Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which test determines whether a procedure, lock, or electronics system will do what it was designed to do?

A.

Regression

B.

Safety

C.

Functional

D.

Stress

In a theft of proprietary information case, which of the following steps is most important to the security manager?

A.

Sensitive products wore not displayed at trade shows.

B.

Active steps were taken to protect the information.

C.

Every employee was trained to classify the information.

D.

The information was patented, trademarked, or copyrighted

Insurance is a form of risk:

A.

spreading.

B.

avoidance.

C.

transfer.

D.

reduction

A newly hired corporate investigator is conducting interviews to collect information and determine who is responsible for the loss of a missing company laptop from a desk in the shipping and receiving department. At what point must the investigator start observing non-verbal responses?

A.

The investigator must start observing non-vernal responses when the investigator moves the interview into the accusatory stage and the interview becomes an interrogation.

B.

Observation of non-verbal response are only important if the investigator must re-interview someone to nave a comparative in the person posture between the two interviews

C.

The investigator must only observe nonverbal responses if the investigator finds the person to be lying and become defensive in the responses to the investigator's questions.

D.

The investigator must observe non-verbal from the onset of the interview process and continue to observe the interviewee throughout the interview process.

Which type of alarm sensor detects heat from a human body?

A.

Microwave

B.

Passive infrared

C.

Temperature

D.

Ultrasonic

As a security professional responsible for a physical security plan that includes multiple types of organizations and tenants, it is important that the final protection scheme should involve:

A.

a cooperative effort between the building owner and the tenants.

B.

the number of occupants and visitors.

C.

countermeasures installed to equally protect all tenants.

D.

verbal agreements with selected utility suppliers.

Having received a bomb threat from a non-credible source, the security manager should immediately:

A.

fully evacuate and then search.

B.

search without evacuating.

C.

partially evacuate and then search.

D.

fully evacuate without searching.

Which of the following would be most helpful in selling security to management?

A.

Publish security papers to establish credibility, then present a report based on the work.

B.

Prepare in advance and establish a meaningful dialogue with the decision makers.

C.

Know management's needs and present a program without bringing in consultants.

D.

Present a generic report and adjust it as management's needs are determined.

Which of the following fields involves defenses against the interception of data communications from microphones, transmitters, or wiretaps?

A.

Technical security

B.

Emanation security

C.

Line security

D.

Transmission security

An emergency operations center should at minimum have a/an:

A.

alternate location with a redundant communication system.

B.

crisis-management team at an alternate location

C.

redundant communication system.

D.

alternate location.