The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:
An example of preventive maintenance for a physical protection system PPS includes
Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?
Based on their ability to meet the needs of an entire organization, which of the following stakeholders is MOST crucial to engage for a successful operation of an asset protection strategy?
The central station, local alarm system, auxiliary systems are all currently available systems of:
To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?
The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:
An owner ' s acceptance of a security system marks the beginning of:
System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?
Libel is oral defamation; libel is defamation through the written word.
In a physical protection system (PPS), a 4:1 light-to-dark ratio is the preferred design goal to allow for
As part of an initial evaluation of the significant threats or hazards to an organization, the security practitioner should:
Microwave sensors should be mounted
A temporary endeavor to accomplish a unique process is called a:
In a low-light application, which of the following lens characteristics would allow the MOST light to enter the camera?
A design that is applied to a lock keyway to make picking of the lock more difficult is known as
The term probability of detection BEST describes the:
____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.
Which class of fire, fires and extinguishes deal with cooking oil fires?
A corporation is in need of security personnel to guard visitor parking lots, highly sensitive projects, and top-secret projects. What is the MOST viable and cost-effective security staffing strategy for the corporation?
In the context of risk, which of the following is considered a hazard?
From a management point of view, organizing the security effort involves:
Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:
The planning phase of a physical protection system implementation produces which two of the following very important work products?
Which of the following should prospects submit to qualify for a physical security project?
A Physical Security Professional ' s analysis of data collected during a risk analysis helps
The annual loss expectancy (ALE) formula is based on:
What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?
A civil action based on the principle that one individual can expect certain behavior from another individual is known as:
Which type of lamp emits a strong light with a bluish cast?
Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:
The power supply to a typical security system should be loaded no greater than what percentage of the total capacity to allow further expansion?
Electromechanical and electromagnetic locks are considered fail-safe if they:
Which of the following is true of proximity badges?
What generally means removing the risk to the company by paying for the protection of an insurance policy?
The purpose of methodical examination is to:
The ongoing task of security management is to identify potential areas of loss and to develop and install appropriate security countermeasures, this process is called ______________.
Which of the following conditions affects the sensitivity of a capacitance proximity sensor?
Criteria for intrusion sensor performance is typically measured by which of the following?
_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.
___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.
Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.
Which lamp type enhances CCTV systems by imitating natural daylight conditions, but is also the most expensive light to install and maintain?
What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?
A change key is normally used to
Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:
Ideally a business should have four sets of backup files;
Which operational test determines parameters such as nuisance alarm rates?
Which of the following techniques would be used to make an unauthorized key for a lock?
In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is
Which of the following is NOT the advantage of contract services?
How does the tangibility of an asset impact a risk assessment?
Which law concerns the rights, duties, and penalties of individuals in their relationship with each other?
_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.
The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.
Who developed Ethernet?
What occurs when the person who committed the act was able to foresee that the action would result in certain damages?
Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:
The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:
Which of the following is an example of a tangible asset?
Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.
Which of the following is an example of an intangible asset?
Which of the following processes should be implemented in addition to a risk assessment when considering how a potentially disruptive event can negatively affect a facility ' s security program?
What involves a discreet investigation into the past and present activities of the applicant?
The prediction of internal crime relies most heavily on analysis of:
Taking personal property in such a way that the plaintiff’s use or right of possession of chattel is restricted is called:
Nuisance alarm rate is calculated by knowing which of the following?
Which sensor is commonly used on doors and/or windows?
Major outputs of the security system planning phase include definition of stakeholders, which of the following?
The process of pre-qualifying vendors before issuing the request for proposal (RFP) helps to ensure that:
What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?
What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?
Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
What considers all aspects of the security operation on a continuing basis?
Video surveillance camera selection should be based primarily on the:
After completing a thorough risk analysis, company personnel decide to manage risks by removing them from the company and paying for protection by purchasing an insurance policy. This form of risk management is known as risk:
For preventive maintenance to be effective, each piece of equipment to be maintained must have documentation that includes:
When developing a maintenance plan and the associated service levels, a system owner should place the greatest emphasis for support on equipment that:
__________ is internationally causing fear of imminent harmful or offensive touching but without touching or physical contact.
A change review board generally consists of:
Which of the following risk mitigation options has no cost?
What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?
In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.
A device that sends a signal about whatever is sensed to some other location is called:
The dollar loss is not simply the cost of the item lost but also includes:
Which of the following should take precedence when identifying countermeasures?
What is a means of making sure that a supervisor or other employees go through a prescribed series of inspections that will ascertain that functions or procedures for which they are responsible are being properly executed?
Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.
Private sector will become increasingly involve in crime prevention; public law enforcement will then be free to concentrate more heavily on violent crimes and crime response.
Coverage of what provides remuneration for losses due to employee dishonesty?
A company has selected a project manager to upgrade security at its manufacturing plants. A risk assessment for each plant has been completed. Which of the following is the first action of the project manager?
Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:
WANs also allow multiple computers to share the same communication line, as is possible with LANs.
The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:
Contingency planning is the result of which four major components?
Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?
The operating environment of Enterprise Security Risk Management (ESRM) includes the:
Which of the following is not one of the five criteria of good security reporting?
Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.
Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:
A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:
A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is
Which of the following is the BEST method of implementing risk management?
The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.
Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?
Successful security design recognizes technological developments and integrates:
The type of electric locking device that permits free mechanical egress from the protected side of the door is the:
Which of the following is a key factor to be considered when evaluating whether a particular facility is at risk for a bombing?
To ensure consistent bid submissions, a walk-through of affected buildings and locations should be conducted at the:
Which one of the following options should be considered with respect to the issuance of weapons?
What is a significant issue in the operation of intrusion detection systems?