Exam Code : ASIS-APP
Exam Name : Associate Protection Professional
Vendor Name :
"ASIS"
ASIS-APP Dumps ASIS-APP Braindumps
ASIS-APP Real Questions ASIS-APP Practice Test ASIS-APP Actual Questions
killexams.com
Associate Protection Professional
https://killexams.com/pass4sure/exam-detail/ASIS-APP
Question: 1
What is the ‘span of control’ principle?
A single person can supervise only a limited number of staff members effectively (generally up to 6)
A single person can supervise only a limited number of staff members effectively (generally up to 8)
A single person can supervise only a limited number of staff members effectively (generally up to 12)
A single person can supervise only a limited number of staff members effectively (generally up to 10)
Question: 2
What is the design C basis threat?
The cost incurred for the utility being protected. It is used to help design and evaluate a physical protection system (PPS)
The adversary against which the utility must be insured against. It is used to help design and evaluate a physical protection system (PPS) by the CISO
The cost incurred for the person being protected.
The adversary against which the utility must be protected. It is used to help design and evaluate a physical protection system (PPS)
Question: 3
What is a mutual aid association?
A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies.
A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies on a cost basis.
A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies at cost for the duration of the arrangement
A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies. It is subject to the limit of the emergency.
Question: 4
Which of the following is an advantage of having investigation conducted by in-house security staff?
In-house staff has better grasp as to objective of the investigation
Cheaper as a general rule, depending on number of check being done
In-house staff has better sources of information
In-house staff is better trained
Question: 5
What is a Business impact analysis (BIA)?
A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies
A BIA is a tool used to: Identify an entity’s communication structure Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies
A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop the cost associated with the emergency
A BIA is a tool used to: Identify key stakeholders Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies
Question: 6
What are the three contributors to cost of replacement?
Repair and Replacement cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional
Insurance Cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional
Upgrade Cost including replacement fee Freight and Shipping charges Make C ready or preparation cost to install it or make it functional
Purchase price or manufacturing cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional
Question: 7
What is the ‘necessary human being’ concept?
The particular characteristics and reactions required at a security post necessitate human capabilities
Dependant characteristics of a human operating a security system
The particular characteristics and reactions required at a security post that do not necessitate human capabilities
The particular characteristics and reactions required at a security post that can be recovered and upgraded by mechanical means
Question: 8
What are the four approaches to terrorism analysis?
Multicausal Political Organisational Psychological
Geopolitical Political Organisational Psychological
Historical Political Organisational Psychological
Financial Political Organisational Psychological
Question: 9
What are the four types of emergency drill formats?
Tabletop exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies
Tabletop exercise Evacuation/shelter in place drill Comms walkthrough Full exercise with outside response agencies
Lead exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies
Tabletop exercise with Law Enforcement Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies
Question: 10
In investigations, what’s the difference between an analysis diagram and a horizontal diagram?
An analysis diagram links details regarding persons, events, etc during an investigation. A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation
An analysis diagram links details regarding property and events A horizontal diagram compares different periods of a company’s security statement that will be beneficial during a fraud investigation
An analysis diagram links details regarding timeline, incidents and events, etc during an investigation. A horizontal diagram compares different sections of a company’s annual loss statement that will be beneficial during a fraud investigation
An analysis diagram links details the reporting chain used during an investigation, that includes the CSO and the COO A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation
Question: 11
What are indirect costs to security?
Harm to Reputation Loss of goodwill Loss of employees Harm to employee morale
Harm to Reputation Loss of goodwill Loss of employees Insurance Costs
Increased Alarm Rates Indirect Career Progression Loss of employees Harm to employee morale
Harm to Reputation Loss of goodwill Loss of contract Harm to Business
Question: 12
According to Fennelly, what are the three key tools in crime prevention programs?
Planning Management Cost
Planning Management Evaluation
Planning Management Availability
Planning Management Communication
Question: 13
Any person may affect an arrest without warrant when he/she
Has reasonable grounds to believe that an individual has committed a criminal offence and is escaping from and freshly pursued by persons who have lawful authority to arrest that individual
Has reasonable grounds to believe that the individual will fail to attend court
Has reasonable grounds to believe that a person has committed an indictable offence
Finds an individual committing any offence
Question: 14
What is the formula for lost income cost?
I = i/365 x P x t, where: I = Income earned I = annual percent loss of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment
I = i/365 x P x t, where: I = Income lost I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment
I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment
I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) lost on investment t = time (in days) during which P is available for investment
Question: 15
Why are emergency management tests and exercises conducted?
To check workability of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures
To check the cost of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures
To check workability of the plan To determine levels of compliance To evaluate emergency communications To identify shortcomings in evacuation procedures
To check workability of the plan To determine levels of staff awareness and training To review communications strategy To identify shortcomings in evacuation procedures
Question: 16
How do aggressors decide to commit workplace violence?
Not by ‘snapping’, but through a process of emotional escalation, or, with psychopaths, non-emotional decision making
Through planned action
By ‘snapping’ as a result of perceived injustice
In response to a confirmed slight or ‘wrong’
Question: 17
What organisation is the world’s largest developer of international standards?
ASIS
WHO
ISO, the International Organisation for Standardisation
European Union
Question: 18
What is the most important relationship for security during a strike?
The relationship with local law enforcement
The relationship with unions
The relationship with HR & Legal
The relationship between law enforcement and legal
Question: 19
What are the three primary functions of security lighting?
Deterrence Life safety Video lighting
Deterrence Incident Recording Video lighting
Prevention and Retention Life safety Video lighting
Incident Management Life safety Video lighting Video lighting
Question: 20
Who should have access to the emergency telephone numbers of key personnel?
Staff in control centres Senior personnel with plan implementation responsibilities
Security personnel in control centres Senior personnel with plan implementation responsibilities
Staff in control centres Legal personnel with plan implementation responsibilities
Staff in control centres Emergency Management personnel with plan implementation responsibilities
Question: 21
What are the two most commonly abused drugs in the workplace?
#1 Alcohol #2 Marijuana
#1 Alcohol #2 Nicotine
#1 Nicotine #2 Marijuana
#1 Alcohol #2 PCP
Question: 22
How long do the effects of controlled release OxyContin last?
8 to 12 hours
10 to 12 hours
8 to 14 hours
8 to 16 hours
Question: 23
What are the five phases of an undercover operation?
Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education
Law Enforcement Engagement Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education
Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Legal Action Prevention and education
Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Law Enforcement engagement
Question: 24
What are the four stages of an investigative reporting process?
