QUIZ Questions

Ace your homework & exams now with Quizwiz!

The minimum height of a security fence should be: a. 7 feet b. 6 feet c. 8 feet d. 9 feet

a. 7 feet

On average, how much of a salary increase do college graduates earn over non college graduates? a. 77% b. 58% c. 840/0 d. 35%

a. 77%

A glass break sensor is an example of: a. A perimeter sensor b. A spot sensor c. An area sensor d. A volumetric sensor

a. A perimeter sensor

Im many cases, _________ ______________ form the backbone of a facility's physical protection program. a. Alarm systems b. Covert surveillance c. Report writing d. Physical force

a. Alarm systems

Leadership is not about self-interest; it is about being other-person-centered. Thus, before embarking on a mission to become a leader, one should conduct a self-examination in all the following ways, except to: a. Assure that no one in the group will be able to pass you up and become your boss b. Make ethics more important than your career c. Have a deep desire to help others solve both work-related and personal problems d. Find the potential in subordinates and push those subordinates to self-actualize

a. Assure that no one in the group will be able to pass you up and become your boss

The one misconception that causes more errors than any other in effective communications is: a. Every message must be brief b. Every message requires some interpretation c. Every message must be clear and concise d. None of the above

a. Every message must be brief

Why is experience such an important component of your résumé (choose the best answer)? a. Experience provides exposure to scenarios and interaction not available in the classroom b. Education is more important than experience and it is not necessary c. It demonstrates a high level of motivation d. A job allows the student to earn money while in school

a. Experience provides exposure to scenarios and interaction not available in the classroom

One area of preparation often overlooked by many security departments is: a. Failing to provide continuing training and education b. Failing to perform driver license checks on each patrol officer c. Failing to provide less-than-lethal weapons to each officer d. Equipping the patrol vehicle with wrong colored flashing lights

a. Failing to provide continuing training and education

Which of the following best describes effective communications? a. Faithful reproduction of a message sent to a receiver clearly understood and confirmed by the receiver b. A message sent by a communicator who expects the receiver to understand it c. A message that is sent to a person with hope that it will be understood by all d. All of the above

a. Faithful reproduction of a message sent to a receiver clearly understood and confirmed by the receiver

The basic role of the protection officer is to prevent, mitigate, and respond to: a. Intentionally created risks (security) b. Accidental and unintentional risks (safety, health, environment, and quality) c. Any and all risks in the WAECUP model d. None of the above

a. Intentionally created risks (security) b. Accidental and unintentional riSks (safety, health, environment, and quality)

Security-in-depth is also known as: a. Layered protection b. Concealed protection c. Altered protection d. Necessary protection

a. Layered protection

There are basically two types of patrol. Which of the following are those two types? a. Mobile and foot patrol b. CCTV Surveillance and foot patrol c. Canine patrol and checking ID's at the main entrance d. None of the above

a. Mobile and foot patrol

Defensible Space: Crime Prevention Through Urban Design was created by: a. Oscar Newman b. Marcus Felson c. Patricia Brantingham d. Ronald V. Clarke

a. Oscar Newman

The application of situational crime prevention techniques are the results of this theory. a. Rational choice theory b. Routine activity theory c. Crime pattern theory d. Defensible space

a. Rational choice theory

_______ of regular occupants to a facility is considered a very secure form of access control. a. Recognition b. Harassment c. Interrogation d. Arrest

a. Recognition

Logging devices are used for: a. Recording system activities and faults b. Controlling CCTV cameras c. Recording time and attendance of security staff d. Access control to computer networks

a. Recording system activities and faults

Smartcards have the ability to store a biometric _________ among other types of information. a. Template b. Contemplate c. Record d. Cash

a. Template

Two dangers mentioned in this chapter that protection professionals should be aware of in using online resources are (circle two): a. The possibility of going off on a tangent rather than focusing on the objective b. The possibility of introducing a virus to the system c. Accidentally disseminating sensitive information to unauthorized recipients d. Assuming that information in online databases is credible

a. The possibility of going off on a tangent rather than focusing on the objective d. Assuming that information in online databases is credible

