CJ 385

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The first function of the public information and warning by the CDC is to

Activate the emergency public information system

Without use of an ICS response typically

All of the Above

Information becomes intelligence after it has been

All of the above (processed, evaluated, and analyzed)

A common behavioral factor when identifying shoplifters include all of the following except

Ask an employee where certain items may be located

Types of information sough during social engineering include all the following except

Company address

The acronym COOP stands for

Continuity of Operations

NIMS was developed by ___________ and issued in March 2004

DHS

The Department of the Interior is responsible for

Developing policies and procedures for all types of hazards and emergencies

Insurance fraud can be

Hard or soft

Another term for employee theft is

Internal theft

Presidential Policy Directive (PPD) 8, released in March 2011, was designed to develop policy and planning guides to ___________ for natural and human-made disasters

Prepare

At the Core, the primary mission of public-sector responders is to protect the community while the primary mission of private-sector responders is to

Protect the company's assets

Religious extremists are willing to kill because they embrace specific theologies that sanction violence in the ___________ of their God.

Service

CIKR protection process begins with a

Vulnerability Assessment

The average shoplifter is caught with stolen merchandise in their possession worth approximately

$200

It has been estimated that retail organizations lose ___________ of their sales and 25% of their profits to loss and theft of merchandise.

1 to 2%

PPD-21 identified ___________ infrastructure sectors.

16

The three basic surveillance methods are loose, close, and

A combination of the two

The FRP established both an all-hazards and functions-based approach to emergency management that aimed for

A coordinated and efficient use of resources during disasters

Today's threats often asymmetrically blend national and homeland security threats and require

A response by a public-private partnership

Domestic Terrorist Groups include

All of the above

Fraudulent disbursements include

All of the above

Conducting private investigations involves many services, including those providing activities such as

All the above

Identifiable levels of expertise or motivation of black hackers are referred to as

All the above

The Harakat al-Shabaab al-Mujahidin known as Al-Shabaab was the clan-based insurgent and terrorist Group that served

As the militant wing of the Somali Council of Islamic Courts

Managing and protecting both physical property and information storage capacity is referred to as

Asset Protection

Book Haram promotes a version of Islam that forbids Muslims to take part in any political or social activity

Associated with society in the west

The acronym BAI stands for

Behavioral Analysis Interview

BYOD is an Acronym for

Bring you own device

What crime is the most common and most costly affecting businesses?

Burglary

Security professionals designated as CISSPs define the architecture, design, management, and/or controls that assure the security of ___________ environments.

Business

What program involves businesses and community groups taking steps to reduce opportunities for crime in and around business locations?

Business Watch

What was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024

CISSP

What state uses the Standardized Emergency Management System (SEMS)?

California

During a covert operation after you've assumed a vantage point you are likely to discern an even better vantage point. In the best case scenario you should

Call in reinforcement and go to a new vantage point

For security professionals, the art of networking can be critical to

Career success

NIMS standard incident command structures are based on all except

Centers for Disease Control

Programmers with malicious intent can use the technique of code injection to introduce code into a computer program to cause the processing of invalid data by

Changing the course of code execution

DHS has personnel in more than 75 countries, the 3rd largest ___________ of any U.S. agency working overseas.

Civilians Blueprint

Because security professionals are more engaged with preventing loss and theft than the display of merchandise, it is critical that they

Collaborate with employees responsible for item placement and display

The key to any collaboration effort is

Communication

The target corporations is committed to partnering with law enforcement and public safety organizations to build stronger, safer ___________ across the nation.

Communities

Which of the following is not one of three primary areas of cybercrime?

Computer firewall crime

The lowest level of government classified data is labeled

Confidential

The grid enables more competition between providers, better use of energy, and the use of market forces to drive ___________

Conservationism

Private security organizations are often more advanced than the public sector in the use of technology to prevent the detect crime, investigation of high-tech and economic crime, and

Crime and loss prevention

Public enforcement investigators focus on

Criminal investigations after a crime has already occured

An incident or situation involving a threat to a specific country, it territories, citizens, military forces, possessions, or national security interests is a

Crisis

The first suggested guideline in a vulnerability analysis is to set goals, objectives, and ___________

Criteria

Citizen participation is ___________ in the recovery stage for its successful emergency management implementation

Critical

Business disruptions can mean lost revenues and profits, as well as the permanent loss of some ___________, a cost not covered by insurance.

Customers

Homeland security is controlled and shaped 3 main concepts: security, resilience, and

Customs and exchange

Identity theft is described as

Cyber Crime

PS-Prep is a program that has prioritized the preparedness of the private sector by what organization?

DHS

What organization has prioritized the preparedness of the private sector through PS-Prep?

DHS

Expressed or implied threat is communicating a spoken or written threat to ___________ facility/infrastructure.

Damage

Due to attacks on critical infrastructure, protection of CIKR is a national concern and triggered a variety of actions.

Designed to mitigate and minimize risk.