Initial report Progress report (within 30 days of initial report) Special report Final report
Initial report Progress report (within 20 days of initial report) Special report Final report
Initial report Progress report (within 40 days of initial report) Special report Final report
Initial report Progress report (within 50 days of initial report) Special report Final report
Question: 25
What is key to a sound back story of an undercover operative?
Personal details that are not true but are known to the targeted employee, such as schools attended, former workplaces, or previous home neighbourhoods
Plausible & realistic
One that is easily remembered
A detailed history with a verifiable background
Question: 26
What is the vulnerability assessments team’s primary job as it pertains to a physical protection system (PPS)?
To determine security system effectiveness.
To secure a site
To record system violations
To determine the alarm response ratio
Question: 27
What is the best way to prepare for workplace misconduct investigations?
Coordinate as soon as possible with the HR director and corporate legal counsel because of the possibility of employee legal action
Source a secure location to conduct interviews
Review the initiation report
Coordinate with Law Enforcement and Legal Counsel
Question: 28
When should a supervisor visit a security post?
Regularly, in an unscheduled manner
Once per hour
Twice per hour
Six times during 9 hour shift
Question: 29
What type of specimen is analysed most often in drug tests?
Urine
Hair
Saliva
Blood
Question: 30
What are the three standard financial reports?
Income statement Balance sheet Statement of cash flows
Income statement Bank statement Statement of cash flows
Income statement Balance sheet Statement of assets
Income statement Balance sheet Share value
Question: 31
How frequently should investigative summaries of undercover operations be produced?
Typically, summaries are prepared after the operative has completed 10 consecutive days of work
Typically, summaries are prepared after the operative has completed 20 consecutive days of work
Typically, summaries are prepared after the operative has completed 30 consecutive days of work
Typically, summaries are prepared after the operative has completed 25 consecutive days of work
Question: 32
What does an income statement show?
Revenue Expenses Statement of Assets
Revenue Expenses Share value
Revenue Expenses Closing balance
Revenue Expenses Net income over a defined period
Question: 33
What is the current ratio?
The current ratio is a measure of a company’s ability to cover medium term obligations Current ratio = current assets/current liabilities
The current ratio is a measure of a company’s ability to cover long term obligations Current ratio = current
assets/current liabilities
The current ratio is a measure of a company’s ability to cover immediate obligations Current ratio = current assets/current liabilities
The current ratio is a measure of a company’s ability to cover short term obligations Current ratio = current assets/current liabilities
Question: 34
What are the three general measures to valuing assets?
Cost Consequence criteria Policy
Insurance Fees Consequence criteria Policy
Asset Liability Consequence criteria Policy
Value of the Assets Consequence criteria Policy
Question: 35
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
Performance-simulation tests, application forms, resume, interviews
Application form, resume, pencil and paper tests, interviews
Performance-simulation tests, drug screening, applications form, resume
Application form, pencil and paper tests, performance-simulation tests, interviews
Question: 36
What does a cash flow statement show?
Available funds to the organisation
How cash inflows and outflows affect an organisation
Funds due to the organisation
Available funds allocated for the financial year
Question: 37
A claimant’s allegation of invasion of privacy would be appropriately supported in a situation where the alleged perpetrator:
Revealed damaging information from a police file to the claimant’s spouse
Revealed further details about a matter that was reported in a published biography of the claimant
Mentioned during a televised interview a rumor about the claimant engaging in criminal activity
Repeated a story that the claimant was overheard telling in a crowded public place
Question: 38
Which of the following is not true with regard to door latches?
Both B and C
Chain latches are highly recommended as effective security measures
A dead-bolt latch is very expensive
A dead-bolt latch increases the security posture of the facility
Question: 39
What is the overall objective of an investigation?
A successful outcome or resolution of the case
To secure a conviction
To recover stolen items
To identify those involved in a crime
Question: 40
What are the three managerial dimensions of assets protection?
Technical expertise Management ability Communications
Academic Qualifications Management ability Ability to deal with people
Technical expertise Operational ability Ability to deal with people
Technical expertise Management ability Ability to deal with people
Question: 41
In the development of a security program using the systems approach, the three general elements that must be given consideration are:
A vulnerability analysis, implementation of countermeasures, and a test of the operating program
The installation of fencing, locks, and alarms
Pre-employment screening, policies, and standardized procedure
A loss prevention program, risk analysis, and recovery documentation
Question: 42
What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen?
62 Bit Encryption
Proximity Badge
32 Bit Encryption
An exchange badge system
Question: 43
What is perhaps the best way to achieve funding for an Investigations Unit (IU)?
Demonstrate how the unit pays for itself
Provide case statistics
Direct from Physical Security Budget
Demonstrate successful case load
Question: 44
The cardinal rule in management of a transportation concern is that those assigned to line hauling duties must be
Willing and able to discuss their cargo
In possession of extra cargo seals
Capable of lifting more than 50 lbs.
Of the highest integrity
Question: 45
How many years of prior work history should a job application ask for?
At least 7 to 10 years
At least 7 to 12 years
At least 7 to 15 years
At least 12 to 15 years
Question: 46
What are post orders based on?
Legal Guidelines
Standard Operating Procedures
Client Needs
Location and hours of work
Question: 47
Why might companies keep secret the existence of kidnap, ransom, and extortion policies from their personnel?
To avoid being targeted
To prevent negative press
To comply with company legislation
To ensure alignment
Question: 48
A well-engineered physical protection system (PPS) exhibits which three characteristics?
Protection in Depth Minimum consequence of component failure (redundancy) 360 Coverage
Protection in Depth Minimum consequence of component failure (redundancy) Balanced protection
Protection in Depth Minimum consequence of component failure (redundancy) Power Redundancy
Protection in Depth Layered Perimeter Utility Support
Question: 49
What are the three ways to measure profit margins?
Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings after interest, taxes, and amortization)/ revenue
Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings before interest, taxes, and amortization)/ revenue
Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin
= EBITA (earnings before interest, taxes, and amortization)/ revenue
Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin
= EBITA (earnings after interest, taxes, and amortization)/ revenue
Question: 50
According to Oatman, what are the six principles that should guide thinking about executive protection?
Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on technology
Prevent and avoid danger Realize that anyone can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology
Prevent and avoid danger Only team members can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology
Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble
Understand the security vs convenience continuum Rely on brains, not on technology
Question: 51
What are the four main types of CCTV cameras?
Standard analog CCD Dome Infrared Thermal
Standard analog CCD IP Infrared Thermal
Standard analog CCD Bullet Infrared Thermal
Standard analog CCD Fixed Infrared Thermal
Question: 52
How long should a strategic plan look out into the future?