There are five types of critical resources to be protected; which of the following is not one of those? a. Time b. Information c. People d. Reputation

a. Time

A demonstration is a crowd that is exhibiting sympathy for or against authority, or some political, economical, or social condition. a. True b. False

a. True

A number of studies in recent years have projected massive expansion of electronic security systems employing advanced technologies, but they also concluded that the human element (i.e., security officers) will not be predominantly replaced by technology. a. True b. False

a. True

Card access systems permit accountability. a. True b. False

a. True

Deterrence is the practice of discouraging an individual or group from even attempting to attack an asset. a. True b. False

a. True

Directing traffic from the corner position is safer than a center-of-the-intersection position. a. True b. False

a. True

Human life and safety should be the primary concerns in fire situations. a. True b. False

a. True

In double loop communication, information should not only flow from the top of the organization but also a process should be in place for information to travel back to the top. a. True b. False

a. True

Intangible property include things such as goodwill, proprietary information, and related property. a. True b. False

a. True

Leaders and supervisors are not one and the same. Our expectation is that every supervisor is a leader but not every leader is necessarily a supervisor. a. True b. False

a. True

Magnetic stripe, wiegand, proximity and biometric are examples of access control readers. a. True b. False

a. True

On private property, the safe movement of traffic is the responsibility of the security officer. a. True b. False

a. True

One aspect of a formal safety policy is to prevent accidents and illness on and off the job. a. True b. False

a. True

One component of the Fire Triangle is heat. a. True b. False

a. True

One use for crime mapping is to help determine where to locate new facilities. a. True b. False

a. True

Physical security planning is a recognized security process that, if followed, will result in the selection of physical countermeasures based on appropriateness. a. True b. False

a. True

Physical security planning was originally based upon response to a military threat. a. True b. False

a. True

Preparation for a patrol tour of duty requires more than just putting on the uniform and going to work. It also requires mental and psychological preparation. a. True b. False

a. True

Proper protection against the elements is an important factor in maintaining efficient traffic control. a. True b. False

a. True

Railroad police were, and still are, a privately employed police force with full law enforcement authority. a. True b. False

a. True

Risk Management is a term closely associated with the insurance industry. a. True b. False

a. True

Security awareness is simply letting everyone know in the organization how security impacts them and how important they are, as stakeholders and team members, to the continued success of the company. a. True b. False

a. True

Slow or timid drivers should not be urged forward with increased rapidity of arm motion because they may over-react and cause an accident. a. True b. False

a. True

Team members are trained and polled regularly to heighten their awareness about changing trends in practices and rapidly advancing technology in security. a. True b. False

a. True

The "lessons learned" examples help employees and partners understand why security awareness is important to them personally and for the success of the organization. a. True b. False

a. True

The 10-codes are used to assist with rapid transmission of radio communications. a. True b. False

a. True

The ASIS International General Security Risk Assessment Guideline defines an asset as "Any real or personal property, tangible or intangible, that a company or individual owns, that can be given or assigned a monetary value." a. True b. False

a. True

The World Health Organization has defined health as "more than just the absence of disease." a. True b. False

a. True

The basic reason for the formation of any crowd is the occurrence of an event that is of common interest to each individual. a. True b. False

a. True

The central alarm/dispatch operation is "the brain" of a security operation, serving as the command, control, and communications center. a. True b. False

a. True

The protection officer must take continuing education in HAZMAT and first aid. a. True b. False

a. True

The protection officer should carefully inspect the work habits of members of the workforce and report deficiencies detected. a. True b. False

a. True

The safety committee has the authority to make safety recommendations to management. a. True b. False

a. True

To be effective, the security department should instill "security awareness" among all levels of the organization and external partners. a. True b. False

a. True

What is the difference between a functional and a chronological résumé? a. A functional résumé lists the functions that you performed at a job b. A funcional résumé is a summary of experience, whereas a chronological resume lists jobs or positions by dates of employment c. There is no difference d. A chronological résumé only lists education and and certification

b. A funcional résumé is a summary of experience, whereas a chronological resume lists jobs or positions by dates of employment

