Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which method of wiretapping does not require a physical connection to a line?

A.

Inductive coupling

B.

Connective junctioning

C.

Active imaging

D.

Hardwire connection

An essential first step in developing the security department budget is to:

A.

gather specific cost information.

B.

estimate the department's share of the overall corporate budget.

C.

determine minimum staffing levels.

D.

review the corporation's overall strategy and goals.

Security planning relating to threat assessment will result in the determination of the:

A.

likelihood of a terrorist attack.

B.

degree of security required in all areas of the company.

C.

number of personnel required.

D.

capital expense requirements for the annual budget.

Risk acceptance is an informed decision to take a particular risk and:

A.

can occur without risk treatment, process of selection. or implementation of measures to modify risk.

B.

involves the process of identifying internal and external threats and vulnerabilities.

C.

generally includes coordinated activities to direct and control an organization in regard to risk.

D.

defines the controls in place necessary to reduce exposure and evaluate the cost of such controls.

Which of the following represents the four steps that are recommended after an information loss?

A.

Stoppage of information loss, investigation, recovery, and follow-up

B.

Investigation, damage assessment, recovery, and follow-up

C.

Stoppage of information loss, notification of information owner, recovery, and follow-up

D.

Investigation, notification of information owner, recovery, and follow-up

The first task of a security practitioner in a security risk assessment is to develop an understanding of the:

A.

vulnerabilities.

B.

organization.

C.

impact of events.

D.

cost/benefit analysis.

Crime Prevention Through Environmental Design is a set of management tools targeting:

A.

vault, safe, and intrusion testing.

B.

access control. CCTV and burglar and fire alarm systems.

C.

fencing, lighting, bollards, and gates.

D.

places, behavior, and the design and use of space.

In large-scale emergencies, the Incident Command System can be effectively deployed by:

A.

private sector organizations only.

B.

federal agencies only.

C.

public and private sector organizations.

D.

public sector organizations only.

When companies are downsizing their staffs. increasing a manager's span of control is often effective because it:

A.

cuts overhead and increases flexibility.

B.

encourages tight supervision and reduces cost.

C.

reduces cost and discourages employee autonomy, which isolates upper management.

D.

discourages employee autonomy and cuts overhead.

What is the basic objective of Crime Prevention Through Environmental Design (CPTED)?

A.

Ensuring budding code compatibility through architectural design

B.

Preventing crime through physical and construction planning

C.

Achieving defensible space in architectural conformity

D.

Improving the accuracy of crime statistics