used to protect print, electronic, and other data is termed
Information Security
Information security is comprised of two categories. The are :
Information assurance and information technology security
Many mesh networks have been installed as part of humanitarian programs, and provide the basic ___________ for connectivity for people who cant afford to pay for or don't have access to proper internet connection.
Infrastructure
What does IASD stand for
Infrastructure Analysis and Strategy Division
A key component of disaster management includes conducting vulnerability assessments of the hazards to the population and to
Infrastructure in political, social, economic, or environmental fields
The ability of a system to work with or use the components of another system is termed
Interoperability
The FBI's public formulation of extremism suggests two components. First, extremism involves following particular ideologies. Second,
It includes using criminal activity to advance these ideologies.
The employee polygraph protection act of 1988 allows polygraph examinations to be used in connection with
Jobs in security
Secure communication includes the encrypted transfer of information, coding or scrambling the informations so that it can only be decoded and read by someone who has the right ___________.
Key
The World Trade Center complex was regarded as a part of our critical infrastructure, not just a ___________, prior 9/11.
Landmark
The use of the internet for terrorist activities includes
Large-scale acts of deliberate disruption of computer networks
When conducting security operations in a foreign country, it is often necessary to establish and conduct a liaison with local law enforcement, all local security, and
Local intelligence agencies
Characteristics of an amateur shoplifter include all of the following except
MAy visit store well in advance of the actual theft
The physical world has effectively merged with the virtual world and potentially every physical object object can be
Made both intelligent and networked
ORC groups are diversified, innovative and
Merchandising
The 4 phases of emergency management are
Mitigation, Preparedness, Response, and Recovery
Which Israeli intelligence agency is responsible for addressing national security overseas?
Mossad
Infragard has a number of special interest groups (SIGs) in which members collaborate and discuss mutual efforts to protect CIKR through ___________ engagement
Multilevel
Strengthening national preparedness is one of the core goals of
NIPP
The acronym NIMS stands for
National Incident Management System
The acronym NRF stands for
National Response Framework
Examples of key resources and assets include all of the following except
None of the above
Undercover operations are a useful option to investigate crimes involving
None of the above
The Hospital Incident Command System (HICS) is used by hospitals in both emergency and ___________ situations
Nonemergency
Security professionals who identify a bomb or reported bomb should immediately
Notify local law enforcement
OSHA stands for
Occupational Safety and Health Administration
ORC stands for
Organized retail crime
A misuse of profiling by security professionals is based on
Personal bias
The investigative mindset contains five principles, what is the fifth?
Planning and Preparation
Step 1 of the information and intelligence cycle identified cycle identified by the DHS is
Planning and requirements development
Extremism has been defined as a radical expression of one's political values and is a to terrorism
Precurser
U.S. Department of State defines terrorism as ___________, politically motivated violence perpetrated against noncombatant target by sub national groups or clandestine agents, usually intended to influence an audience.
Premeditated
The vast majority of the nation's critical infrastructure is owned and operated by the
Private Sector
Private sector investigators are more likely to be ___________ than public law enforcement.
Proactive
The Main goal of cyber/computer security is to ensure the protection of the ___________ of the organization and user against security risks in the cyber environment.
Properties and assets
Trade secrets are entitled to more protection than other ___________ information
Proprietary
The NRF defines the key principles that enable first responders, decision makers, and supporting entities to
Provide a unified national response to domestic incidents
NIMS was developed by DHS to
Provide a universal emergency management system and provide a common technical language.
The federal government generates classified information, while the private sector
Provides information concerning suspicious activities and privately held information
The all-hazards approach to emergency management is
Reason to any incident or event that requires an organized response by a public, private, and/or government entity
ASIS International observed the emergency management is used when a community or jurisdiction focuses their primary objectives: minimize the probability of a threat of emergency, mitigate the impact and ___________ from the emergency and resume normal operations
Recover
The DHS provides CIKR partners with tools, processes, and methodologies to streamline security investment decisions and ___________ vulnerabilities.
Reduce
HITRAC focuses on
Regional critical infrastructure, cyber, and explosives threats
State and local governments in California must use SEMS to be eligible for ___________ of response-related costs under the state's disaster assistance programs.
Reimbursement
Security in cloud computing requires a strategy that addressed shared ___________ in the same environment with a variety of security levels.
Resources
The Patriot Act was intended to significantly reduce ___________ on the way law enforcement agencies gathered intelligence within the U.S.
Restrictions
Reconstitution embodies the ability of an organization to recover from an event that disrupts normal operations and consolidates the necessary resources so that the organization can
Resume its operations as a fully functional entity
Reduction in inventories not accounted for through sales or other legitimate activity is
Retail shrinkage
An umbrella program that coordinates efforts of both public and private security activities with the goal of protecting NYC from terrorist attacks is called
SHIELD
Radicalization primarily occurs through anti-U.S. sermons calling on inmates to embrace
Salafi form of Sunni Islam and Shia Islam
Although the impact of weather-related emergencies has grown in severity, preparedness and ___________ are still the primary focus.
Security
Government security experts chose the term information ___________ to describe the problem of securing both information and digital systems.
Security
PReparation and planning for catastrophe is the responsibility of the
Security professional
Many states and large cities have also established fusion centers to
Share information and intelligence
The DNI, as the head of U.S. Intelligence community us composed of ___________ elements across the U.S.
Sixteen
An effort that supports law enforcement and public safety agencies is called
Target & Blue
What legislation in the U.K criminalized financing terrorism
Terrorism Act of 2000
Which federal agency promulgates federal information technology and cyber security standards?
The Department of Commerce
Terrorism is defined by
The FBI and DOJ
The ability to work from anywhere at any time raises the level of concern about who can access what and
The number of technology assets on the organization's network
An interoperable until it's environment that includes the energy markets and consumer services is called
The smart grid
The dense of a nation's security interests in cyberspace depends on
The talent and ingenuity of the citizens
The continual process of compiling and examining all available information concerning activities, which could target an organization's facility or resources is called a
Threat Anaylsis
A destructive program that disguises itself as a legitimate or app to gain entry to a computer is called a
Trojan Horse
What 3 government entities are charged with investigating healthcare fraud? FBI; Office of Inspector General; and ...
U.S. Postal Service
Who investigates violations involving the counterfeiting of U.S. obligations and securities?
U.S. Secret Service
A black hat is considered an
Unethical hacker
The threat of terrorism, specially regarding crisis management and response, along with bombings and bomb threats
Was among the top 20 security concerns facing Fortune 1000 companies in 2012
A crime committed by a person of respectability and high social status in the course of their occupation is considered
White collar crime
The hacker groups that includes member groups, organizations, and governments who are employed to protect their employers and counteract or neutralize malicious hackers are called
White hat
Adware includes programs that "facilitate delivery of advertising content to the user though their own ___________, or by utilizing another programs interface.
Window