Which of the following best describes a protection officer? a. A man or a woman hired to look after an entrance door b. A man or a woman who concentrates on safety and security while others perform various tasks c. A man or a woman in charge of welcoming visitors and providing them with information d. A man or a woman hired to dissuade potential trespassers

b. A man or a woman who concentrates on safety and security while others perform various tasks

A duress alarm is also sometimes called: a. A reset button b. A panic button c. Activation switch d. A silent partner

b. A panic button

Among the advantages of automated visitor management systems are (circle all that apply): a. Ability to reduce costs by integrating with access control systems b. Ability to keep a searchable record of visitors c. Ability to better account for all building occupants during an evacuation d. Ability to support subsequent investigations in the event of an incident

b. Ability to keep a searchable record of visitors c. Ability to better account for all building occupants during an evacuation d. Ability to support subsequent investigations in the event of an incident

There needs to exist a clear policy for the denial of _______ for individuals without proper credentials. a. Rights b. Access c. Service d. Income

b. Access

If you observe a hostile crowd gathering, never hesitate to request additional: a. Weapons b. Assistance c. Rioters d. Vehicles

b. Assistance

Gas, temperature and power failure are examples of which of the following sensors: a. Access control b. Building automation c. Closed circuit television d. Fire alarm

b. Building automation

Geographic Information Systems (GIS) are closely related to: a. Integrated security systems b. Crime mapping systems c. Automated incident management systems d. Graphical user interface systems

b. Crime mapping systems

There are three key concepts specific to CPTED. Which of the following is not one? a. Natural surveillance b. Defensible space c Natural access control d. Territorial behavior

b. Defensible space

A main component of a medium to large access control system is the following: a. Access control b. Distributed processor c. Card data d. Field

b. Distributed processor

Tort law expects every business to actively pursue the following: a. Employee background checks b. Due diligence regarding safety and security c. Adequate training of all employees d. Employee benefits

b. Due diligence regarding safety and security

Allan Pinkerton was known for which of the following unique innovations? a. Arming officers with handguns b. Extensive centralized records c. A training camp for his employees d. The idea of making prisoners post bail

b. Extensive centralized records

A magnesium fire is an example of a Class B fire. a. True b. False

b. False

A riot means any extreme or catastrophic condition that imperils or results in loss of life and/or property. a. True b. False

b. False

A smoke detector is a device to manually initiate a fire alarm a. True b. False

b. False

All risks can be reduced completely. a. True b. False

b. False

Automated visitor management systems should only be used in large, complex organizations with multiple facilities. a. True b. False

b. False

Biometric technology is slowly being removed from usage in airports and other immigration checkpoints. a. True b. False

b. False

Class A fires are those involving alcohol as the fuel. a. True b. False

b. False

Deadbolt locks should have a minimum of 1/2" throw. a. True b. False

b. False

Incident Management Systems today are really nothing more than word processing systems that allow an officer to enter reports electronically. a. True b. False

b. False

Intrusion alarms are point protection only. a. True b. False

b. False

Microwave detectors use high-frequency sound waves to establish a protected area. a. True b. False

b. False

One of the main functions of a safety committee it to administer effective rescue training programs. a. True b. False

b. False

Security awareness should be instilled among half of the members, from all layers of the organization and external partners. a. True b. False

b. False

Studies indicate that security technologies will soon make security officers obsolete. a. True b. False

b. False

Technology and automation is not bringing the benefits, efficiencies, and opportunities to the field of security and asset protection that was anticipated. a. True b. False

b. False

The disciplines of safety and security are dissimilar. They don't share the same common objectives in terms of the overall protection process. a. True b. False

b. False

The patrol function is the least important but necessary part of the loss control approach. a. True b. False

b. False

The primary use of the traffic whistle is to attract the police. a. True b. False

b. False

CPTED stands for Crime Prevention through Environmental Dedication. a. True b. False (Crime Prevention through Environmental Design)

b. False (Crime Prevention through Environmental Design)

The optimal way to communicate is written. a. True b. False (face to face)

b. False (face to Face)

