2nd Midterm
The average shoplifter is caught with stolen merchandise in their possession worth approximately
$200
It has been estimated that retail organizations lose __________of their sales and 25% of their profits to loss and theft of merchandise
1 to 2%
Workplace violence costs organizations an estimated ________ lost workdays per year at a cost estimated at over _____________.
3-7 million; $192 million
The three basic surveillance methods are loose, close, and
A combination of the two
Conducting private investigations involves many services, including those providing activities such as
All of the above
Domestic violence can be physical, sexual,
All of the above
Examples of structural barriers include
All of the above
Fraudulent disbursements include
All of the above
Information becomes intelligence after it has been
All of the above
Master keys can be used in what types of locks?
All of the above
The U.S. Department of Labor advised that security professionals are responsible for all except
Apprehending suspects in a workplace violence scene where an employee is being intimidated
A common behavioral factor when identifying shoplifters include all of the following except
Ask an employee where certain items may be located
Managing and protecting both physical property and information storage capacity is referred to as
Asset protection
The acronym BAI stands for
Behavioral analysis interview
Three types of barriers that can be used to delay an adversary's access include all except
Built in barriers
A normal key that is specially altered and manipulated to open locks is called a(n)
Bump key
What crime is the most common and most costly affecting businesses?
Burglary
What program involves businesses and community groups taking steps to reduce opportunities for crime in and around business locations?
Business watch
For security professionals, the art of networking can be critical to
Career success
A type of surveillance system that is used to transmit a signal from cameras set up in a specific place to a limited set of monitors
Closed-circuit television
A type of video surveillance system that is used to transmit a signal from cameras set up in a specific place to a limited set of monitors
Closed-circuit television
Because security professionals are more engaged with preventing loss and theft than the display of merchandise, it is critical that they
Collaborate with employees responsible for item placement and display
Public enforcement investigators focus on
Criminal investigations after a crime has already occurred
Industrial Control System-Cyber Emergency Response Team (ICS-CERT) is part of what government organization?
DHS
The act of making or keeping something or someone safe is called
Defense
CPTED has its roots in the practice of
Defensible space
The first step in the process of designing a security system is
Determine its objectives
Most of the strategies implemented by retail security professionals involve
Discouraging or disrupting shoplifters
The first step an individual should do when there is an active shooter is
Evacuate if possible
The U.S. Fire Administration is part of what organization?
FEMA
A safe or vault can protect against forced entry and fire
False
A vault is a metal box with a high-security locking device
False
Active shooters are adversaries or assailants with an objective to kill as many people as possible at a random location
False
Activities such as downsizing, outsourcing, and others aimed at organizational restructuring can cause tension in the workplace and always leads to workplace violence
False
An infrared sensor is a type of active sensor
False
Any person, document, or activity that provides information of an investigative nature is a witness
False
Approximately 44% of shrinkage is attributed to shoplifting, the most common source
False
Communication skills are not critical for investigators as long as they have good listening and observation skills
False
Corporate security professionals are not allowed to perform undercover investigations
False
Employees should not keep communication during an active shooter incident
False
Ground lighting focused away from the trees is most effective for deterring adversaries
False
In combating organized retail crime, product placement means keeping high value items near customer service where they can be closely monitored
False
Liaison for security professionals means building strategic relationships with individuals and organizational representatives of an industry for which you have no similar career qualities
False
More often than not, an incident of workplace violence is gang related
False
ORC groups are not very diversified or innovative
False
OSHA considers smoke detectors the best for protecting areas with high ceilings
False
Restricting personal belongings on the sales floor is counterproductive in discouraging employee theft
False
Security professionals are responsible for providing feedback to employees regarding the outcome of their reports
False
Security professionals have no need to coordinate with local law enforcement and emergency responders prior to an actual emergency
False
Security professionals should never use a firearm in a defensive posture
False
Social media has no correlation with in workplace violence
False
The first level of defense when faced with an active shooter is to attempt to incapacitate the shooter
False
The presence of any of negative behaviors means that a violent act will likely occur
False
The process used to design a security system uses different considerations and steps for different levels of security
False
There are two general types of surveillance: stationary and interval
False
While shoplifting surveys show that focusing on people and groups who have a higher percentage of shoplifting can pay off some retail security professionals will use profiling techniques by identifying suspects based on proven statistics
False
Witnesses should always be interviewed with others with them when a crime or incident occurred
False
What organization uses the acronym FMC?
Federal Maritime Commission
Flash mobs are also referred to as
Flash-gang-banging
The two principles that guide the actions of security professionals are duty or legal obligation and __________
Foresee-ability
The intentional use of deception to cause an individual to give up property or some other lawful right is termed
Fraud
According to the FBI some organizations are more likely to experience workplace violence, such as
Gas stations
Insurance fraud can be
Hard or soft
Employees experiencing the largest number of assaults are those in the
Healthcare occupations
A detector that is ideal for dirty environments where dense smoke is produced is a(n)
Heat detector
Canvass interviews are conducted
In areas surrounding the location where criminal acts are committed
An unexpected event that did not cause injury or damage this time but had the potential to do so is considered a(n)
Incident
In addition to personal qualities that are conducive to violence, there are also_______________________ that define a typical workplace violator
Institutional characteristics
The unique security requirements of specific organizations, foundations and associations is called
Institutional security
Which is not a type of security force?
