Question 1. Grand juries are usually composed of _____ citizens.
six
eight
16
23
Question 2. _____ is removing the problem by eliminating the risk.
Risk avoidance
Risk reduction
Risk spreading
Risk transfer
Question 3. In determining whether or not a security problem needs attention, which of the following defines the principle of criticality?
A systematic approach to security surveys
A step-by-step check of security procedures
The cost of security losses in dollars
Discounted cash
Question 4. When designing a physical security plan, one should _____.
consider the level of security necessary to the facility
use the least expensive equipment possible
contract the work to a security design firm
Use the least expensive equipment possible and contract the work to a security design firm
Question 5. _____ alarms signal the entry of persons into a facility or an area while the system is in operation.
Intrusion
Fire
Special use
None of the above
Question 6. When should violations of company policy be dealt with?
Immediately
Within 48 hours
Before the end of the work day
Within 72 hours
Question 7. According to the text, which of the following is not an acceptable form of identification for cashing checks?
Driver's licenses
Social Security cards
Passports
Motor vehicle registrations
Question 8. Built-in unintentional access to software code is referred to as a what?
Backdoor
Front door
Trapdoor
Salami technique
Question 9. One successful approach to executive protection is the use of a _____ for pre-planning possible attacks.
security force
bodyguard
crisis management team
target hardening force
Question 10. Which of the following organizations has worked closely with the U.S. government to pass industry standards?
ASET
ASIS
BAH
ACES
Question 11. Which of the following is not a consideration when determining the need for an alarm system?
Accessibility of the facility to intruders
Sensitivity of information and value of property to be protected
Types of other measures in place
All of these considerations are appropriate.
Question 12. For safety reasons, an entrance must also be considered as what?
Temporary point of passage
Alternate point of passage for designated personnel
Only an entrance
An emergency exit, and fitted with panic hardware
Question 13. Loss of marketplace advantage is a factor for consideration in determining _____.
Probability
Temporary replacement
Criticality
Spatial relationship
Question 14. The first line of internal security defense is the _____.
employee
security officer
human resources department
manager
Question 15. What are the three forms of piracy?
Bootlegging, pirating, duplication
Bootlegging, counterfeiting, copyright infringement
Counterfeiting, recording fraud, bootlegging
Counterfeiting, pirating, bootlegging