The key for a supervisor to get anyone to do anything is to: a. Threaten them to do it b. Get them to want to do it c. Bribe them to do it d. None of the above

b. Get them to want to do it

The protection officer dealing with crowds should: a. Exchange pleasantries with the crowd b. Give the Impression he/she will enforce orders c. Apologize for his/her actions d. All of the above e. None of the above

b. Give the Impression he/she will enforce orders

What is one of the fastest growing fields related to security? a. Law enforcement b. Homeland security c. Private detectives d. Contract security

b. Homeland security

Leaders are often called upon to institute change in a department. Change is hard to accept by many subordinates because of insecurities or lack of trust. Resistance can be overcome by all of the following suggestions, except: a. When possible, discuss why the change is required b. Inform the employees that if they cannot accept the change you will help them find work elsewhere c. Be honest and consistent d. Answer questions, or take the information and follow-up if you don't know the answer

b. Inform the employees that if they cannot accept the change you will help them find work elsewhere

The telephone equipment in a security program must be which of the following? Choose the best answer. a. It must be technologically rugged and capable of working under severe conditions b. It must be simple to use with the least probability of failing during an emergency c. It must be available on a 24/7 basis d. None of the above

b. It must be simple to use with the least probability of failing during an emergency

According to the text material, the most effective security is provided with a: a. Technical approach b. Layered approach c. Large security force d. Key and lock program

b. Layered approach

Environmental crime control theory focuses upon the _______________ of the criminal act: a. Time b. Location c. Perpetrator d. Victim

b. Location

In controlling a hostile crowd, sufficient ________________ is/are basic to your success. a. Force b. Manpower c. Time d. Weapons

b. Manpower

Access control sensors may be used to detect unauthorized access to a facility, and to generate security alarms in response. Which of the following is not one of those access control sensors: a. Magnetic contact switch b. Network attached storage device c. Keypad locks d. REX or request to exit device

b. Network attached storage device

Alarm printers are typically: a. Of the color laser type b. Of the high speed, continuous feed type c. Black and white and medium speed d. Extremely expensive

b. Of the high speed, continuous feed type

When signaling a driver to stop, your hand should be: a. Closed b. Palm open c. Finger pointed d. Fist clenched

b. Palm open

Which of these is a type of control force used in Ancient Rome? a. Roman chariots b. Praetorian guards c. Varangian guards d. Nubian mercenaries

b. Praetorian guards

Security awareness meetings should be held with all departments at a minimum frequency of: a. Annually b. Quarterly c. Weekly d. Daily

b. Quarterly

Signing in at a security ____________ is a common function of controlling access. a. Officer b. Register c. Course d. Door

b. Register

Why do employers search social networking sites for applicant information? a. They want to find other candidates for other open positions b. Searching these sites provides a quick and efficient way to learn more about the candidate c. To find a specific person's resumé d. Employers do not search social networking sites on job applicants

b. Searching these sites provides a quick and efficient way to learn more about the candidate

When double loop communication is used, the following employees have the opportunity to become active: a. Police officers b. Stakeholders c. Managers d. None of the above

b. Stakeholders

Which of the following types of lighting are only lit on as as-required basis? a. Continuous b. Standby c. Movable d. Emergency

b. Standby

Uniformed and paid police did not come around until which of the following: a. The early 1900s just before World War I b. The 1830s when Philadelphia started paying police c. The late 1700s about the start of the Revolutionary War d. 725 A.D.

b. The 1830s when Philadelphia started paying police

There are four communication skills needed for every leader. Which of the following is not one of them? a. Never missing a chance to shut up (listening) b. Top down as a priority communications direction c. Complete and concise face:to-face communications d. Reader-friendly written material, sending complete, clear, easily understood communications

b. Top down as a priority communications direction

Network Attached Storage (NAS) and Storage Area Networks (SAN) are examples of Large capacity storage devices used with video surveillance systems. b. True b. False

b. True

Which of the following is considered to be a downside to using detection dogs? a. A dog's keen sense of smell can be developed and used to detect drugs and explosives b. Unprofessional behavior by a dog and its handler may ruin the company's reputation c. An individual may be deterred by the presence of a detection dog from entering a facility with a dangerous item d. A detection dog may be an effective tool for detecting lost or missing persons after an environmental disaster

b. Unprofessional behavior by a dog and its handler may ruin the company's reputation