Three to ten years
Three to six years
Three to five years
Three to seven years
Question: 53
What is the preferred glass type for mitigating blast forces?
Laminated glass is preferred for mitigating blast forces
Sheet Glass
Plexiglass
Single reinforced glazing
Question: 54
What are the four main strategies of second generation CPTED (the four C’s) ?
Cohesion Capacity threshold (tipping point) Creativity Connectivity
Cohesion Capacity threshold (tipping point) Communication Connectivity
Cohesion Capacity threshold (tipping point) Community culture Connectivity
Cohesion Capacity threshold (tipping point) Collaboration Connectivity
Question: 55
What are the elements of a systems approach to developing a physical protection system (PPS)?
Assessment of needs Implementation of countermeasures Evaluation of effectiveness
Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness
Assessment of vulnerability Evaluation of effectiveness and Defence in Depth
Assessment of needs Implementation of countermeasures Evaluation of effectiveness
Question: 56
In what situation is protecting investigative information particularly difficult?
Protecting information can be difficult when working with joint task forces, because each participating agency likely has different policies, definitions, perspectives, and attitudes towards what is sensitive and warrants protection
Protecting information can be difficult when working with joint task forces, because each participating agency will have different information handling and storage programs
Protecting information can be difficult when working with joint task forces, because each participating agency likely will be reporting to individual stakeholders none of whom are in the same reporting chain
Protecting information can be difficult when working with joint task forces, because each participating agency can be subject to competing multi-jurisdictional legal oversight issues
Question: 57
When is the best time to remove an undercover operative?
When he or she is named as an offender by co-workers
Outside of working hours
On approval from LE
On approval from HR & Legal
Question: 58
How should change or corrections be made in officers written log entries?
Entered in Red Ink and signed by Security Officer & Manager
Entered in Red Ink
Entered in Red Ink and signed by Security Officer
Under a new event number as a separate item
Question: 59
What is the quick ratio?
The quick ratio is a measure of an organisations ability to cover current liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/current liabilities
The quick ratio is a measure of an organisations ability to cover projected liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/projected liabilities
The quick ratio is a measure of an organisations ability to cover future liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/future liabilities
The quick ratio is a measure of an organisations ability to cover current liabilities with borrowed assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/borrowed liabilities
Question: 60
What kind of legal privilege is typically granted to properly controlled investigative reports?
Qualified privilege, protecting against defamation suits
Qualified privilege, Protection against criminal prosecution
Personal Injury protection, protecting against defamation suits
Qualified privilege, protection against investigation
Question: 61
According to the FBI, what are the six steps of protecting a business from espionage?
Recognise the (insider or outsider) threat Identify and value trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection
Recognise the (insider or outsider) threat Close Trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection
Recognise the (insider or outsider) threat Identify and value trade secrets Implement Disaster Recovery Plans Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection
Recognise the (insider or outsider) threat Define Key Stakeholders Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection
Question: 62
What three questions does a risk assessment attempt to answer?
What Protocols currently exist? What is the likelihood it would go wrong? What are the consequences?
What can go wrong? What is the cost associated? What are the consequences?
What resources are available? What is the likelihood it would go wrong? What are the consequences?
What can go wrong? What is the likelihood it would go wrong? What are the consequences?
Question: 63
What are the three types of CPTED solutions?
Mechanical measures Electronic Lighting and Direction of Flow
Legal Guidelines Human and organisational measures Natural measures
Mechanical measures Human and organisational measures Lighting and Direction
Mechanical measures Human and organisational measures Natural measures
Question: 64
How many years of experience should a new investigative hire have?
As a rule of thumb, new hires should have at least two years of experience conducting investigations
As a rule of thumb, new hires should have at least three years of experience conducting investigations
As a rule of thumb, new hires should have at least four years of experience conducting investigations
As a rule of thumb, new hires should have at least five years of experience conducting investigations
Question: 65
What is the best way to recruit a good candidate for a job?
Internal recommendations
Open competitions
Direct Appointments
Closed competitions
Question: 66
What three factors should determine selection of a CCTV camera?
Sensitivity Degradation Features
Sensitivity Resolution Features
Sensitivity Degradation Timing
Resolution Degradation Timing
Question: 67
What does a balance sheet show?
A summary of an organisations investing and financing
A summary of an organisations profits and loss
A summary of an organisations share value
A summary of an organisations RSU schedule
Question: 68
What are the three levels of assessment for violent risk among known subjects?
Initial Threshold Comprehensive
Initial Threshold Violent
Initial Assessment Comprehensive
Immediate Threshold Comprehensive
Question: 69
In Pastor’s public/private, substitute/supplement model of policing, which cell represents the rarest scenario?
Public/Private
Private/Industrial
Public/Substitute
Private/Substitute
Question: 70
What are the main functions of a physical protection system (PPS)?
The primary functions are detection, delay, and record. Deterrence is a secondary function.
The primary functions are direct, delay, and response. Deterrence is a secondary function.
The primary functions are determine, delay, and response. Deterrence is a secondary function.
The primary functions are detection, delay, and response. Deterrence is a secondary function.
Question: 71
What is ‘minimum resolvable temperature’?
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder, activity and the background.
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between staged sensors
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an
intruder and the site environment.
The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.
Question: 72
What are the two general types of insurance?
Personal Accidental
Property Liability
Property Travel
Property Accidental
Question: 73
What are the three primary functions of a physical protection system (PPS)?
Detection Delay Response
Assess Report Response
Record Deny Respond
Identify Deny Respond
Question: 74
Where are executives most vulnerable to attack?
At home
At work
In transit
While exercising
Question: 75
What theory underpins situational crime prevention?
Motive and Opportunity
Geo political theory
Criminal Law
Rational choice theory
Question: 76
For insurance against business interruption, what are the two types of valuation methods?
Perceived loss sustained Valued loss
Actual loss sustained Valued loss
Actual loss sustained Insured loss sustained
Actual loss sustained Incurred replacement cost
Question: 77
What are three major pitfalls of using online information sources for investigations?
Going off on a tangent/spending too much time online Assuming online information is credible without exploring further Searching online sources may not be best use of an investigator’s time
Reliability Accuracy Safety
Robustness Legal Considerations Search Parameters
Reliability Accuracy Security of source
Question: 78
What are the five basic coverages of crime insurance policy?
Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Harassment Bond
Employee Injury bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage
Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage
Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Theft and forgery coverage
Question: 79
What is generally the most practical approach to budget development?