Dangerous events that are concentrated in time and space that sit-ups the social structure and prevent certain societal functions is termed a

Disaster

Most of the strategies implemented by retail security professionals involve

Discouraging or disrupting shoplifters

The acronym DDoS stands for

Distributed Denial of Service

LEAPS acts as a catalyst for a change and an advocate for new ideas in what U.S. city

El Paso

A functions-based approach to emergency management is used when a community or jurisdiction focuses their planned response on the potential effects of

Emergencies

An extraordinary situation in which people are unable to meet their basic survival needs is considered a

Emergency

Who does OSHA frequently consider responsible for employee deaths and injuries during a robbery?

Employer

The ICS approach helps the incident commander to safely and effectively manage and employ resources, and

Ensures responder safety through a coordinated planning and response effort

Studies show that the effective deterrent against all forms of external theft is

Excellent customer service

What policy delegated the function of the President under Section 892 of the Homeland Security Act to the Secretary Homeland

Executive Order 13311 (2003)

The U.S. Bureau of Justice Assistance defines a Terrorism Threat Assessment as a systematic effort conducted to identify and evaluate

Existing or potential terrorist threats to a jurisdiction and its assets

The Loss Prevention Certificate (LPC) is an advanced certification for ___________ professionals such as multi-unit, field and corporate LP management

Experienced

Who investigated reports of counterfeiting cosmetics?

FDA

Which President initiated the use of government funding for emergency management concerns to stimulate local economies?

FDR

In the U.S., who typically takes the lead in protection services?

Federal Departments and Agencies

Extreme right-wing groups are extremist groups that are

Fiercely nationalistic

Flash mobs are also referred to as

Flash-gangbanging

The ICS approach is designed to be ___________ and can be used incidents of any type, space, or complexity.

Flexible

Homeland Security Presidential Directive 7 established U.S. policy for critical infrastructure protection by providing a(n) ___________ to identify, prioritize, and protect critical infrastructure.

Framework

The intentional use of deception to cause an individual to give up property or some other lawful right is termed

Fraud

The information-sharing strategy described in the NIPP includes connections between many ___________ and private organizations.

Government

Terrorists mostly influenced by foreign groups or individuals are called

HVE

The next big problem to be faced by utilities security professionals

Hasn't been born yet

Violent Extremists are generally characterized as being: Polarized, absolutists; threat-oriented, and

Hateful

Small businesses contribute to all aspects of ___________ and Emily more than half of all private-sector workers.

Homeland Security

The National consortium for (START) categorizes terrorists by their ___________ motivation

Ideological

The Department of Homeland security overseesNIPP management and ___________ in the U.S.

Implementation

Canvass interviews are conducted

In areas surrounding the location where criminal acts are committed

An unexpected event that not cause injury or damage this time but had the potential to do so is considered

Incident

The various processes and methodologies used to protect print, electronic, and other data is termed

Information Security

Information security is comprised of two categories. The are :

Information assurance and information technology security

Many mesh networks have been installed as part of humanitarian programs, and provide the basic ___________ for connectivity for people who cant afford to pay for or don't have access to proper internet connection.

Infrastructure

What does IASD stand for

Infrastructure Analysis and Strategy Division

A key component of disaster management includes conducting vulnerability assessments of the hazards to the population and to

Infrastructure in political, social, economic, or environmental fields

The ability of a system to work with or use the components of another system is termed

Interoperability

The FBI's public formulation of extremism suggests two components. First, extremism involves following particular ideologies. Second,

It includes using criminal activity to advance these ideologies.

The employee polygraph protection act of 1988 allows polygraph examinations to be used in connection with

Jobs in security

Secure communication includes the encrypted transfer of information, coding or scrambling the informations so that it can only be decoded and read by someone who has the right ___________.

Key

The World Trade Center complex was regarded as a part of our critical infrastructure, not just a ___________, prior 9/11.

Landmark

The use of the internet for terrorist activities includes

Large-scale acts of deliberate disruption of computer networks

When conducting security operations in a foreign country, it is often necessary to establish and conduct a liaison with local law enforcement, all local security, and

Local intelligence agencies

Characteristics of an amateur shoplifter include all of the following except

MAy visit store well in advance of the actual theft

The physical world has effectively merged with the virtual world and potentially every physical object object can be

Made both intelligent and networked

ORC groups are diversified, innovative and

Merchandising

The 4 phases of emergency management are

Mitigation, Preparedness, Response, and Recovery

Which Israeli intelligence agency is responsible for addressing national security overseas?

Mossad

Infragard has a number of special interest groups (SIGs) in which members collaborate and discuss mutual efforts to protect CIKR through ___________ engagement

Multilevel

Strengthening national preparedness is one of the core goals of

NIPP

The acronym NIMS stands for

National Incident Management System

The acronym NRF stands for

National Response Framework

Examples of key resources and assets include all of the following except

None of the above

Undercover operations are a useful option to investigate crimes involving

None of the above

The Hospital Incident Command System (HICS) is used by hospitals in both emergency and ___________ situations

Nonemergency

Security professionals who identify a bomb or reported bomb should immediately

Notify local law enforcement

OSHA stands for

Occupational Safety and Health Administration

ORC stands for

Organized retail crime

A misuse of profiling by security professionals is based on

Personal bias

The investigative mindset contains five principles, what is the fifth?

