A system of discussion groups in which individual articles are distributed throughout the world is called:
Security services in which the security force is hired and controlled directly by the protected organization are called:
Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:
A complete contingency planning program has which of the following major elements?
A person who already knows and understands the basics of loss prevention and security is known as:
An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:
Coverage of what provides remuneration for losses due to employee dishonesty?
____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.
A solicitation by police officers is another charge that may be leveled against security officers is called:
Which of the following is NOT the activity and concern of a crisis management plan?
Which of the following is NOT the category of contingency planning program?
Which of the following is the most widely accepted classification of skills for the leadership?
In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?
When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:
Which terrorism requires organization and some type of leadership, recruitment, training, and retention of members?
What must be thought of as supportive of security operations rather than as the principal defense?
___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.
_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.
A civil action based on the principle that one individual can expect certain behavior from another individual is known as:
A device that is designed to respond to a certain change in conditions, such as the opening of a door, movement within a room or rapid rise in heat is known as:
The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:
What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?
What might be the resentment of an employee who feels the vengefulness of an employee who has been passed over for promotion?
Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.
A device that sends a signal about whatever is sensed to some other location is called:
The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.
When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:
The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:
In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.
Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:
To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:
Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.
The amount of force may be equal to, but not greater than, the force is being used against them, this phenomenon is called:
The classic triangle frequently referred to in describing the nature of fire consists of:
A series of menus from which a person can access virtually any type of textual information is known as:
Nechaev defined _____________ as in which a man who is already lost, has broken all links with society and the world of civilization, with its laws and conventions, with its social etiquette and its moral code.
A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:
Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:
The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.
What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?
__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.
To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.
What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?
An examination of persons and/or their property for the purpose of discovering evidence of guilt in relation to some specific offense is known as:
The temperature at which a solid fuel will inflame without direct flame contact is known as:
What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?
A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;