A combination of top down and bottom up processes and mutual forecasting
A top down approach
A bottom up approach
A combination of top down and bottom up processes
Question: 80
Which of the following is not generally true regarding money safes?
Both C & D
Those manufactured prior to 1960 have round doors
They provide good protection against fire
They always have wheels
Question: 81
What is the biggest vulnerability of a loop system?
All the detectors in an area could be disabled by interrupting the loop at the proper location
Physical Intervention
Power interruption
Detectors not being recorded on a system
Question: 82
What are the three ways of verifying personnel entry?
Who you are (role) What you know (PIN, password) What you have (badge)
Who you are (role) What you know (PIN, password) What you are (biometrics)
What you have (credential) What you know (PIN, password) What you are (biometrics)
What you have (credential) What you carry (YubiKey) What you are (biometrics)
Question: 83
During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember?
Keep a low profile Stay away from problem areas and situations Know what to do if trouble arises
Keep a low profile Stay away from problem areas and situations Contact Law Enforcement
Keep a low profile Stay away from problem areas and situations Secure transport
Keep a low profile Define scope of ops Know what to do if trouble arises
Question: 84
In its basic sense, the investigative process reflects
A simple statement of all the abstracts encountered
The mindset of the investigator
Precise controlled examination
Absolute goal-oriented inquiry
Question: 85
Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and summaries?
The custodian of record
The security manager
The HR Rep
The Project Manager
Question: 86
What are the three most common methods of training protection dogs?
Positive reinforcement (praise) Compulsion (negative corrections) Inducement (toys, foods)
Positive reinforcement (praise) Compulsion (negative corrections) Punishment (corrections)
Positive reinforcement (praise) Communication (talking) Inducement (toys, foods)
Repeated Performance (repeat exercise) Compulsion (negative corrections) Inducement (toys, foods)
Question: 87
What are the five Ds of security?
Divide Deny Detect Delay Destroy
Defend Deny Detect Delay Destroy
Define Deny Detect Delay Destroy
Deter Deny Detect Delay Destroy
Question: 88
Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?
Cold galvanized paint containing at least 95 percent zinc by weight
Cold galvanized paint containing at least 75 percent zinc by weight
Cold galvanized paint containing at least 65 percent zinc by weight
Cold galvanized paint containing at least 55 percent zinc by weight
Question: 89
What is the ‘broken windows’ theory?
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of the drop in value of a site
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of higher costs associated with security services
The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to a reduction of Law Enforcement patrolling and response to a location
Question: 90
What is a Trademark
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
Legal protection of the expression of ideas in corporate law and policy.
Legal protection of the expression of ideas in literary, artistic, and musical works.
Question: 91
Who should be responsible for shutting down equipment in an emergency?
Those already familiar with the process.
Senior Engineer on Duty
All Security Personnel
Chief Security Officer on duty
Question: 92
According to Davidov and Malone, what is the centrepiece of the new global economy?
The relationship between economics, security and policy
Economics and Technology
Vendor Ownership and Management Process recognition
The virtual product, where major business functions are outsourced with hardly any internal departmentalization.
Question: 93
What are the three types of attacks used to defeat an access-controlled entry point?
Deceit Physical attack Technical attack
Social Engineering Physical attack Technical attack
Assault Physical attack Technical attack
Bribery Physical attack Technical attack
Question: 94
What four questions does risk management attempt to answer?
What can be done? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?
What is the cost? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?
What can be done? What protocols are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?
Who is responsible for completing the Risk Management matrix? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?
Question: 95
What are the three classifications of loss in Insurance policies?
Direct Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
Indirect Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
Direct Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
Indirect Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
Question: 96
What are the five most common identifiers used to verify education history in a background check?
Name while attending school Dates of attendance Graduation date Degree obtained Date of birth
Name of primary school Dates of attendance Graduation date Degree obtained Date of birth
Name while attending school Dates of attendance Qualification attained Degree obtained Date of birth
Name while attending school Dates of attendance Country of Birth Degree obtained Date of birth
Question: 97
What value does company prosecution of employee drug offenses have?
Minimal value
More than $1000
More than $1500
Value less than $2000
Question: 98
What is the debt to equity ratio?
The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder securities
The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder liabilities
The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder equity
The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder accounts
Question: 99
In an investigation, what is generally the best reporting chain from the source of information to the decision maker?
The shortest one
Direct to CISO
Direct to LE Partner
To the Project Management Team
Question: 100
The three basic types of glass are
Tinted, reflective, and insulated
Heavy duty, medium duty and light duty
Tempered, reinforced and coated
Sheet, plate, and float
Question: 101
What are the five avenues of addressing risk?
Analysis Transfer Spreading Reduction Acceptance
Replacement Transfer Spreading Reduction Acceptance
Avoidance Transfer Spreading Reduction Acceptance
Review Transfer Spreading Reduction Acceptance
Question: 102
A major concern of a company, above all else, should be
The care and well-being of its employees
Reduction of shrinkage
Policies and procedures
Internal theft
Question: 103
What is natural territorial reinforcement?
Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.
Construction of environmental barriers
Natural territorial reinforcement is the process of integrating property with lighting
Natural territorial reinforcement is the process of establishing a reporting system tied to a monitoring station
Question: 104
What are the three types of emergency operations plans?
All hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
Medical hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
Natural Hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
Artificial hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
Question: 105
What are the most common type of investigations in business settings?
Incident investigations
Harassment Investigations
Assault investigations
Theft Investigations
Question: 106
What is the best way to addressing infringements of copyrights, patents, and trademarks?
By registering those rights
By securing a trademark
By security a copyright
By securing a Patent
Question: 107
Which stakeholder group drives the ANSI standards development process?
Consumers
Government
Industry Experts and Academics
Standards users
Question: 108
What two ratios show how an organisation has done in making money during a reporting period?
Return on assets = net income/total assets Return on equity = net income/shareholder equity
Return on assets = net income/total shares Return on equity = net income/shareholder equity
Return on assets = net shares/total shares Return on equity = net income/shareholder equity
Return on assets = net income/total assets Return on equity = net outcomes/shareholder equity
Question: 109
Which two ratios demonstrate how well a firm has done in making money for a reporting period?
Return on assets = net assets/total assets Return on equity = net income/shareholder equity
Return on assets = net income/total assets Return on equity = net income/shareholder equity
Return on assets = net income/total assets Return on equity = net outgoings/shareholder equity
Return on assets = net income/total equity Return on equity = net income/shareholder equity
Question: 110
What members should comprise a vulnerability assessment team?
