Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A system of discussion groups in which individual articles are distributed throughout the world is called:

A.

Usenet

B.

Telnet

C.

Widespread net

D.

Web net

Full Access
Question # 5

Security services in which the security force is hired and controlled directly by the protected organization are called:

A.

Proprietary

B.

Security enforcement

C.

Pilferage

D.

Contract security services

Full Access
Question # 6

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

A.

Random memory

B.

Scavenging memory

C.

Awaiting memory

D.

Search memory

Full Access
Question # 7

A complete contingency planning program has which of the following major elements?

A.

Emergency response

B.

Crisis management

C.

Business continuity

D.

All of the above

Full Access
Question # 8

A person who already knows and understands the basics of loss prevention and security is known as:

A.

Engaged liaison

B.

Review personnel

C.

Supportive person

D.

None of the above

Full Access
Question # 9

An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:

A.

Contingent

B.

Critical processes

C.

Conditional delegation

D.

Emergency response

Full Access
Question # 10

A legal research generally involves locating:

A.

the applicable statute

B.

the applicable case law

C.

related articles in professional journals

D.

All of the above

Full Access
Question # 11

Coverage of what provides remuneration for losses due to employee dishonesty?

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Insurance against loss of use

Full Access
Question # 12

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

A.

Public security

B.

Private security

C.

Security firm

D.

Security function

Full Access
Question # 13

A solicitation by police officers is another charge that may be leveled against security officers is called:

A.

Criminal liability

B.

Wrongful death

C.

Verdict Act

D.

Entrapment

Full Access
Question # 14

Which of the following is NOT the activity and concern of a crisis management plan?

A.

Crisis management team

B.

Disaster operation

C.

Media operation

D.

Vital records

Full Access
Question # 15

Which of the following is NOT the category of contingency planning program?

A.

those that impact the business infrastructure

B.

those that impact the people

C.

those that impact the processes

D.

those that impact the reputation of the business

Full Access
Question # 16

What are used only for handling and storing high-value cargo?

A.

Limited areas

B.

Exclusion areas

C.

Multiple areas

D.

None of the above

Full Access
Question # 17

Which of the following is the most widely accepted classification of skills for the leadership?

A.

Skill Mix

B.

Conceptual

C.

Human relations

D.

All of the above

Full Access
Question # 18

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Full Access
Question # 19

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Full Access
Question # 20

Which terrorism requires organization and some type of leadership, recruitment, training, and retention of members?

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Full Access
Question # 21

What must be thought of as supportive of security operations rather than as the principal defense?

A.

Insurance

B.

Loss-prevention

C.

Premiums

D.

Bonds

Full Access
Question # 22

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Full Access
Question # 23

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Full Access
Question # 24

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Full Access
Question # 25

A device that is designed to respond to a certain change in conditions, such as the opening of a door, movement within a room or rapid rise in heat is known as:

A.

Sounding device

B.

Enunciator

C.

Sending device

D.

Alarm sensor

Full Access
Question # 26

The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

Multiple-pass system

Full Access
Question # 27

What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?

A.

Battery

B.

Confinement

C.

False imprisonment

D.

None of the above

Full Access
Question # 28

What might be the resentment of an employee who feels the vengefulness of an employee who has been passed over for promotion?

A.

desire

B.

motive

C.

opportunity

D.

all of the above

Full Access
Question # 29

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

A.

True

B.

False

Full Access
Question # 30

A device that sends a signal about whatever is sensed to some other location is called:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Full Access
Question # 31

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

A.

True

B.

False

Full Access
Question # 32

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Full Access
Question # 33

The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:

A.

Liquidity

B.

Vaporization

C.

Pyrolysis

D.

None of the above

Full Access
Question # 34

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

A.

True

B.

False

Full Access
Question # 35

Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:

A.

Management

B.

Authorized directives

C.

Line executives

D.

Stockholders

Full Access
Question # 36

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:

A.

Vulnerability/risk analysis

B.

Threat response

C.

Cyber scenario

D.

Emergency detection

Full Access
Question # 37

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Full Access
Question # 38

A hybrid system is a combination of:

A.

Security & Control

B.

Standard & Security acts

C.

Security consultants & services

D.

Proprietary & Contract security

Full Access
Question # 39

The amount of force may be equal to, but not greater than, the force is being used against them, this phenomenon is called:

A.

Security

B.

Protection

C.

Self-defense

D.

Precautions

Full Access
Question # 40

The classic triangle frequently referred to in describing the nature of fire consists of:

A.

heat, fuel, oxygen

B.

heat, light, oxygen

C.

heat, smoke, oxygen

D.

heat, carbon dioxide, oxygen

Full Access
Question # 41

Which class of fire, fires and extinguishes deal with cooking oil fires?

A.

Class C

B.

Class D

C.

Class K

D.

Class L

Full Access
Question # 42

A series of menus from which a person can access virtually any type of textual information is known as:

A.

Consortium

B.

Hyper-text based tool

C.

Symantec

D.

Gophers

Full Access
Question # 43

Nechaev defined _____________ as in which a man who is already lost, has broken all links with society and the world of civilization, with its laws and conventions, with its social etiquette and its moral code.

A.

Transformation

B.

Terrorism

C.

Revolution

D.

Consolation

Full Access
Question # 44

A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:

A.

Release

B.

Confinement

C.

Detention

D.

None of the above

Full Access
Question # 45

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

A.

Unrecognized holds

B.

Hold-on liabilities

C.

Hold harmless clauses

D.

None of the above

Full Access
Question # 46

The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.

A.

True

B.

False

Full Access
Question # 47

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Full Access
Question # 48

__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.

A.

Facility

B.

Contents

C.

Interior

D.

Padlocks

Full Access
Question # 49

To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.

A.

Fire-resistance safes

B.

Control safes

C.

Record safes

D.

Resistive safes

Full Access
Question # 50

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Full Access
Question # 51

An examination of persons and/or their property for the purpose of discovering evidence of guilt in relation to some specific offense is known as:

A.

Examine

B.

Test

C.

Research

D.

Search

Full Access
Question # 52

The temperature at which a solid fuel will inflame without direct flame contact is known as:

A.

Excess temperature

B.

Ignition temperature

C.

Agitate temperature

D.

None of the above

Full Access
Question # 53

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Full Access
Question # 54

A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;

A.

Central station

B.

Proprietary system

C.

Local alarm system

D.

Auxiliary system

Full Access