Routine Activity Theory, developed by Cohen and Felson, revolves around three things: which of the following is not one of the three factors? a. A potential offender b. A suitable target c. Acting under the influence of drugs or alcohol d. The absence of a capable guardian

c. Acting under the influence of drugs or alcohol

A study by Bolyard and Powell concluded that "security officers lacking this knowledge would be placed at a great disadvantage.... " What "knowledge" were they referring to? a. An understanding of basic electronic security systems and design parameters b. A thorough understanding of contemporary information technology (IT) security threats and risks c. An orientation on automated tools such as incident and visitor management systems as well as crime mapping and analysis d. An orientation on the historical basis for automation in protection operations as it applies to the security industry in the United States

c. An orientation on automated tools such as incident and visitor management systems as well as crime mapping and analysis

The detection of fires can be broken into: a. Electronic methods b. Human methods c. Both of the above d. Neither of the above

c. Both of the above

The most commonly used security fencing material is: a. Barbed wire b. Barbed tape c. Chain-link d. Welded wire mesh

c. Chain-link

Competency can be demonstrated through professional certifications, and consists of an adequate balance of three characteristics. Which of the following is not one of those? a. Attitude b. Skills c. Communication d. Knowledge

c. Communication

This revolves around public housing and seeks to reduce crime through the use of natural surveillance, natural access control and territorial concern. a. Crime Prevention Through Environmental Design (CPTED) b. Crime Pattern Theory c. Defensible Space d. Rational Choice Theory

c. Defensible Space

The feature of access control systems operating off-line and not connected to a host computer is often referred to as ____________ or offline mode. a. Upgraded b. Access c. Degraded d. Egress

c. Degraded

There are many internal factors that can influence a patrol officer's performance in a negative way. Which of the following is not one of those internal factors: a. Fatigue b. Preoccupation with personal problems c. Environmental conditions d. Boredom

c. Environmental conditions

A magnetometer is a kind of metal detector that detects: a. Zinc b. Aluminum c. Ferromagnetic material d. Nonferromagnetic material

c. Ferromagnetic material

Situational Crime Prevention Techniques have ______ different subcategories: a. Three b. Four c. Five d. Six

c. Five

The security planning process consists of following a selected number of steps. a. Three b. Four c. Five d. Six

c. Five

There are ____ main categories of Situational Crime Prevention Techniques. a. Three b. Four c. Five d. Six

c. Five

How many different types of alarm monitoring were examined in the text? a. Two b. Three c. Four d. Six

c. Four

Electronic article surveillance (EAS) systems are used to detect: a. Electrodes b. Merchandise surplus c. Fraudulent activity d. Retail invoices

c. Fraudulent activity

Which is a method to increase security awareness among all layers of the organization and external partners? a. Eyeglasses b. Bright lights c. Interactive activities d. None of the above

c. Interactive activities

The task of performing effective Access Control includes record_____________ a. Control b. Planning C. Keeping d. Destruction

c. Keeping

There are numerous critical leadership skills. A leader will display all of the following skill sets, except: a. High ethical beliefs and attitudes b. A high ability to communicate well while understanding and relating to all people c. Learning how the mission of the organization compares to the leader's career goals d. Being aware of the organization's mission and being focused on accomplishing that mission

c. Learning how the mission of the organization compares to the leader's career goals

Every decision that a protection officer makes reflects on the organization he or she represents; for instance, patrol officers often times are the only people on the premises (during night and weekends). Which of the following tasks is most unusual to a basic protection officer? a. Collect intelligence on changes, unusual situations, or suspicious persons b. Maintain compliance with organizational policies c. Legal consultant role d. Interacting with the public in the environment

c. Legal consultant role

The Professional Protection Officer has some essential characteristics. Which of the following is not one of them? a. Follows a code of ethics b. Shares a common history c. Masters the use of lethal and non lethal weapons d. Owns a common body of knowledge

c. Masters the use of lethal and non lethal weapons

_________ _________ ________ if an effective alternative to manually searching airline passengers. a. X-rays b. Facial Recognition Technology c. Millimeter Wave Scanning d. Biometric Template Technology