Security specialist (leader) Security Systems engineer Response expert Data analyst Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)
Security specialist (leader) Security Systems engineer Response expert HR expert Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)
Security specialist (leader) Security Systems engineer Response expert CFO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)
Security specialist (leader) Security Systems engineer Response expert CISO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)
Question: 111
How long does withdrawal from narcotics take?
7 to 10 days
7 to 12 days
7 to 14 days
7 to 16 days
Question: 112
Who should be involved in developing a standard?
A broad group of stakeholders and interested parties, working collaboratively
Industry Experts
Industry Experts and Academics
Public and Private partnership
Question: 113
What organisation is the administrator and coordinator of the US private sector voluntary standardization system?
The American National Standards Academy (ANSA)
The American National Standards Institute (ANSI)
ASIS
The American National Standards Organisation (ANSO)
Question: 114
What are the first steps in upgrading a facility’s resistance to penetration?
Defence in Depth
Layered Protection
Eliminating unnecessary doors and windows
Technical Protection measures
Question: 115
What are the five principal resources of an Investigations Unit (IU)?
People Information Credibility Physical assets Financial assets
People Information Analysis Physical assets Financial assets
People Information Intelligence Physical assets Financial assets
Systems Information Credibility Physical assets Financial assets
Question: 116
How many workplace violence incidents are committed annually by intimates of the victim? A. 18,700
B. 18,500
C. 18,000
D. 19,000
Question: 117
What are the thee most critical threats in high-rise structures?
Fire Explosion Terrorism
Fire Explosion Personnel
Fire Explosion Infrastructure Damage
Fire Explosion Contamination of support systems
Question: 118
What is the cost of loss formula?
K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of temporary insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount
K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available
insurance or indemnity a = allocable insurance premium amount
K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a =
allocable insurance premium amount
K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total insurable costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount
Question: 119
What is an effective way of setting the value of line items in a budget?
Look at each budget expense as an investment and calculate the expected return on that investment
Look at each budget expense as an investment and reduce the expected return on that investment
Look at each budget expense as an investment and divide the expected return on that investment
Look at each budget expense on its own and calculate the expected return on projected investments
Question: 120
How often should an emergency operations plan be audited?
At least annually. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.
At least quarterly. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.
On demand. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.
Periodically. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.
Question: 121
What are the five elements of the Incident Command System?
Command Operations Planning Logistics Finance and administration
Command Communications Planning Logistics Finance and administration
Command Operations Legal Logistics Finance and administration
Command Operations Planning Logistics HR
Question: 122
What are the immediate effects of cocaine use?
Dilated pupils Elevated blood pressure Increased heart rate Euphoria
Impaired reflexes Slurred speech Uncontrollable drowsiness
Impaired reflexes Anger Uncontrollable drowsiness
Impaired reflexes Slurred speech Detached interest
Question: 123
What are the four elements of emergency management?
Mitigation Preparedness Response Recovery
Communication Preparedness Response Recovery
Mitigation Preparedness Resilience Recovery
Mitigation Preparedness Response Reduction
Question: 124
Under what three conditions should undercover investigations definitely NOT be used?
To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate protected union activities
To investigate medical negligence cases To replace a less costly form of investigation that will yield the same results To investigate protected union activities
To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate Law Enforcement incidents
To investigate activity permitted or protected by law To investigate activities associated with minors To investigate protected union activities
Question: 125
What three elements are depicted in a cash flow statement?
Net operating cash flow Net investing cash flow Pending funds due
Net operating cash flow Net investing cash flow End of year statement
Net operating cash flow Net investing cash flow Expected cash flow
Net operating cash flow Net investing cash flow Financing cash flow
Question: 126
What are the three levels of investigative management?
Strategic Operational Case
Strategic Pivotal Case
Personal Operational Case
Commercial Operational Case
Question: 127
Who should be involved in developing a job requirements analysis?
The hiring manager HR Team Legal Team
The hiring manager HR Team Organisational leaders
The hiring manager Other team members Organisational leaders
The hiring manager HR Team Security Liaison
Question: 128
Who is the only corporate official who should retain a copy of an investigative report?
The attorney of record
CISO
Law Enforcement
Security Manager
Question: 129
What are some effects of depressants in large doses?
Impaired reflexes Slurred speech Uncontrollable drowsiness
Impaired reflexes Anger Uncontrollable drowsiness
Impaired reflexes Slurred speech Detached interest
Hunger and thirst Slurred speech Uncontrollable drowsiness
Question: 130
Department of Defense regulations regarding the protection of classified information requires that defense contractors maintain accountability of top secret information for a minimum time of:
Three years
Two years
Five years
One year
Question: 131
At what size and how far above the ground should an opening in a buildings shell be protected?
Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 18 feet (5.5 metres) above the ground.
Reinforce or secure any openings in the building shell that measure more than 100 square inches and are lower that 18 feet above the ground.
Reinforce or secure any openings in the building shell that measure more than 80 square inches and are lower that 18 feet (5.5 metres) above the ground.
Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 20 feet (6 metres) above the ground.
Question: 132
How many subjects should a single post order cover?
Three
Two
One
Question: 133
Searches made during work hours as a result of a bomb threat call should be made by
Employees familiar with the work area where the bomb is reportedly located
The fire department
The local police department
The Department of Army personnel
Question: 134
What are the three goals of preemployment interviews?
Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate
Candidate selection Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate
Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Verification of credentials Permit an assessment of the candidate
Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Exam Job History
Question: 135
What is CPTED?
CPTED, or crime prevention through environmental design is the design or redesign of a venue to maximise access to a site
Physical Barriers on a site
Electronic, Physical and Procedural designs
CPTED, or crime prevention through environmental design is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, or procedural means.
Question: 136
When is containment a good strategy?
When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.
When assisted by Law Enforcement
When access to firearms is available
When there is company fraud or embezzlement
Question: 137
Who should be assigned the role of an organisations emergency coordinator?
Someone regularly responsible for handling emergencies, such as the head of security or engineering.
Someone regularly responsible for handling emergencies, such as the Business Continuity Manager.
Someone regularly responsible for handling emergencies, such as the head of crisis management
Someone regularly responsible for handling emergencies, such as the COO.
Question: 138
What are the three main limitations of financial statement analysis?
It doesn’t consider changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning
It doesn’t consider changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning
It considers changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning
It considers changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning
Question: 139
What is the underlying equation of the balance sheet?
