Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In order to perform a logical risk analysis, it is first necessary to identify the assets in need of being protected, identify the kinds of risks that may affect the involved assets, determine the probability of the risk occurrence, and determine the;

A.

protection staffing levels.

B.

impact if loss occurs.

C.

countermeasures.

D.

budgetary constraints.

Which of the following distinguishes embezzlement from other kinds of theft of corporate property or funds?

A.

Embezzlement can be detected only through an audit or accounting discrepancy.

B.

In embezzlement, the employee breaches a trust by stealing assets entrusted to him/her.

C.

Embezzlement is a "white collar" crime most often perpetrated by senior managers.

D.

It is not necessary to prove criminal intent in an embezzlement case.

To be considered a trade secret, information must meet all of the following criteria EXCEPT:

A.

the owner must take steps to prevent its unauthorized disclosure.

B.

persons to whom it is disclosed must know that it is secret.

C.

it must not be identifiable-

D.

it must not be available already in the public domain.

In terms of information systems security (ISS), "residual risk" is:

A.

the total remaining potential risk after all ISS countermeasures are applied across all threats.

B.

the remaining potential risk for each threat after all ISS countermeasures are applied.

C.

the product of the level of threat and the level of vulnerability

D.

equal to threats multiplied by countermeasures and divided by vulnerabilities.

The most effective way to maintain acceptable levels of vigilance is to:

A.

systematically rotate the security officer's duties between fixed post and roving patrol.

B.

limit assignment duration to a maximum of six hours.

C.

incorporate non-security duties into each shift assignment.

D.

randomly assign security officers to a fixed post or a roving patrol according to their preferences.

All policies and procedures for drug testing should be:

A.

require mandatory testing of all managers.

B.

applied on an "as needed" basis.

C.

separate from any collective bargaining agreement.

D.

administered consistently.

An important element of an emergency response plan includes:

A.

recovery operation procedures.

B.

utilizing an incident management system.

C.

designating a hot site.

D.

shift relief procedure for response personnel.

To maintain effective liaison relationships, an investigator must avoid:

A.

making sure each party receives benefits.

B.

contacting the liaison periodically.

C.

violating the trust of the liaison contact.

D.

contacting the liaison only when specific information is needed.

Which of the following is the basis for all effective security activity?

A.

The security plan or program is based on the use of proprietary guard services to assure proper staffing.

B.

A complete and thorough security manual has been developed.

C.

The security program must have sufficient funding.

D.

The security plan or program is based on an understanding of the risks it is designed to control.

A planned and organized determination of facts concerning specific events, occurrences, or conditions for a particular purpose is referred to as a/an:

A.

operational audit

B.

security survey.

C.

investigation.

D.

risk assessment