c. Millimeter Wave Scanning

Which chemical compound does chemiluminescence technology detect? a. Carbon dioxide b. Nitroglycerin c. Nitrogen dioxide d. PETN

c. Nitrogen dioxide

___________ key blanks can have a restricted issue to one distributor or end user. a. Metal b. Foreign c. Proprietary d. Expensive

c. Proprietary

Basically the Offender uses a decision making process whereby the positive and negative aspects of committing a particular act is weighed. This is an example of: a. CPTED (Crime Prevention Through Environmental Design) b. Routine activity theory c. Rational choice theory d. Defensible Space

c. Rational choice theory

The protection officer should attempt to isolate an individual troublemaker by: a. Taking them down b. Tranquilizing them c. Removing them d. Arresting them

c. Removing them

Which of the following is not a type of alarm monitoring? a. Central station b. Direct fire and police c. Satellite d. Proprietary

c. Satellite

The following sign is without doubt the most important sign in use today. a. Yield b. No U Turns c. Stop d. None of the above

c. Stop

Traits that can characterize a leader in any organization include all the following, except: a. Advocate teamwork in the ranks b. Encourage open communications c. Support complacency in the ranks d. None of the above

c. Support complacency in the ranks

What is the importance of the Taft-Hartley Act? a. This act ensured collective bargaining rights b. This allowed the first labor union to be formed c. The U.S. president, via the attorney general, can obtain an injunction against a strike or lockout if a substantial area is affected or national security is threatened d. This act forced labor unions to temporarily disband until clearer regulations for labor unions could be put into place

c. The U.S. president, via the attorney general, can obtain an injunction against a strike or lockout if a substantial area is affected or national security is threatened

There are six essentials of effective communications; which of the following is not one of those essentials? a. The communications must be complete b. The communications must be clear c. The communications must be consistent d. The communications must be concise

c. The communications must be consistent

Based on organizational needs, there are many major purposes of patrol. Which of the following is not one of those purposes: a. To detect unauthorized activity b. To prevent unauthorized activity c. To perform an activity that creates the appearance of authority d. To provide emergency response in a timely fashion

c. To perform an activity that creates the appearance of authority

The primary purpose of an alarm system is: a. To conduct area surveillance b. To serve as a physical barrier c. To provide early warning of an intruder d. To lower insurance rates

c. To provide early warning of an intruder

Which of the following is not a consideration when using X-ray detection technologies? a. Taking necessary precautions to protect one's personal privacy b. Implementing shift rotation for security personnel to mitigate operator fatigue c. Training new operators is lengthy and expensive d. Implementing proper training and corrective measures to reduce mistakes made in assessment interpretations

c. Training new operators is lengthy and expensive

There is a theory of loss control developed by Bottom and Kostanoski in security and loss control. It is known as: a. WASTE b. WASTMGMT c. WAECUP d. WHATSUP

c. WAECUP

Focus groups consist of: a. Organizations b. External partners c. lndividuals selected by management d. None of the above

c. lndividuals selected by management

In what year and country did the Peshtigo Fife occur? a. 1655, England b. 1655, America c. 1871, England d. 1871, America

d. 1871, America

Effective communications has built-in flexibility to facilitate the needs of the receiver or receiver groups. Which of the following characteristic is important to take into consideration? a. Communications grade level remembering the seventh-grade midpoint rule b. English as a Second Language (ESL), people with poor understanding of English c. Medical condition such as speech impediment, hearing loss, or poor sight d. AII of the above

d. AII of the above

Fire plans should include: a. Evacuation routes b. Defined responsibilities c. A chain of command d. AII of the above

d. AII of the above

General rules for traffic direction are: a. Select a position best suited for the intersection b. Use uniform signals and gestures c. Be cheerful, but firm d. AII of the above

d. AII of the above

When on traffic control, proper equipment includes: a. Proper clothing b. Flashlight c. Radio d. AII of the above

d. AII of the above

The career path of a protection officer might take him through: a. Operational level b. Supervisory level c. Management level d. AII the above

d. AII the above

When responding to an alarm, it is important to: a. Use physical force b. Remove the suspected article from the area c. Control access to the detection equipment d. Abide by company policy and procedure