Assets = liabilities + stock
Assets = liabilities + shareholder equity
Assets = liabilities + stock cost
Assets = liabilities + shareholder equity + RSU cost
Question: 140
One of the following is not prohibited by the Federal Civil Rights Act during an investigation:
Asking questions about prior convictions
Directing inquiry into areas of religion or sex for discriminatory purposes
Directing inquiry into areas of race or color for discriminatory purposes
Asking questions about prior arrests
Question: 141
What are the five pillars of ISO standards?
Equal footing of members Market need Consensus Voluntary participation and application Worldwide applicability
Equal footing of members Direction of Market Consensus Voluntary participation and application Worldwide applicability
Equal footing of members Direction of Market Global alignment Voluntary participation and application Worldwide applicability
Equal footing of members Direction of Market Economic Need Voluntary participation and application Worldwide applicability
Question: 142
Wired glass is intended to provide resistance to
Knives and hammers
Shattering and fragmentation
Bullets or other high-energy missiles
Fire
Question: 143
What departments are typically involved in preemployment background screening?
Human resources Security Business units Legal
Finance Security Business units Legal
Human resources Security Vendor manager Legal
Business Continuity Security Business units Legal
Question: 144
What is sometimes referred to as the private sector version of emergency management?
Business continuity
Resilience
Disaster Recovery
Emergency Protocol
Question: 145
What should be the primary basis for camera selection?
The sensitivity required for a full video output signal under optimal conditions
Location
Site Selection and Cost accrued
The sensitivity required for a full video output signal in the lighting environment in the area to be assessed
Question: 146
What three factors are driving the growth of private policing?
Economic and operational issues (Fear of) crime and violence Order maintenance
Economic and operational issues (Fear of) crime and violence Cost replacement
Economic and operational issues Access to firearms Order maintenance
Legal and Security issues (Fear of) crime and violence Order maintenance
Question: 147
What are the four key challenges to watch for when operating within a joint task force?
Parochialism Protection of sensitive information Data management Reporting chains
Jurisdiction Protection of sensitive information Data management Reporting chains
Parochialism GDPR Data management Reporting chains
Data Sources Chain security Data management Reporting chains
Question: 148
Who should make up the investigative team for an undercover investigation?
A corporate decision maker An HR representative A corporate security professional An attorney familiar with employment law
CISO/COO An HR representative A corporate security professional An attorney familiar with employment law
A corporate decision maker An LE representative A corporate security professional An attorney familiar with employment law
LE Rep, CISO, & CFO An HR representative A corporate security professional An attorney familiar with employment law
Question: 149
What are the three force multipliers in investigations?
Online information sources (e.g. commercial databases) Liaison (e.g. joint task forces) Intelligence information (e.g. informants)
Personnel Processes Intelligence information
Personnel Processes Protocols
Personnel Processes Liaison
Question: 150
What is the rule of thumb for allocating for spare parts purchases in a budget?
About 5 percent of the capital cost of equipment for a location should be allocated each year for spare parts
About 6 percent of the capital cost of equipment for a location should be allocated each year for spare parts
About 7 percent of the capital cost of equipment for a location should be allocated each year for spare parts
About 9 percent of the capital cost of equipment for a location should be allocated each year for spare parts
Question: 151
What is unity of command?
An individual should only report to only one supervisor
An individual can report to more than one supervisor
An individual should not only report to only one supervisor
An individual can report to multiple leads if the operation demands
Question: 152
Assets protection is increasingly based on what principle?
Risk management.
Insurance Cost
Legal requirement
Cost of replacement
Question: 153
What is OPSEC?
OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information
OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect personal identifiable information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information
OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect business specific information that relates directly to the company. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information
OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical government information. It specifically refers to national level information and intelligence and how it should be stored, shared and destroyed
Question: 154
Which kind of investigations cannot be done without police assistance?
Ones involving illegal drugs
Ones involving minors
Ones involving union activity
Ones involving multi-jurisdictional activities
Question: 155
What is the most fundamental form of communication in undercover assignments?
Written reports
Telephone Reports
Verbal Brief
Question: 156
In executive protection (EP), what is an advance?
The process of researching a destination before the principal arrives
Moving vehicles forward
Responding to an active threat
Protecting the client from live fire
Question: 157
What are the five basic functions of management?
Planning Organisation Delegating Coordinating Controlling
Planning Organisation Directing Coordinating Referral
Planning Hiring Directing Coordinating Controlling
Planning Organisation Directing Coordinating Controlling
Question: 158
The Law of Torts deals with
Intentional acts and negligent acts
Negligence and inadvertent conduct that cause damage or injury
Trademark infringement
Torts against persons and torts against property
Question: 159
What is colour rendition?
The ability of a lamp to identify colours seen in an object
The ability of a lamp to record the colours seen in an object
The ability of a lamp to faithfully reproduce the colours seen in an object
The ability of a lamp to minimise and reduce the colours seen in an object
Question: 160
Unclassified material should be marked:
With no marking
"Unclassified" at the top of the page
"Unclassified" at the top and bottom of the page
"Unclassified" at the bottom of the page
Question: 161
When should an undercover investigation be used?
An undercover investigation is appropriate only when no other alternatives are available and the company can reasonably expect a significant return on investment
When there is a suspicion of drug dealing
An undercover investigation is appropriate when law enforcement direct
When there is company fraud or embezzlement
Question: 162
What is the chain of action that must occur if a principal is attacked?
Arm’s reach (immobilize attacker if within arm’s reach, otherwise cover the principal) Sound off (shout the weapon displayed and the direction, in relation to the principal, from which it is coming) Cover Evacuate
Protect the client from live fire
Move to vehicles
Contact Law Enforcement for assistance
Question: 163
What are the five forces shaping assets protection globally?
Collaboration in Systems Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment
Visualisation and Connectivity Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment
Technology and touch Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment
Emergency Management Standards and regulation Convergence of security solutions Homeland security and international security environment
Question: 164
Which two earnings C related ratios are commonly examined in financial analysis?
Earnings per share = net income/total shares Price to earnings = price per share/earnings per share
Earnings per share = net assets/total shares Price to earnings = price per share/earnings per share
Earnings per share = net income/total shares Price to earnings = price per share/earnings after sales
Earnings per share = net income/total shares Price to earnings = price per share/earnings per quarter
Question: 165
What are the most challenging problems in international investigations?
Cultural differences create challenges in international investigations
Conflicting legal obligations from multi-jurisdictional locations
Data Protection and GDPR obligations
Identifying a single mechanism for the sharing of operational information
Question: 166
Who should be made aware of the existence of an undercover investigation?