Planning and Preparation

Step 1 of the information and intelligence cycle identified cycle identified by the DHS is

Planning and requirements development

Extremism has been defined as a radical expression of one's political values and is a to terrorism

Precurser

U.S. Department of State defines terrorism as ___________, politically motivated violence perpetrated against noncombatant target by sub national groups or clandestine agents, usually intended to influence an audience.

Premeditated

The vast majority of the nation's critical infrastructure is owned and operated by the

Private Sector

Private sector investigators are more likely to be ___________ than public law enforcement.

Proactive

The Main goal of cyber/computer security is to ensure the protection of the ___________ of the organization and user against security risks in the cyber environment.

Properties and assets

Trade secrets are entitled to more protection than other ___________ information

Proprietary

The NRF defines the key principles that enable first responders, decision makers, and supporting entities to

Provide a unified national response to domestic incidents

NIMS was developed by DHS to

Provide a universal emergency management system and provide a common technical language.

The federal government generates classified information, while the private sector

Provides information concerning suspicious activities and privately held information

The all-hazards approach to emergency management is

Reason to any incident or event that requires an organized response by a public, private, and/or government entity

ASIS International observed the emergency management is used when a community or jurisdiction focuses their primary objectives: minimize the probability of a threat of emergency, mitigate the impact and ___________ from the emergency and resume normal operations

Recover

The DHS provides CIKR partners with tools, processes, and methodologies to streamline security investment decisions and ___________ vulnerabilities.

Reduce

HITRAC focuses on

Regional critical infrastructure, cyber, and explosives threats

State and local governments in California must use SEMS to be eligible for ___________ of response-related costs under the state's disaster assistance programs.

Reimbursement

Security in cloud computing requires a strategy that addressed shared ___________ in the same environment with a variety of security levels.

Resources

The Patriot Act was intended to significantly reduce ___________ on the way law enforcement agencies gathered intelligence within the U.S.

Restrictions

Reconstitution embodies the ability of an organization to recover from an event that disrupts normal operations and consolidates the necessary resources so that the organization can

Resume its operations as a fully functional entity

Reduction in inventories not accounted for through sales or other legitimate activity is

Retail shrinkage

An umbrella program that coordinates efforts of both public and private security activities with the goal of protecting NYC from terrorist attacks is called

SHIELD

Radicalization primarily occurs through anti-U.S. sermons calling on inmates to embrace

Salafi form of Sunni Islam and Shia Islam

Although the impact of weather-related emergencies has grown in severity, preparedness and ___________ are still the primary focus.

Security

Government security experts chose the term information ___________ to describe the problem of securing both information and digital systems.

Security

PReparation and planning for catastrophe is the responsibility of the

Security professional

Many states and large cities have also established fusion centers to

Share information and intelligence

The DNI, as the head of U.S. Intelligence community us composed of ___________ elements across the U.S.

Sixteen

An effort that supports law enforcement and public safety agencies is called

Target & Blue

What legislation in the U.K criminalized financing terrorism

Terrorism Act of 2000

Which federal agency promulgates federal information technology and cyber security standards?

The Department of Commerce

Terrorism is defined by

The FBI and DOJ

The ability to work from anywhere at any time raises the level of concern about who can access what and

The number of technology assets on the organization's network

An interoperable until it's environment that includes the energy markets and consumer services is called

The smart grid

The dense of a nation's security interests in cyberspace depends on

The talent and ingenuity of the citizens

The continual process of compiling and examining all available information concerning activities, which could target an organization's facility or resources is called a

Threat Anaylsis

A destructive program that disguises itself as a legitimate or app to gain entry to a computer is called a

Trojan Horse

What 3 government entities are charged with investigating healthcare fraud? FBI; Office of Inspector General; and ...

U.S. Postal Service

Who investigates violations involving the counterfeiting of U.S. obligations and securities?

U.S. Secret Service

A black hat is considered an

Unethical hacker

The threat of terrorism, specially regarding crisis management and response, along with bombings and bomb threats

Was among the top 20 security concerns facing Fortune 1000 companies in 2012

A crime committed by a person of respectability and high social status in the course of their occupation is considered

White collar crime

The hacker groups that includes member groups, organizations, and governments who are employed to protect their employers and counteract or neutralize malicious hackers are called

White hat

Adware includes programs that "facilitate delivery of advertising content to the user though their own ___________, or by utilizing another programs interface.

Window


Set pelajaran terkait

Practice for Test 2 (Chapters 9,10,11, & 16)

View Set

Section 5 Intro to buisness test

View Set

помилки числівники + займенники

View Set

N316B: C&F Chapter 27 Disorders of Male Reproductive System

View Set

Chapter 47: Nursing Care of the Child With an Alteration in Immunity/Immunologic Disorder

View Set

Mr. Popper's Penguins Vocabulary Chapters 5-6

View Set

BIO 168 Chapter 7: Skeletal System

View Set