Intrusion detectors
The Employee Polygraph Protection Act of 1988 allows polygraph examinations to be used in connection with
Jobs in security
Access controls is based on
Least privilege
The National Crime Prevention Council suggests that a good workplace lighting strategy includes all except
Lighted gates
When conducting security operations in a foreign country, it is often necessary to establish and conduct a liaison with local law enforcement, all local security, and
Local intelligence agencies
Characteristics of an amateur shoplifter include all except
May visit store well in advance of the actual theft
OSHA stands for
None are correct
Undercover operations are a useful option to investigate crimes involving
None of the above
ORC stands for
Organized Retail Crime
The U.S. Department of Energy separates human adversaries into three classes: Insiders, Outsiders, and
Outsiders in collusion with insiders
The primary focus of physical security is
Perimeter Security
A misuse of profiling by security professionals is based on
Personal bias
Workplace security encompasses many practices to secure the workplace, such as risk management, __________________, cybersecurity, and loss prevention practices
Physical security
The most widely used lock in the U.S. for exterior and interior building doors is the
Pin tumbler lock
The investigative mindset contains five principles: Understanding the source of material; Examination; Recording and collation; Evaluation; and
Planning and preparation
One of the primary legal concerns when using video surveillance systems is
Privacy issues
Private sector investigators are more likely to be ______ than public law enforcement
Proactive
Organized crime networks are drawn to pharmaceutical crimes by the significant
Profit potential
Two accredited standards developers created the American National Standard. They are ASIS and
SHRM
Specific behaviors related to potential workplace violators include all of the following except
Sleeping on the job
What does the acronym SHRM stand for?
Society for Human Resource Management
During a covert operation after you've assumed a vantage point you are likely to discern an even better vantage point. In the best-case scenario you should
Stay there
CPTED is based on
The application of common sense and awareness about how people use their space
Recovery refers to
The restoration of full levels of service delivery following an incident
Employers must promote a work environment free from
Threats and violence
A primary focus of physical security is perimeter security
True
ANSI's standards recommendations are intentionally broad in order for flexibility
True
An effective and reliable investigation has five qualities: Objectivity, thoroughness, relevance, accuracy, and timeliness
True
An investigation can help identify why risk control measures failed
True
Biometric devices differentiate between verification and recognition
True
Class B extinguishers are used on fires involving liquids, greases, and gases
True
Employee theft is the primary cause of inventory shrinkage
True
Employees who steal are frequently involved in other counterproductive workplace activities
True
Generally, reports should be complete stand-alone documents
True
Having an interlinked and complementary policy may provide additional security for adjacent organizations
True
Intimidation is an act of workplace violence
True
It is an employee's responsibility to accept and follow an employer's preventive policies and practices
True
Managers must have access to the necessary resources and expertise to manage shrinkage effectively in a retail environment in which shopper satisfaction is paramount
True
Mechanical locks are subject to a variety of attacks that can result in their failure or compromise
True
Payments with debit and credit cards have recently become more secure by banks or credit unions replacing the magnetic strips with chips
True
Physical security systems protect assets from threats by integrating physical protective measures and security procedures
True
Security personnel should not interfere in any way with a law enforcement investigation
True
Security professionals can increase their professional relationships by asking their acquaintances for introductions and the contact information of people with whom they want to be acquainted, and other networking strategies
True
Security professionals should take steps to implement a workplace violence prevention program after an assessment is conducted on the organizations vulnerability to violence
True
Security professionals, in all organizations, must plan for active shooter events and stay abreast of industry best practices
True
Some security professionals specialize in cyber crimes or computer crimes, such as identity theft, finding the source of harassing emails, and identifying people who illegally downloaded copyrighted material
True
The goal of CPTED is to make unauthorized access difficult and time consuming, not to prevent it.
True
The intelligence cycle is the foundation of the intelligence analysis process, at both operational and strategic levels
True
The key distinction between threats to physical security is their cause
True
The preferred method of surveillance is to use a building that provides an unobstructed view of the area or person being observed
True
The primary purpose of surveillance is to obtain information about the subject or subjects under investigation
True
The process of assessing an active shooter situation and evaluating options should continue until the threat is over
True
The term retail security also refers to retail loss prevention
True
Using profiling based on demographic characteristics may have far less value than using behavioral characteristics
True
When combined with a recording system, a video surveillance system can provide vital information about security events
True
Another name for a dead-bolt lock
Tubular dead bolt
Another name for a deadbolt lock
Tubular dead bolt
Who investigates reports of counterfeiting cosmetics?
U.S. Food and Drug Administration
What 3 government entities are charged with investigating healthcare fraud? Federal Bureau of Investigation; Office of Inspector General; and
U.S. Postal Service
Who investigates violations involving the counterfeiting of U.S. obligations and securities?
U.S. Secret Service
The first needed response to an active shooter incident is to figure out
What is occurring
A crime committed by a person of respectability and high social status in the course of their occupation is considered a
White-Collar crime
Once an assessment of the workplace's vulnerability to violence is conducted, security professionals should take steps to implement a
Workplace violence prevention program
The best protection employers can offer toward workplace violence is a(n)
Zero-tolerance policy