Only those with an absolute need to know
CISO, CFO & HR
CISO, CFO, HR, and Legal only
Law Enforcement
Question: 167
At a minimum, who should be part of the workplace violence incident management team (IMT)?
A senior management representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law
A senior management representative A senior HR manager The CISO A legal representative familiar with labour and employment law
A LE representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law
A union representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law
Question: 168
What is the most important consideration when a security person deals with a disturbed person?
Bringing the person into custody and eliminating immediate danger
Evacuating the area
Contacting Law Enforcement
Placing the site into Lockdown status
Question: 169
What is a Patent?
A Patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
Legal protection of the expression of ideas in literary, artistic, and musical works.
A Patent is a the hereditary right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
Question: 170
Why should colour be used sparingly in graphical alarm displays?
Because 10 percent of the population has some form of colour blindness
Because 5 percent of the population has some form of colour blindness
Because 15 percent of the population has some form of colour blindness
Because 13 percent of the population has some form of colour blindness
Question: 171
According to Peter Drucker, what is the most crucial question in defining business purpose and mission?
Who is the customer?
What is the goal?
Who is responsible?
What is the product?
Question: 172
What four situations do workplace misconduct investigations typically address?
Conflict of interest Corporate resource abuse/theft Workplace violence Substance abuse
Conflict of interest Sexual Assault Workplace violence Substance abuse
Defamation Corporate resource abuse/theft Workplace violence Substance abuse
Embezzlement Corporate resource abuse/theft Workplace violence Substance abuse
Question: 173
What are the three basic stages of addiction?
Increased tolerance to the drug Increased rationalization and lying Obsession with the substance
Anger Uncontrollable drowsiness
Impaired reflexes Slurred speech Detached interest
Hunger and thirst Slurred speech Uncontrollable drowsiness
Question: 174
What kinds of companies are particularly vulnerable to counterfeiting and piracy?
Start-ups Early stage firms Small and medium size companies that are rich in intangible assets
Start-ups Pre IPO Small and medium size companies that are rich in intangible assets
Start-ups Early stage firms Tech Firms
Start-ups & Financial Institutions Tech Firms Small and medium size companies that are rich in intangible assets
Question: 175
What is the effective range of MANPADS?
1 to 3.5 kilometres (0.06 to 2.2 miles)
1 to 4.5 kilometres (0.06 to 2.8 miles)
1 to 5.5 kilometres (0.06 to 4 miles)
1 to 6 kilometres (0.06 to 5 miles)
Question: 176
What is a primary benefit of zero-based budgeting?
Zero based budgeting may force managers to consider alternative ways of getting the job done
Zero based budgeting may force managers to consider seeking alternate funding
Zero based budgeting may force managers to request additional supports
Zero based budgeting may force managers to consider streamlining the operation
Question: 177
What is the best source of a protection dog?
A reputable professional breeder.
Through ASIS programs
Through online adverts
Through personal referral
Question: 178
A capacitance sensor is an electric condenser that radiates
Energy
Heat
Light
Sound
Question: 179
Which is the most important type of screening investigation process in a corporate organization
Data security
Theft
Background
Security violation
Question: 180
What is the main potential problem in an undercover investigation?
The possibility that the investigation will be exposed or compromised
Discovery and assault
Clear reporting chains
Cost involved
Question: 181
On what should the decision of whether to arm an officer be based?
Budgeting and Training
Whether there is greater danger to life safety without a weapon Whether the officer may reasonably be expected to use fatal force
Local Legislation and availability of firearms
Availability of competent trained personnel
Question: 182
What elements constitute the Investigation lifecycle?
Initiation Investigation Reporting & Results
Incident Report Investigation Reporting & Results
Analysis Investigation Reporting & Results
Initiation Investigation Determination
Question: 183
Inquiries about an investigation can be connected to the investigative results by means of
Ordering
Grouping
Classification
Indexing
Question: 184
The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is
Unfair labour practice
Wildcat
Right to Work
Economic
Question: 185
Who should make up the project management team for an undercover investigation?
Undercover investigator Project manager Client representative Corporate attorney Law enforcement representative (if necessary)
Undercover investigator HR manager Security representative Corporate attorney Law enforcement representative (if necessary)
Senior Company Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary)
Union Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary)
Question: 186
What is the operating principle of ISO’s management systems standards?
The Plan-Do-Check-Act cycle
Direction and Coordination
Organisational Demand
International alignment
Question: 187
What two values describe sensor effectiveness?
Location of Sensor Lighting
Probability of detection Lighting
Location of Sensor Confidence level
Probability of detection Confidence level
Question: 188
What is a Copyright?
Legal protection of the expression of ideas in literary, artistic, and musical works.
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
Legal protection of the expression of ideas in corporate law and policy.
Question: 189
What are the three primary objectives of emergency management?
Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and resume normal operations
Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and prepare the communications plan
Minimize the probability of a reoccurrence Mitigate the impact of the emergency Recover from the emergency and resume normal operations
Minimize the probability of an emergency Mitigate the cost of the emergency Recover from the emergency and resume normal operations
Question: 190
What is good practice to make sure a guest wears a badge while on the premises?
Explain to the person that the badge permits immediate recognition by and assistance from employees
Identification of approved guests and employees
Explain to the person that the badge must be worn otherwise they will have to leave the site
Explain to the person that the badge is a legal requirement
Question: 191
How is the response function of a physical protection system (PPS) measured
The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrest of the adversary
The response function of a PPS is measured by the time between the alarm time and incident closure
The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrival of law enforcement
The response function of a PPS is measured by the time between receipt of communication of adversary action and the interruption of the adversary action
Question: 192
What is the biggest challenge in investigating workplace misconduct issues?
Getting employees to report wrongdoing
GDPR Alignment
Legal Oversight
Coordinate with Law Enforcement and Legal Counsel
Question: 193
How does the progression of interviews differ between regular investigations and undercover investigations?
In regular investigations, the interview process closes in on the perpetrators over time. Undercover investigations begin with those most involved and work towards those less involved
Undercover investigations are not legally covered outside the company
Undercover investigations cannot be used to reclaim company assets
In regular investigations LE assistance may be necessary. In undercover investigations LE assistance is prohibited unless approved by Legal
Question: 194
What is the least understood and most underused form of investigation?
Undercover investigations
Fraud Investigations
Assault investigations
Personal Injury
Question: 195
What are the effects of large doses of cocaine?
Bizarre behaviour Tremors Vertigo Muscle twitches Paranoia Toxic reaction
Craving Loss of control Physical dependence Tolerance
Impaired reflexes Slurred speech Uncontrollable drowsiness
Impaired reflexes Anger Uncontrollable drowsiness
Question: 196
What are general orders?
