EXAM Q (FOR magz64)

profilemartymcflyhigh2015

All of the following are physical threats to information except:

                               

system failures

                               

natural disasters

                               

human error

                               

malicious acts

 

A company decides to plant bushes with sharp thorns on the side of their property facing a field. This would be an example of:

                               

perimeter access control

                               

security planning by environmental design

                               

crime prevention through environmental design

                               

agricultural environmental protection

 

 

 

 

 

 

 

 

 

The risk formula is based on:

                               

threat and vulnerability

                               

vulnerability and countermeasures

                               

threat and mitigation

                               

vulnerability and mitigation

 

A security department at a private hospital that is staffed by part time security officers would most likely be classified as a _____ security service organization.

                               

Level IV

                               

Level III

                               

Level II

                               

Level I

 

 

 

 

 

 

 

 

 

The type of information that has special value to organizations is:

                               

employee handbooks

                               

intellectual capital

                               

intellectual property

                               

account receivable records

 

Which of the following terms is applied to civil cases involving tort liability when a security officer unreasonably detains an individual without justification?

                               

malicious prosecution

                               

false imprisonment

                               

false arrest

                               

defamation

 

Operational plans would include all of the following except:

                               

organization and authority

                               

Mission, Vision, Values

                               

strengths, weaknesses and opportunities

                               

equipment and weapons

 

The vast majority of security services personnel in the private sector are employed in:

                               

executive protection

                               

contract watch and guard

                               

investigations

                               

transport and cash management

 

Risk to an organization includes:

                               

reputation

                               

people

                               

customers and clients

                               

equipment

                               

all of the above

 

The type of malicious event typically used by disgruntled employees is a:

                               

megabyte

                               

logic bomb

                               

Trojan horse

                               

Countermeasure

 

The following nation has not adopted "smart card" technology for credit transactions:

                               

China

                               

England

                               

United States

                               

India

 

Operationally, an enterprise security risk management system would be supervised by:

                               

the CEO

                               

Chairman of the Board

                               

Chief Security Officer

                               

Chief Financial Officer

 

The most notable development that occurred after 9.11 for security services was:

                               

the re-organization of various federal law enforcement agencies

                               

the passage of various anti-crime legislative acts

                               

the merger of state and federal agencies into national homeland security operations

                               

the takeover of security functions by state governments

                               

the increase of powers given to private security operations

 

A private employer of security personnel could be held liable and required to pay damages for the conduct of its employees based upon:

                               

negligent hiring

                               

negligent training

                               

negligent supervision

                               

all of the above

 

Honeywell, Siemens, and Simplex are examples of companies that provide:

                               

executive protection

                               

alarm services

                               

contract watch and guard

                               

investigations

                               

cash management

 

Fire safety programs include all of the following except:

                               

installation of alarm and fire suppression system

                               

training for employees on how to react when an alarm is sounded

                               

review of building codes for fire safety

                               

reliance on local fire departments for fast and rapid response

 

The major weakness of most CCTV systems is:

                               

the inability to detect human faces at night

                               

the inability to observe crime activity in progress if there are multiple sites

                               

the lack of digital imaging in most network systems

                               

the limits on placing cameras in hidden areas

 

The software technology that enables a criminal to hide data inside another file is:

                               

Trojan horse

                               

worm

                               

steganography

                               

spyware

 

Governmental powers include all of the following except:

                               

evacuation of people

                               

custodial intervention for people who are a threat to themselves

                               

the use of deadly physical force and to carry firearms

                               

planning for disasters

                               

issuance of motor vehicle summonses

 

The trial court in the U.S. court system that handles criminal cases is the:

                               

Supreme Court

                               

Court of Appeals

                               

Court of International Trade

                               

District Court

 

All of the following contributed to the development of national security service organizations in the 19th century except:

                               

railroad construction

                               

telegraph and telephone expansion

                               

intelligence operations during the civil war

                               

state border control operations

                               

the industrial revolution

 

A manager who wants to review the agency's missions and goals for the future would engage in what type of planning:

