Unit 2: 5, 6, 7, 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The ACME corporation has a machine that costs $1.2 million to purchase and install. The intrinsic value of this item is referred to as its ______________ value.

Absolute

Which of the areas in a hospital experiences the greatest threat of violence?

Emergency rooms

This is a secret word, phrase or number:

Password

Shipping containers equipped with Global Positioning Satellite technologies are called:

Smart Containers

Approximately how much trade is by sea, according to the text?

90 percent

Which of the following has been identified as the weakest link or component of aviation security

Air Cargo Security

A convenience store creates new policies and procedures related to security in an effort to reduce the risk of late nigh armed robberies. What type of prevention strategy for Workplace Violence is this?

An Administrative Control

What is the most valuable asset that zoos need to protect, according to the text?

Animals

This is the process of assigning "value" to information:

Asset classification

The three elements of any payment fraud includes failures in payment initiation, approval, and:

Authentication

These are individuals whose primary duty is courtroom security:

Baliffs

A shoplifter steals a jacket that has a dye tag attached to it. Later, the shoplifter tries to remove the dye tag, staining the jacket and making it unwearable. What type of shoplifting prevention strategy was used by the retailer in this example?

Benefit Denial

A retailer has a problem with staff not properly checking shopping carts, leading to a high volume of merchandise "being wheeled out of the store." As a security consultant what would you recommend installing in checkout lanes to prevent this specific problem?

Bottom of the Basket Detectors

What agency is primarily responsible for cargo security?

CBP

Based on the readings, what type of institution has the most sophisticated surveillance systems?

Casinos

This federal law requires all colleges and universities that participate in federal financial aid to disclose and publish information about crime:

Clery Act

Some companies may conduct background investigations periodically or continuously post-hire to ensure that employees have on-going suitability and trust to hold their positions. This is called:

Continued Reliability

Hackers engage in a series of activities when breaking into and compromising a computer network or system. In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:

Covering their tracks

The use of controlled space, the relocation of gathering areas and clearly marked transitional zones is best associated with which of the following?

Crime Prevention through Environmental Design (CPTED)

The framework of interdependent networks of systems comprising the United States' industries, institutions, and distribution facilities is known as:

Critical Infrastructure and Key Resources (CIKR)

There are three components of any executive protection plan. Which of the following IS NOT one of those components?

Critical Response

What is a relatively unique security issue for theme parks, compared to other institutions?

Crowd Management

This term is related to the transmission of data being transferred in order to make it unintelligible to an unauthorized interceptor of that information:

Cryptographic Security

These are criminal activities where computers and computer networks are the target, tool, instrument, or place of criminal activity:

Cybercrimes

This is the protection of information, computers, networks, and software:

Cybersecurity

Which of the following is a key element of hotel security?

Emergency Management

These notify students and college personnel about emergency and other hazardous situations

Emergency Notification Systems

The primary motives for individuals who commit corporate kidnapping is _______________ in nature.

Financial

Another name for computer intruders is:

Hackers

This is the protection of information and information systems:

INFOSEC

The practice of ensuring security in manufacturing environments is what type of security?

Industrial Security

This is a discrete and integrated set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination or disposition of information:

Information System

Theft by individuals employed by a retail organization is called:

Internal Theft

During an interview of a potential new employee, a security manager explains that the position requires a rotating shift and the new hire would have to work in cold settings.

It is a realistic job preview

Which of the following IS CORRECT regarding Operations Security?

Its efforts are directed at the protection of critical information

This is the process of breaking down a job to its essential tasks and activities:

Job Task Analysis

These are nonphysical means of protecting data in information systems. They include firewalls and software-based control measures:

Logical Controls

These are passageways that have two interlocking doors on each side, where one door must be closed before the other can open:

Mantraps

These laws grant or allow retailers to arrest shoplifters for misdemeanor-related offenses:

Merchant Privilege Laws

Which of the following IS NOT CORRECT regarding school violence?

Most attackers threatened their targets prior to advancing the attack

Which of the following IS CORRECT regarding bank robberies?