d. Abide by company policy and procedure

A vulnerability assessment will include a thorough examination of the following: a. Facility and personell b. Contents and materials c. Suppliers and contractors d. All of the above

d. All of the above

An advanced radio dispatch system may consist of the following: a. Touch screen interface b. Voice recording c. Remote paging d. All of the above

d. All of the above

Arson fires are: a. Intentionally started b. Often made more dangerous through the use of accelerants c. Sometimes part of insurance fraud attempts. d. All of the above

d. All of the above

Directing traffic from or at a gate would include such duties as checking a. Traffic flow b. Entry pass c. Travel tickets d. All of the above

d. All of the above

Dry chemical hand extinguishers are usually considered: a. Class A b. Class B c. Class C d. All of the above

d. All of the above

During some emergency situations, the phone system will be destroyed, especially when there is a building collapse. What can We do to protect that phone line? a. Use a separate single-cable phone line not part of the building's main phone system b. Place the telephone cable inside of a metal conduit c. Have the cable enter/exit the building at the lowest level of the building d. All of the above

d. All of the above

The selection of detection equipment should be based on: a. Life-cycle cost of the equipment b. Reliability of the equipment c. Type of threat d. All of the above

d. All of the above

The value added by a protection officer's performance is measured in the level of improvement that his work brings into the organization's protective process and objectives. Examples of this can include: a. Vigilance of better practices and recommends state of the art standards b. Always reporting adequately and keeping adequate records c. Improving policies, procedures, job-specific instructions d. All of the above

d. All of the above

Wen earning an education what are the most important considerations? a. Determine if the college or university is accredited b. Gain work experience through internships or volunteer work c. Maintain a satisfactory grade point average d. All of the above

d. All of the above

When interviewing for a job, what preparation is necessary (choose the best answer)? a. Drive the route to the interview location the day before b. Research the organization c. Be prepared to answer standard interview questions d. All of the above

d. All of the above

Which of these are reasons that are driving radical Islamic fundamentalism? a. Undereducated or miseducated young men who have learned that the United States is 'The Great Satan" b. A large number of unemployed or underemployed people living in poverty c. Charismatic leaders d. All of the above

d. All of the above

An effective team member will display the following attributes: a. Continuously identify ways to improve human performance b. Advise upline management when problems exist in work performance c. Be motivated to improve operations and always strive for excellence d. All the above

d. All the above

One of the steps taken during response functions performed by protection officers is recovery. Which of the following is an example of it? a. Assets not damaged during a fire are quickly moved into a secure location b. A claim is filed with an insurance company c. Video footage from a bank robbery is given to local police d. All the above

d. All the above

Some experts say we conduct a vast amount of our communications nonverbally. No matter how we or others communicate nonverbally, we must always strive for clarification if we want to achieve understanding. Which of the following is true about nonverbal communications? a. The content is more difficult to read than verbal and written communications b. The message being sent is usually just as important as other forms of communication c. Asking for clarification will keep the misunderstanding to a minimum d. All the above

d. All the above

There are numerous techniques that help an officer to detect unusual situations. Which of the following is one of those techniques: a. Get acquainted with the people on your shift and where they should be and what they do b. Get to know maintenance personnel and how they can help you c. Visit the central alarm station and become familiar with the CCTV system and what the area of coverage is d. All the above

d. All the above

Which of the following is a principle of patrol that every patrol person should follow: a. A patrol should always be done in random fashion b. The time the patrol officer leaves on patrol each time should be random C. Keep in communications with either internal or external backup support when needed d. All the above

d. All the above

In the security office, separate and apart from the general use telephone, there will be a red phone used exclusively for emergencies. That phone will have the following attachments to make it more effective. Which of the following is not one of those attachments? a. Ringer b. Strobe c. Tape recording device d. Beeping sound every 3 seconds

d. Beeping sound every 3 seconds

Which of these are lessons that have been learned by studying the history of security? a. The need for a chain of command b. An increase in professionalism c. The need for professional training d. Both B and C

d. Both B and C

Which of the following is not a metal detection technology used prominently in security applications? a. Continuous wave device b. X-ray c. Pulse-field detector d. CT scan