                               

strategic

                               

operational

                               

short term

                               

emergency

 

The risk management process is composed of which of the following correct steps:

                               

assessment, prioritization of assets/risks, mitigation, operations plan

                               

prioritization of assets/risks, operations planning, assessment, mitigation

                               

mitigation, assessment, prioritization of assets/risks, mitigation

e. asset evaluation, assessment, mitigation, operations plan

 

The technology that enables computers to synchronize with data on PDAs is:

                               

encryption

                               

spyware

                               

image master

                               

universal serial bus

 

The agency mainly responsible for the enforcement of laws and security on the American frontier during the 19th Century was:

                               

Alcohol, Tobacco and Firearms

                               

Secret Service

                               

Customs

                               

Marshals Service

                               

Rangers

 

Security equipment consultants must be chosen on which set of guidelines

                               

cost, track record, reliability, contract need

                               

track record, client satisfaction, cost, government clearance

                               

client satisfaction, service and maintenance, company history, track record

                               

cost, customer satisfaction, state review, state license

 

In Gap Analysis, the objective is to reduce ____________between the goal and the present status or state of affairs.

                               

ambiguity

                               

impediments

                               

outcomes

                               

benchmarks

 

In the prioritization phase, a value must be placed on:

                               

assets and probability or possibilities assigned to threats

                               

countermeasures related to vulnerabilities

                               

the role of liability if a catastrophic event were to occur

                               

profit and loss factors if the business were to shut down

 

The liability concept concerning whether an employer can be held liable for the conduct of its employee is known as:

                               

stare decisis

                               

constitutional tort

                               

vicarious liability

                               

common law

 

Malicious software code that is distributed via the Internet and that infects computers in a manner that impairs the performance of programs or destroys data is known as a:

                               

virus

                               

spyware

                               

keylogger

                               

steganoid

 

If a person performing security services is found negligent that means that he or she:

                               

was reckless

                               

acted intentionally

                               

failed to exercise reasonable care

                               

willfully caused injury

 

To deal with public area security issues, many cites, shopping malls, and schools have installed _________________ systems to increase security.

                               

CCTV

                               

biometric security

                               

Internet communications systems

                               

smart card technology

 

The category of laws that define legal rights and responsibilities is:

                               

substantive law

                               

criminal law

                               

procedural law

                               

public law

 

The United States Secret Service was originally formed to deal with:

                               

terrorists

                               

executive protection

                               

counterfeit money

                               

military intelligence

 

Legal limitations imposed upon the performance of security functions usually are found in:

                               

a constitution

                               

administrative regulations

                               

common law traditions

                               

administrative decisions

 

Which of the following terms describes the identification of weaknesses in an organization's security:

                               

vulnerability assessment

                               

cost benefit analysis

                               

threat analysis

                               

asset valuation

 

All of the following are important for the selection and implementation of countermeasures except:

                               

Regular inspections of telecommunications equipment.

                               

Obtaining credible and trusted serve providers for technical countermeasures.

                               

Performing periodic scans for unauthorized wireless network devices.

                               

Undertaking the selection of countermeasures based on the lowest cost.

 

A global trend is for many American security companies to:

                               

become subsidiaries or major holdings of international security conglomerates

                               

provide security protection for federal and state agencies

                               

take over investigations involving industrial espionage in Europe and Asia.

                               

provide training on counter-terrorism issues to private companies in Europe and Asia

 

Fusion centers were created to:

                               

provide security services to federal facilities

                               

initiate communications facilities to all federal agencies

                               

gather and distribute intelligence on major crimes and terrorism for federal, state, and local agencies

                               

monitor Internet transactions between the U.S. and foreign countries

 

The major issue to determine if security personnel should be armed is:

                               

the response level of municipal police forces

                               

the level of search and seizure powers for uniformed personnel

                               

the level of emergency response required by the organization

                               

 

certification requirements by the federal government for homeland security needs

    • 7 years ago
    • 30
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      all_of_the_following_are_physical_threats_to_information_except.docx
    Bids(1)