Most robberies are committed at branch locations

Crime Prevention Through Environmental Design (CPTED) is a common used strategy used to enhance levels of security in organizations. ______________ surveillance involves the placement of physical features that maximize visibility.

Natural

The protection of a company and human assets against accidents, injuries, and harm is known as:

Occupational Safety

An employer has specific policies and procedures related to the creation and protection of passwords. All employees are also trained on the importance of protecting their passwords. What term is related to these activities?

Password Stewardship

These are unique identifiers that are necessary to gain access to log onto a computer system:

Passwords

A person receives an e-mail stating that his bank account has been compromised. The email then requests that the person submits his bank account and social security number to an internet address provided to him to verify his identify. What type of computer security-related fraud is this?

Phishing

These types of retail crimes occur when store employees defraud their employer through sales of return-related activities:

Point of Sale Theft

Theft from museums is a security issue. In this type of theft, the insider threat consults with dealers or other individuals who can sell the stolen item.

Pre-Determined

What is the primary goal of the Container Safe Initiative (CSI)?

Protecting the US against a terrorist attack where the container is used to deliver the weapon

This stage of the executive protection process involves conducing a security audit or survey to identify any threats that could exist:

Risk Assessment

Generally, there are three types of access control policies. They conclude: discretionary, mandatory and ________________ policies.

Role-based

This is the depth and degree of security-related knowledge that organizational members possess, apply, and use in the workplace:

Security Awareness

A customer in a retail establishment does not scan all of their merchandise at the checkout, defrauding the retailer in the process. What type of retail crime has occurred here?

Self-Scan Kiosk Fraud

According to the text, the majority of retail loss be attributed to:

Shoplifting

The reduction in inventories not accounted for through sales is called:

Shrinkage

In some cases employees are taught to be aware of their surroundings and "trusting their gut" or having an intuition that something might be threatening while travelling abroad.

Situational Awareness Training

This form of ATM debit card/theft occurs when a threat installs a card reader device on an ATM machine to steal the magnetic information from the user's card:

Skimming

Psychologically manipulating people to divulge confidential information is known as:

Social Engineering

A person logs onto a hoax website that subsequently launches a program that then infects the user's computer or computer system. What is this called?

Spoofing

Which of the following IS NOT a policy and work practice to prevent bank robbery identified in the textbook?

Target hardening staff through self-defense training

This group of individuals arrives at the principal's location prior to that person actually arriving. Their task is to identify additional threats to the principal's safety and security.

The Advance Team

This federal legislation created the Transportation Security Administration:

The Aviation and Transportation Security Act of 2001

At the federal level, what agency is responsible for courthouse security?

The US Marshals Service

Joe Traveler is abducted while on business in Mexico. How would you classify Joe as a victim of kidnapping?

The secondary victim

The two most common security threats against museums are:

Theft and Vandalism

There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, a malicious piece of code or secretly installed or implanted into a computer system:

Virus

What is one of the factors that make security in religious institutions difficult, compared to other institutions?

Welcoming to all and often on a 24-hour basis

These are violent acts, including both physical assaults and threats of assaults, directed against workers in the workplace:

Workplace Violence

Which of the following is the greatest concern for companies, in the context of personnel security?

Workplace violence

There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, self-replicating programs are installed, copied, and spread them to other machines:

Worms

Large events that are often international in nature and attract a large numbers of spectators and tourists are also known as _________________ events.

mega


संबंधित स्टडी सेट्स

Chapter 16 - Fluid and Chemical Balance

View Set

The General Journal & the G/L (TRUE/FALSE EXERCISE)

View Set

APEC Architect Operations Manual

View Set

Chapter 9: Teaching and Counseling

View Set

Organizational Behavior Chapter 7

View Set

Real Bis: VA Law and Regulations - Chapter 6

View Set

MS Chapter 38 Women Reproductive

View Set

Chapter 20: Heart Failure and Circulatory Shock

View Set

Penny chapters 3 & 4 Biliary tree

View Set

CCNA (200-301) Practice Exam (ENSA v7.0)

View Set