d. CT scan

A leaderless crowd that is attempting to flee from something it fears is a/ an: a. Spectator crowd b. Emotional crowd c. Hostile crowd d. Escape crowd

d. Escape crowd

Risks are usually categorized into three categories. (Select one that does not apply) a. People b. Property c. Legal liability d. Insurance

d. Insurance

Magnetic contact switches, motion sensors and glass break sensors are examples of what kind of sensors. a. Access control b. Building automation c. Closed circuit television d. Intrusion

d. Intrusion

The effectiveness of physical security is further enhanced by strict ______ control. a. Inventory b. Pest c. Car d. Key

d. Key

There are four strategies for developing a career; choose the one that is not a strategy a. Develop a personal brand b. Network c. Find a mentor d. List one's résumé on an online job board

d. List one's résumé on an online job board

A transmission medium is simply the method by which an electronic message is carried. Signals may be transmitted in a variety of ways. Which of the following is not one of those mediums used to transmit electronic messages: a. Copper wire b. Fiber optics c. Cellular Transmission d. None of the above

d. None of the above

On average, how many certifications should one obtain? a. 8 b. 4 c. 9 d. None of the above

d. None of the above

Which of the following best describes the importance of career planning? a. Meet with parents and friends to determine which career is best b. Job shadow a professional currently in the field of one's potential career c. Complete a self-evaluation study that can be found on the Internet d. None of the above

d. None of the above

Which component is not considered a basic component of an explosive device? a. Explosive material b. Detonator c. Connecting wires d. Projectile

d. Projectile

The most intangible valuation of an asset would be in what is referred to as: a. Liquid asset b. Respectful damage c. Punitive damage d. Reputational damage

d. Reputational damage

There are four channels of communications in most companies; which of the following is not a channel? a. Top-down communications b. Bottom-up communications c. Grapevine communications d. Reverse-horizontal communications

d. Reverse-horizontal communications

In more sophisticated alarm systems, sensors are interfaced with electronic entry-control devices, CCTV, reporting displays (both visual and audible), and _____________ _____________. a. Police patrols b. Aerial units c. Sniper teams d. Security lighting

d. Security lighting

All actions taken before active protection measures are performed can be included in the preventative functions. Which of the following is not one of those actions? a. Preventative investigations b. Identification of hazards and risk factors c. Induction baining d. Separate physically or in time the aggressor from the objective

d. Separate physically or in time the aggressor from the objective

There are _____ aspects of displacement: a. Three b. Four c. Five d. Six

d. Six (who, what, when, where, why, how)

Avery important part of effective communications is that the communicator must be able to tell which of the following? Choose the best answer. a. That the communications were necessary b. That the communications were timely c. That the message was received d. That the message has been received and understood

d. That the message has been received and understood

How many suspect components of an explosive device are needed to warrant a possible threat? a. Five b. Three c. One d. Two

d. Two

If the officer is working the overnight shift, 2200 to 0600, it is advisable to do which of the following: a. Stop ingesting alcohol-laced adult beverages two hours before the shift b. Sleep at least 10 hours before the shift to assure alertness all through the night c. Ingest at least four cups of coffee to keep awake all night d. Visit the work site during the day for facility orientation

d. Visit the work site during the day for facility orientation

Some psychological factors in crowd formation are: a. Security b. Novelty c. Loss of identity d. None of the above e. All of the above

e. All of the above

Typical hazard areas include: a. Boilers, heaters, and furnaces b. Cooking areas c. Smoking areas d. Vehicle storage areas e. All of the above

e. All of the above


Related study sets

Spanish 1 Unit 2/ 8.2 Grammar: Friends & Family

View Set

chapter 27 growth and development of the preschooler

View Set

Introduction to Careers in Finance D9126 : 3. PRINCIPLES OF CORPORATE FINANCE

View Set

Industrialization/Industrial Revolution(*)

View Set

Chapter 22: Transoceanic Encounters and Global Connections Guided Reading

View Set

Management Exam 3 Quizlets Combined

View Set

International Dispute Settlement

View Set

Supply and Demand Homework Ch (04)

View Set

Aging and the Elderly- Sociology Ch.13

View Set