Unit 2: 5, 6, 7, 8
The ACME corporation has a machine that costs $1.2 million to purchase and install. The intrinsic value of this item is referred to as its ______________ value.
Absolute
Which of the areas in a hospital experiences the greatest threat of violence?
Emergency rooms
This is a secret word, phrase or number:
Password
Shipping containers equipped with Global Positioning Satellite technologies are called:
Smart Containers
Approximately how much trade is by sea, according to the text?
90 percent
Which of the following has been identified as the weakest link or component of aviation security
Air Cargo Security
A convenience store creates new policies and procedures related to security in an effort to reduce the risk of late nigh armed robberies. What type of prevention strategy for Workplace Violence is this?
An Administrative Control
What is the most valuable asset that zoos need to protect, according to the text?
Animals
This is the process of assigning "value" to information:
Asset classification
The three elements of any payment fraud includes failures in payment initiation, approval, and:
Authentication
These are individuals whose primary duty is courtroom security:
Baliffs
A shoplifter steals a jacket that has a dye tag attached to it. Later, the shoplifter tries to remove the dye tag, staining the jacket and making it unwearable. What type of shoplifting prevention strategy was used by the retailer in this example?
Benefit Denial
A retailer has a problem with staff not properly checking shopping carts, leading to a high volume of merchandise "being wheeled out of the store." As a security consultant what would you recommend installing in checkout lanes to prevent this specific problem?
Bottom of the Basket Detectors
What agency is primarily responsible for cargo security?
CBP
Based on the readings, what type of institution has the most sophisticated surveillance systems?
Casinos
This federal law requires all colleges and universities that participate in federal financial aid to disclose and publish information about crime:
Clery Act
Some companies may conduct background investigations periodically or continuously post-hire to ensure that employees have on-going suitability and trust to hold their positions. This is called:
Continued Reliability
Hackers engage in a series of activities when breaking into and compromising a computer network or system. In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:
Covering their tracks
The use of controlled space, the relocation of gathering areas and clearly marked transitional zones is best associated with which of the following?
Crime Prevention through Environmental Design (CPTED)
The framework of interdependent networks of systems comprising the United States' industries, institutions, and distribution facilities is known as:
Critical Infrastructure and Key Resources (CIKR)
There are three components of any executive protection plan. Which of the following IS NOT one of those components?
Critical Response
What is a relatively unique security issue for theme parks, compared to other institutions?
Crowd Management
This term is related to the transmission of data being transferred in order to make it unintelligible to an unauthorized interceptor of that information:
Cryptographic Security
These are criminal activities where computers and computer networks are the target, tool, instrument, or place of criminal activity:
Cybercrimes
This is the protection of information, computers, networks, and software:
Cybersecurity
Which of the following is a key element of hotel security?
Emergency Management
These notify students and college personnel about emergency and other hazardous situations
Emergency Notification Systems
The primary motives for individuals who commit corporate kidnapping is _______________ in nature.
Financial
Another name for computer intruders is:
Hackers
This is the protection of information and information systems:
INFOSEC
The practice of ensuring security in manufacturing environments is what type of security?
Industrial Security
This is a discrete and integrated set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination or disposition of information:
Information System
Theft by individuals employed by a retail organization is called:
Internal Theft
During an interview of a potential new employee, a security manager explains that the position requires a rotating shift and the new hire would have to work in cold settings.
It is a realistic job preview
Which of the following IS CORRECT regarding Operations Security?
Its efforts are directed at the protection of critical information
This is the process of breaking down a job to its essential tasks and activities:
Job Task Analysis
These are nonphysical means of protecting data in information systems. They include firewalls and software-based control measures:
Logical Controls
These are passageways that have two interlocking doors on each side, where one door must be closed before the other can open:
Mantraps
These laws grant or allow retailers to arrest shoplifters for misdemeanor-related offenses:
Merchant Privilege Laws
Which of the following IS NOT CORRECT regarding school violence?
Most attackers threatened their targets prior to advancing the attack
Which of the following IS CORRECT regarding bank robberies?
Most robberies are committed at branch locations
Crime Prevention Through Environmental Design (CPTED) is a common used strategy used to enhance levels of security in organizations. ______________ surveillance involves the placement of physical features that maximize visibility.
Natural
The protection of a company and human assets against accidents, injuries, and harm is known as:
Occupational Safety
An employer has specific policies and procedures related to the creation and protection of passwords. All employees are also trained on the importance of protecting their passwords. What term is related to these activities?
Password Stewardship
These are unique identifiers that are necessary to gain access to log onto a computer system:
Passwords
A person receives an e-mail stating that his bank account has been compromised. The email then requests that the person submits his bank account and social security number to an internet address provided to him to verify his identify. What type of computer security-related fraud is this?
Phishing
These types of retail crimes occur when store employees defraud their employer through sales of return-related activities:
Point of Sale Theft
Theft from museums is a security issue. In this type of theft, the insider threat consults with dealers or other individuals who can sell the stolen item.
Pre-Determined
What is the primary goal of the Container Safe Initiative (CSI)?
Protecting the US against a terrorist attack where the container is used to deliver the weapon
This stage of the executive protection process involves conducing a security audit or survey to identify any threats that could exist:
Risk Assessment
Generally, there are three types of access control policies. They conclude: discretionary, mandatory and ________________ policies.
Role-based
This is the depth and degree of security-related knowledge that organizational members possess, apply, and use in the workplace:
Security Awareness
A customer in a retail establishment does not scan all of their merchandise at the checkout, defrauding the retailer in the process. What type of retail crime has occurred here?
Self-Scan Kiosk Fraud
According to the text, the majority of retail loss be attributed to:
Shoplifting
The reduction in inventories not accounted for through sales is called:
Shrinkage
In some cases employees are taught to be aware of their surroundings and "trusting their gut" or having an intuition that something might be threatening while travelling abroad.
Situational Awareness Training
This form of ATM debit card/theft occurs when a threat installs a card reader device on an ATM machine to steal the magnetic information from the user's card:
Skimming
Psychologically manipulating people to divulge confidential information is known as:
Social Engineering
A person logs onto a hoax website that subsequently launches a program that then infects the user's computer or computer system. What is this called?
Spoofing
Which of the following IS NOT a policy and work practice to prevent bank robbery identified in the textbook?
Target hardening staff through self-defense training
This group of individuals arrives at the principal's location prior to that person actually arriving. Their task is to identify additional threats to the principal's safety and security.
The Advance Team
This federal legislation created the Transportation Security Administration:
The Aviation and Transportation Security Act of 2001
At the federal level, what agency is responsible for courthouse security?
The US Marshals Service
Joe Traveler is abducted while on business in Mexico. How would you classify Joe as a victim of kidnapping?
The secondary victim
The two most common security threats against museums are:
Theft and Vandalism
There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, a malicious piece of code or secretly installed or implanted into a computer system:
Virus
What is one of the factors that make security in religious institutions difficult, compared to other institutions?
Welcoming to all and often on a 24-hour basis
These are violent acts, including both physical assaults and threats of assaults, directed against workers in the workplace:
Workplace Violence
Which of the following is the greatest concern for companies, in the context of personnel security?
Workplace violence
There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, self-replicating programs are installed, copied, and spread them to other machines:
Worms
Large events that are often international in nature and attract a large numbers of spectators and tourists are also known as _________________ events.
mega