Guidelines for Operations
Canons, or bodies of principles, for protection officers (e.g. No smoking on duty)
Suggested Guidelines for protection officers
Recommended guidelines and principles, for protection officers (e.g. No smoking on duty)
Question: 197
What is ‘working the principal’?
The choreography used by an executive protection specialist to physically move about with the principal.
Moving vehicles forward
Responding to an active threat
Protecting the client from live fire
Question: 198
What are the four symptoms of alcohol dependence?
Craving Loss of control Physical dependence Tolerance
Impaired reflexes Slurred speech Uncontrollable drowsiness
Impaired reflexes Anger Uncontrollable drowsiness
Craving Loss of control Anger Tolerance
Question: 199
What are a company’s top two valuable resources?
#1 C employees #2 C assets
#1 C employees #2 C corporate knowledge
#1 C C Level Execs #2 C corporate knowledge
#1 C employees #2 C Profit & Loss statement
Question: 200
Which of the following substances would induce poor perception of time and distance
Hallucinogens
Stimulants
Narcotics
Depressants
Question: 201
For effective bulk explosive detection, how often must a person be screened by low dose backscatter x-ray devices?
Twice
Three times
Four Times
Once
Question: 202
What are the two most popular breeds of protection dogs in the United States?
German Shepherd Doberman Pincher
German Shepherd Alsation
German Shepherd Husky
Labrador Cross Doberman Pincher
Question: 203
What are the five qualities that characterise an effective, reliable investigation?
Objectivity Thoroughness Relevance Accuracy Timeliness
Objectivity Communication Relevance Accuracy Timeliness
Objectivity Thoroughness Relevance Experience Timeliness
Objectivity Thoroughness Analysis Accuracy Timeliness
Question: 204
What four major areas does assets protection cover in the telecommunications sector?
Information security Network/computer security Fraud prevention Physical security
Information security Network/computer security Business Continuity Physical security
Information security Emergency Management Fraud prevention Physical security
Information security Network/computer security Fraud prevention Physical Intervention
Question: 205
What should every job offer be based on?
Satisfactory completion of preemployment background checks
Personal recommendation
Medical screening
Completion of training program
Question: 206
What are the two key measurements for the effectiveness of the detection function of a physical protection system? (PPS)
Probability of sensing adversary action and Implementation of effective countermeasures
Target identification and Isolation of the incident
Implementation of countermeasures Evaluation of effectiveness
Probability of sensing adversary action, Time required for reporting and assessing the alarm.
Question: 207
In setting up a proprietary investigative unit, the most important aspect to consider is the:
Number of personnel
Budgeting for staff
Selection of professional personnel
Specialized training of the applicant
Question: 208
What is the process by which an employer verifies the experience and qualifications presented by a job candidate?
Credentialing
Background Check
Screening
Verification
Question: 209
What are the two basic analytical approaches to a risk assessment?
Compliance based and Descriptive
Quantitively and Qualative
Metrics and Graphical
Compliance based Performance based
Question: 210
What are the four approaches to situational crime prevention?
Increase the effort required (e.g. target hardening, access control), Increased artificial lighting Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)
Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)
Increase the effort required (e.g. target hardening, access control), Investment in CPTED Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)
Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling)
Question: 211
What is defensible space?
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment that would encourage residents to proactively report all security incidents and events in the local environment
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical
construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It directly leads to increased costs associated with security services
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment would prevent residents from reporting security incidents or events
The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.
Question: 212
What is the typical initiation event in a private sector incident investigation?
An incident report
Alarm activation
Law Enforcement report
Confidential Informant
Question: 213
What five guidelines should be observed for workplace drug purchases that are part of an investigation?
Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use
Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Record all transactions
Qualify the dealer Coordinate with Legal Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use
Qualify the dealer Coordinate with Legal & HR Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use
Question: 214
One of the following is not prohibited by the Federal Civil Rights Act during an investigation
All
A record
A custodian of record
A public official
Question: 215
Who may edit officers incident entries in a database log?
CISO, CFO, HR, and Legal
Security Officers
Higher level supervisors
Nobody
Question: 216
How does situational crime prevention differ from CPTED and defensible space?
Situational crime prevention seeks to reduce crime opportunities in public and private environments where applicable
Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, not just in the built environment.
Situational crime prevention seeks to reduce crime opportunities through integrating public and private enterprises
Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, in tandem with legal guidelines and oversight
Question: 217
In what two ways can an undercover operative be placed?
Cold Hire (operative applies for a job just like any other applicant) Controlled Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)
Cold Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)
Immediate Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)
Open Hire (operative applies for a job just like any other applicant) Closed Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)
Question: 218
Workplace crime is the function of which three fundamental elements?
Quality of hires Environment in which staff is placed Quality of supervision over environment and staff
Opportunity, Motive, Ability
Opportunity, Motive and quality of personnel
Quality of hires Motivation Quality of supervision over environment and staff
Question: 219
Why might lower-level managers more readily accept a bottom-up budget?
To allow for future operational increases
Because it is a CFO direction
Because they had a role in developing it
To ensure alignment
Question: 220
What are the three main tools of an investigator?
Information Interrogation Instrumentation
Information Analysis Instrumentation
Information Intelligence Instrumentation
Analysis Intelligence Instrumentation
Question: 221
What is the goal of a vulnerability assessment?
To identify physical protection system (PPS) components in the functional areas of site security and to gather data to estimate site performance against particular threats.
To identify physical protection system (PPS) components in the functional areas of entry and access and to gather data to estimate their performance against particular threats.
To identify physical protection system (PPS) components in the functional areas of detection, delay and response and to gather data to estimate their performance against particular threats.
To identify physical protection system (PPS) components in the functional areas of emergency management and business continuity and to gather data to estimate their performance against particular threats.
Question: 222
What is the difference between asset protection and security?
Assets protection includes all security functions, as well as related functions such as investigations, legal oversight, risk management, safety, compliance, and emergency management.
Assets protection includes only physical security related functions.
Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, human resources, compliance, and emergency management.
Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, compliance, and emergency management.
Question: 223
With respect to span of control, the greater the degree of sophistication of interaction between supervisors and subordinates, the
Broader the optimum span of control
More difficult it is to identify the optimum span of control
Narrower the optimum span of control
More options there are in choosing the optimum span of control
Question: 224
What type of extremists pose the most dangerous threat to the world today?
Global jihadists
Single ideology extremists
Zero day terrorists
Independence Extremists